![]() ![]() How could NetFoundry’s zero trust network access (ZTNA) architecture been used to prevent the Kaseya ransomware attack? If the business pays the ransom, then the data is decrypted (so business ops can resume), and theoretically the business data has not been stolen, shared or tampered with. Destroy – In ransomware terms, destroying a business is encrypting the data which the business depends on (rendering it useless to the systems which need it), and taking copies of the data.In the case of the Kaseya breach, it could spread to the 1500 businesses managed by Kaseya MSPs. Multiply – The ransomware spreads over the business WAN. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |