SlideShare a Scribd company logo
1 of 24
Download to read offline
RANSOMWARE
LOCKS DOWN EDUCATION
The new threat on campus:
in ransom payments in 2016
$1B
1,425% ROI
Sources: FBI, TrustWave
RANSOMWARE
IS A BOOMING
BUSINESS
Sophisticated Black Market
Cheap Exploit Kits
Ransom-as-a-Service (RaaS)
IT’S ONLY GETTING WORSE
Sources: FBI, TrustWave
Tuesday, January 17. 2017
Hollywood, California
METRO NEWS
HOLLYWOOD PRESBYTERIAN
HOSPITAL PAYS $17,000 RANSOM
HEALTHCARE HACKS
MAKE HEADLINES
Source: Bitsight
4X MORE LIKELY
BUT
EDUCATIONAL INSTITUTIONS
ARE ALMOST
TO GET HIT WITH
RANSOMWARE
EDUCATION
Source: Bitsight
IS NOW THE
FOR RANSOMWARE
TOP TARGET
1. DECENTRALIZED IT
 3 Reasons Why Education is So Vulnerable
DIFFERENT DEPARTMENTS—
DIFFERENT TECH
INCONSISTENCIES CREATE HOLES
RANSOMWARE FINDS THE
VULNERABILITIES
SPEAR PHISHING MADE EASY
“Higher education institutions have become
particularly vulnerable to ‘spear phishing.’”
– 2016 Beazley Breach Insights Report
INBOX
SEARCH
CONTACTS
SETTINGS
SUBJECT: URGENT
To: All Departments
From: The Dean
Please review the attached document immediately.
12/12/2016
2. ONCE RANSOMWARE HITS,
IT SPREADS EASILY
 3 Reasons Why Education is So Vulnerable
COLLABORATIVE CULTURE
“The relatively open nature of campus IT systems…
and a lack of restrictive controls…make higher
education institutions particularly
vulnerable to breaches.”
- Beazley Breach Insights
FILE SYNC  SHARE
SPREADS THE INFECTION
3. USERS HOLD
VALUABLE DATA
 3 Reasons Why Education is So Vulnerable
Security policy can’t fix unpredictable users
EDUCATION HAS ALL THE
TRADITIONAL TARGETS
Student Records Financial Data Proprietary Research
THE BIG TARGET:
INTELLECTUAL
PROPERTY
(IP)
THE IDEAS THAT DRIVE EDUCATION  RESEARCH
RANSOMWARE + USER ERROR
“A developer was infected by ransomware just as she was
completing a major project, and she hadn’t backed up
her work to the server. She thought her work was lost
and would surely have to pay, but with Code42 CrashPlan,
we were able to get her data back.”
— Diana Williams, Sr. Systems Administrator, University of Georgia, Code42 CrashPlan user
A Costly Combo
IDEAS AREN’T CREATED
ON SERVERS
INTELLECTUAL PROPERTY
LIVES ON DEVICES
ENDPOINT DATA:
A MAJOR BLIND SPOT
What data lives on the devices? Is that data backed up?
LEGACY BACKUP
 RESTORE
CAN’T BE TRUSTED
User-dependent
Backups
Infrequent
Backups
File Size
Limitations
Unreliable
Restores
SYNC  SHARE ­≠­BACKUP
+ + =Incomplete Data
Repositories
Synced
Encryption
Limited
Versioning
End User
Data Loss
1.	 COMPREHENSIVE DATA BACKUP
	 Never lose your data. Never pay the ransom.
2.	UNLIMITED FILE VERSIONING
	 Make a clean point-in-time restore.
3.	USER PROFILE BACKUP
	 Restore user settings and get users back to work.
4.	SELF-SERVICE RESTORES
	 Reduce IT costs and minimize downtime.
 4 Steps to Ransomware Preparedness
THE BIG
PICTURE: PLUGGING
HOLES WITH
CENTRALIZED
DATA
SECURITY
BENEFITS OF A CENTRAL
DATA SECURITY POSTURE
•	 Eliminate gaps and blind spots
•	 Enable complete visibility
•	 Ensure comprehensive backup
•	 Respond and recover faster
WHY CODE42?
DON’T TAKE OUR WORD FOR IT
7
Only enterprise backup
provider trusted by
Internet2 consortium
Ivy league schools
trust Code42
to secure their data
of8
ARE YOU PREPARED
FOR RANSOMWARE?
LET’S TALK.
code42.com/contact

More Related Content

What's hot

Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Securitysherrymoon7121
 
Resource List _Mentoring Relationships
Resource List _Mentoring RelationshipsResource List _Mentoring Relationships
Resource List _Mentoring RelationshipsDustianne North
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016Sal Rodriguez
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationDan Michaluk
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Chandrakanth Narreddy
 

What's hot (8)

Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Security
 
Resource List _Mentoring Relationships
Resource List _Mentoring RelationshipsResource List _Mentoring Relationships
Resource List _Mentoring Relationships
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk Mitigation
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
 

Viewers also liked

How to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider ExfiltrationHow to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider ExfiltrationCode42
 
Social Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant PeopleSocial Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant PeopleDilip N
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksSolarwinds N-able
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Studysecurityxploded
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionMohammad Yahya
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware PresentationLucy Denver
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenSplunk
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomSolarwinds N-able
 
Шизандра. Улучшенная формула
Шизандра. Улучшенная формулаШизандра. Улучшенная формула
Шизандра. Улучшенная формулаGrigory Korshunov
 
JCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensJCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensKevin Owens
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Carbonite
 
ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at ScalePanasas
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011Carbonite
 

Viewers also liked (17)

How to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider ExfiltrationHow to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider Exfiltration
 
Social Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant PeopleSocial Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant People
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Portfolio
PortfolioPortfolio
Portfolio
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
Шизандра. Улучшенная формула
Шизандра. Улучшенная формулаШизандра. Улучшенная формула
Шизандра. Улучшенная формула
 
JCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensJCBMemorial9-8-14-Owens
JCBMemorial9-8-14-Owens
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.
 
JD Gen Book
JD Gen BookJD Gen Book
JD Gen Book
 
ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at Scale
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
 

Similar to The New Threat on Campus: Ransomware Locks Down Education

Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughMartin Opsahl
 
Maximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data ServicesMaximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data ServicesDave Reynolds
 
Hope rainier pitch
Hope rainier pitchHope rainier pitch
Hope rainier pitchAdam Root
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...hdicapitalarea
 
Bridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA SuperconferenceBridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA Superconferencelvangiesen
 
Microservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with KafkaMicroservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with KafkaVMware Tanzu
 
Socal5minutes
Socal5minutesSocal5minutes
Socal5minutescromaine
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...Forcepoint LLC
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake NewsSandra Fathi
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real WorldNeo4j
 
Generating Big Value from Big Data
Generating Big Value from Big DataGenerating Big Value from Big Data
Generating Big Value from Big DataBrendan Aldrich
 
Donor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucketDonor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucketBrandon Fix
 
DOF RGI Technology Presentation Nov 23 2011
DOF RGI Technology Presentation   Nov 23 2011DOF RGI Technology Presentation   Nov 23 2011
DOF RGI Technology Presentation Nov 23 2011clair611
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 

Similar to The New Threat on Campus: Ransomware Locks Down Education (20)

Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Maximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data ServicesMaximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data Services
 
Hope rainier pitch
Hope rainier pitchHope rainier pitch
Hope rainier pitch
 
BBB Market Monitor: June2 021
BBB Market Monitor: June2 021BBB Market Monitor: June2 021
BBB Market Monitor: June2 021
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 
Ovw2012
Ovw2012Ovw2012
Ovw2012
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
 
TCFV Conference
TCFV  ConferenceTCFV  Conference
TCFV Conference
 
Bridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA SuperconferenceBridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA Superconference
 
Microservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with KafkaMicroservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with Kafka
 
Socal5minutes
Socal5minutesSocal5minutes
Socal5minutes
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake News
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real World
 
Generating Big Value from Big Data
Generating Big Value from Big DataGenerating Big Value from Big Data
Generating Big Value from Big Data
 
Donor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucketDonor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucket
 
DOF RGI Technology Presentation Nov 23 2011
DOF RGI Technology Presentation   Nov 23 2011DOF RGI Technology Presentation   Nov 23 2011
DOF RGI Technology Presentation Nov 23 2011
 
Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 

Recently uploaded

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Recently uploaded (20)

Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

The New Threat on Campus: Ransomware Locks Down Education

  • 1. RANSOMWARE LOCKS DOWN EDUCATION The new threat on campus:
  • 2. in ransom payments in 2016 $1B 1,425% ROI Sources: FBI, TrustWave RANSOMWARE IS A BOOMING BUSINESS
  • 3. Sophisticated Black Market Cheap Exploit Kits Ransom-as-a-Service (RaaS) IT’S ONLY GETTING WORSE Sources: FBI, TrustWave
  • 4. Tuesday, January 17. 2017 Hollywood, California METRO NEWS HOLLYWOOD PRESBYTERIAN HOSPITAL PAYS $17,000 RANSOM HEALTHCARE HACKS MAKE HEADLINES Source: Bitsight 4X MORE LIKELY BUT EDUCATIONAL INSTITUTIONS ARE ALMOST TO GET HIT WITH RANSOMWARE
  • 5. EDUCATION Source: Bitsight IS NOW THE FOR RANSOMWARE TOP TARGET
  • 6. 1. DECENTRALIZED IT 3 Reasons Why Education is So Vulnerable DIFFERENT DEPARTMENTS— DIFFERENT TECH
  • 7. INCONSISTENCIES CREATE HOLES RANSOMWARE FINDS THE VULNERABILITIES
  • 8. SPEAR PHISHING MADE EASY “Higher education institutions have become particularly vulnerable to ‘spear phishing.’” – 2016 Beazley Breach Insights Report INBOX SEARCH CONTACTS SETTINGS SUBJECT: URGENT To: All Departments From: The Dean Please review the attached document immediately. 12/12/2016
  • 9. 2. ONCE RANSOMWARE HITS, IT SPREADS EASILY 3 Reasons Why Education is So Vulnerable
  • 10. COLLABORATIVE CULTURE “The relatively open nature of campus IT systems… and a lack of restrictive controls…make higher education institutions particularly vulnerable to breaches.” - Beazley Breach Insights
  • 11. FILE SYNC SHARE SPREADS THE INFECTION
  • 12. 3. USERS HOLD VALUABLE DATA 3 Reasons Why Education is So Vulnerable Security policy can’t fix unpredictable users
  • 13. EDUCATION HAS ALL THE TRADITIONAL TARGETS Student Records Financial Data Proprietary Research
  • 14. THE BIG TARGET: INTELLECTUAL PROPERTY (IP) THE IDEAS THAT DRIVE EDUCATION RESEARCH
  • 15. RANSOMWARE + USER ERROR “A developer was infected by ransomware just as she was completing a major project, and she hadn’t backed up her work to the server. She thought her work was lost and would surely have to pay, but with Code42 CrashPlan, we were able to get her data back.” — Diana Williams, Sr. Systems Administrator, University of Georgia, Code42 CrashPlan user A Costly Combo
  • 16. IDEAS AREN’T CREATED ON SERVERS INTELLECTUAL PROPERTY LIVES ON DEVICES
  • 17. ENDPOINT DATA: A MAJOR BLIND SPOT What data lives on the devices? Is that data backed up?
  • 18. LEGACY BACKUP RESTORE CAN’T BE TRUSTED User-dependent Backups Infrequent Backups File Size Limitations Unreliable Restores
  • 19. SYNC SHARE ­≠­BACKUP + + =Incomplete Data Repositories Synced Encryption Limited Versioning End User Data Loss
  • 20. 1. COMPREHENSIVE DATA BACKUP Never lose your data. Never pay the ransom. 2. UNLIMITED FILE VERSIONING Make a clean point-in-time restore. 3. USER PROFILE BACKUP Restore user settings and get users back to work. 4. SELF-SERVICE RESTORES Reduce IT costs and minimize downtime. 4 Steps to Ransomware Preparedness
  • 21. THE BIG PICTURE: PLUGGING HOLES WITH CENTRALIZED DATA SECURITY
  • 22. BENEFITS OF A CENTRAL DATA SECURITY POSTURE • Eliminate gaps and blind spots • Enable complete visibility • Ensure comprehensive backup • Respond and recover faster
  • 23. WHY CODE42? DON’T TAKE OUR WORD FOR IT 7 Only enterprise backup provider trusted by Internet2 consortium Ivy league schools trust Code42 to secure their data of8
  • 24. ARE YOU PREPARED FOR RANSOMWARE? LET’S TALK. code42.com/contact