Disaster Recovery Journal Spring 2025
EDITOR’S NOTE : DCIG empowers the IT industry with actionable analysis that equips individuals within organizations to do supplier and product evaluations. DCIG delivers informed, insightful, third-party analysis, and commentary on IT technology. As industry experts, DCIG provides comprehensive, in-depth analysis, and recommendations of various enterprise data storage and data protection technologies. The views, thoughts, and opinions expressed in all Disaster Recovery Journal articles belong solely to the author. The information, product recommendations, and opinions in this article are based upon public information and from sources DCIG, LLC. believes to be accurate and reliable.
gies used. Equipped with this information, they can develop ransomware that increases the probability of a successful attack. Here are some hypothetical yet realistic ways hackers may use gathered information to develop ransomware specific to an organization: By researching an organization, hackers may obtain specific information about it, such as its employees, IT infrastructure, and technologies used. Equipped with this information, they can develop ransomware that increases the probability of a successful attack. “
The Rise of Anomaly Detection in Cybersecurity Defense
By JEROME WENDT
A
firewalls and antivirus soft ware. Hackers often research an organization before initi ating a targeted ransomware attack. By researching an orga nization, hackers may obtain specific information about it, such as its employees, IT infrastructure, and technolo
ll organizations have become more vigilant in detect ing and rooting out ransomware in their
cult to detect. To uncover these more elusive strains, more data protection solutions now include anomaly detection to help identify them. Targeted Ransomware Attacks Mounting a viable cyberse curity defense requires organi zations to go beyond deploying
“
IT environments. However, increasing perimeter cyberse curity defenses has resulted in hackers creating ransomware strains that are even more diffi
27 DISASTER RECOVERY JOURNAL | SPRING 2025
Made with FlippingBook - Share PDF online