SlideShare a Scribd company logo
1 of 24
Download to read offline
RANSOMWARE
LOCKS DOWN EDUCATION
The new threat on campus:
in ransom payments in 2016
$1B
1,425% ROI
Sources: FBI, TrustWave
RANSOMWARE
IS A BOOMING
BUSINESS
Sophisticated Black Market
Cheap Exploit Kits
Ransom-as-a-Service (RaaS)
IT’S ONLY GETTING WORSE
Sources: FBI, TrustWave
Tuesday, January 17. 2017
Hollywood, California
METRO NEWS
HOLLYWOOD PRESBYTERIAN
HOSPITAL PAYS $17,000 RANSOM
HEALTHCARE HACKS
MAKE HEADLINES
Source: Bitsight
4X MORE LIKELY
BUT
EDUCATIONAL INSTITUTIONS
ARE ALMOST
TO GET HIT WITH
RANSOMWARE
EDUCATION
Source: Bitsight
IS NOW THE
FOR RANSOMWARE
TOP TARGET
1. DECENTRALIZED IT
 3 Reasons Why Education is So Vulnerable
DIFFERENT DEPARTMENTS—
DIFFERENT TECH
INCONSISTENCIES CREATE HOLES
RANSOMWARE FINDS THE
VULNERABILITIES
SPEAR PHISHING MADE EASY
“Higher education institutions have become
particularly vulnerable to ‘spear phishing.’”
– 2016 Beazley Breach Insights Report
INBOX
SEARCH
CONTACTS
SETTINGS
SUBJECT: URGENT
To: All Departments
From: The Dean
Please review the attached document immediately.
12/12/2016
2. ONCE RANSOMWARE HITS,
IT SPREADS EASILY
 3 Reasons Why Education is So Vulnerable
COLLABORATIVE CULTURE
“The relatively open nature of campus IT systems…
and a lack of restrictive controls…make higher
education institutions particularly
vulnerable to breaches.”
- Beazley Breach Insights
FILE SYNC  SHARE
SPREADS THE INFECTION
3. USERS HOLD
VALUABLE DATA
 3 Reasons Why Education is So Vulnerable
Security policy can’t fix unpredictable users
EDUCATION HAS ALL THE
TRADITIONAL TARGETS
Student Records Financial Data Proprietary Research
THE BIG TARGET:
INTELLECTUAL
PROPERTY
(IP)
THE IDEAS THAT DRIVE EDUCATION  RESEARCH
RANSOMWARE + USER ERROR
“A developer was infected by ransomware just as she was
completing a major project, and she hadn’t backed up
her work to the server. She thought her work was lost
and would surely have to pay, but with Code42 CrashPlan,
we were able to get her data back.”
— Diana Williams, Sr. Systems Administrator, University of Georgia, Code42 CrashPlan user
A Costly Combo
IDEAS AREN’T CREATED
ON SERVERS
INTELLECTUAL PROPERTY
LIVES ON DEVICES
ENDPOINT DATA:
A MAJOR BLIND SPOT
What data lives on the devices? Is that data backed up?
LEGACY BACKUP
 RESTORE
CAN’T BE TRUSTED
User-dependent
Backups
Infrequent
Backups
File Size
Limitations
Unreliable
Restores
SYNC  SHARE ­≠­BACKUP
+ + =Incomplete Data
Repositories
Synced
Encryption
Limited
Versioning
End User
Data Loss
1.	 COMPREHENSIVE DATA BACKUP
	 Never lose your data. Never pay the ransom.
2.	UNLIMITED FILE VERSIONING
	 Make a clean point-in-time restore.
3.	USER PROFILE BACKUP
	 Restore user settings and get users back to work.
4.	SELF-SERVICE RESTORES
	 Reduce IT costs and minimize downtime.
 4 Steps to Ransomware Preparedness
THE BIG
PICTURE: PLUGGING
HOLES WITH
CENTRALIZED
DATA
SECURITY
BENEFITS OF A CENTRAL
DATA SECURITY POSTURE
•	 Eliminate gaps and blind spots
•	 Enable complete visibility
•	 Ensure comprehensive backup
•	 Respond and recover faster
WHY CODE42?
DON’T TAKE OUR WORD FOR IT
7
Only enterprise backup
provider trusted by
Internet2 consortium
Ivy league schools
trust Code42
to secure their data
of8
ARE YOU PREPARED
FOR RANSOMWARE?
LET’S TALK.
code42.com/contact

More Related Content

What's hot

Resource List _Mentoring Relationships
Resource List _Mentoring RelationshipsResource List _Mentoring Relationships
Resource List _Mentoring Relationships
Dustianne North
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016
Sal Rodriguez
 

What's hot (8)

Web 2.0/Social Networks and Security
Web 2.0/Social Networks and SecurityWeb 2.0/Social Networks and Security
Web 2.0/Social Networks and Security
 
Resource List _Mentoring Relationships
Resource List _Mentoring RelationshipsResource List _Mentoring Relationships
Resource List _Mentoring Relationships
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Online Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safelyOnline Social Networks: 5 threats and 5 ways to use them safely
Online Social Networks: 5 threats and 5 ways to use them safely
 
ransomware_infographic-6-2016
ransomware_infographic-6-2016ransomware_infographic-6-2016
ransomware_infographic-6-2016
 
Technology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk MitigationTechnology and Web 2.0 Across Institutions - Risk Mitigation
Technology and Web 2.0 Across Institutions - Risk Mitigation
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Insecure trends in web technologies 2009
Insecure trends in web technologies 2009Insecure trends in web technologies 2009
Insecure trends in web technologies 2009
 

Viewers also liked

ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at Scale
Panasas
 

Viewers also liked (17)

How to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider ExfiltrationHow to Spot the 6 Archetypes of Insider Exfiltration
How to Spot the 6 Archetypes of Insider Exfiltration
 
Social Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant PeopleSocial Confidence Skills for Quietly Brilliant People
Social Confidence Skills for Quietly Brilliant People
 
How to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware AttacksHow to Help Your Customers Protect Themselves from Ransomware Attacks
How to Help Your Customers Protect Themselves from Ransomware Attacks
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Understanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case StudyUnderstanding CryptoLocker (Ransomware) with a Case Study
Understanding CryptoLocker (Ransomware) with a Case Study
 
Ransomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, PreventionRansomware - Impact, Evolution, Prevention
Ransomware - Impact, Evolution, Prevention
 
Portfolio
PortfolioPortfolio
Portfolio
 
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
'We Eat Cryptolocker for Breakfast' - How to Beat Ransomware Presentation
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen könnenWie Sie Ransomware aufspüren und was Sie dagegen machen können
Wie Sie Ransomware aufspüren und was Sie dagegen machen können
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 
Шизандра. Улучшенная формула
Шизандра. Улучшенная формулаШизандра. Улучшенная формула
Шизандра. Улучшенная формула
 
JCBMemorial9-8-14-Owens
JCBMemorial9-8-14-OwensJCBMemorial9-8-14-Owens
JCBMemorial9-8-14-Owens
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.
 
JD Gen Book
JD Gen BookJD Gen Book
JD Gen Book
 
ActiveStor Performance at Scale
ActiveStor Performance at ScaleActiveStor Performance at Scale
ActiveStor Performance at Scale
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
 

Similar to The New Threat on Campus: Ransomware Locks Down Education

Hope rainier pitch
Hope rainier pitchHope rainier pitch
Hope rainier pitch
Adam Root
 
Bridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA SuperconferenceBridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA Superconference
lvangiesen
 

Similar to The New Threat on Campus: Ransomware Locks Down Education (20)

Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Maximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data ServicesMaximizing benefit of Open Data through Linked Data Services
Maximizing benefit of Open Data through Linked Data Services
 
Hope rainier pitch
Hope rainier pitchHope rainier pitch
Hope rainier pitch
 
BBB Market Monitor: June2 021
BBB Market Monitor: June2 021BBB Market Monitor: June2 021
BBB Market Monitor: June2 021
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 
Ovw2012
Ovw2012Ovw2012
Ovw2012
 
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
HDI Capital Area Meeting May 2019 Cybersecurity Planning for the Modern Techn...
 
TCFV Conference
TCFV  ConferenceTCFV  Conference
TCFV Conference
 
Bridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA SuperconferenceBridging the Gap Between Finance & Fundraising - MNA Superconference
Bridging the Gap Between Finance & Fundraising - MNA Superconference
 
Microservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with KafkaMicroservices, Events, and Breaking the Data Monolith with Kafka
Microservices, Events, and Breaking the Data Monolith with Kafka
 
Socal5minutes
Socal5minutesSocal5minutes
Socal5minutes
 
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data...
 
PR in the Era of Fake News
PR in the Era of Fake NewsPR in the Era of Fake News
PR in the Era of Fake News
 
Graphs in the Real World
Graphs in the Real WorldGraphs in the Real World
Graphs in the Real World
 
Generating Big Value from Big Data
Generating Big Value from Big DataGenerating Big Value from Big Data
Generating Big Value from Big Data
 
Donor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucketDonor retention by the numbers: Demystifying the leaky bucket
Donor retention by the numbers: Demystifying the leaky bucket
 
DOF RGI Technology Presentation Nov 23 2011
DOF RGI Technology Presentation   Nov 23 2011DOF RGI Technology Presentation   Nov 23 2011
DOF RGI Technology Presentation Nov 23 2011
 
Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015Data Breach Risk Brief - 2015
Data Breach Risk Brief - 2015
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 

The New Threat on Campus: Ransomware Locks Down Education

  • 1. RANSOMWARE LOCKS DOWN EDUCATION The new threat on campus:
  • 2. in ransom payments in 2016 $1B 1,425% ROI Sources: FBI, TrustWave RANSOMWARE IS A BOOMING BUSINESS
  • 3. Sophisticated Black Market Cheap Exploit Kits Ransom-as-a-Service (RaaS) IT’S ONLY GETTING WORSE Sources: FBI, TrustWave
  • 4. Tuesday, January 17. 2017 Hollywood, California METRO NEWS HOLLYWOOD PRESBYTERIAN HOSPITAL PAYS $17,000 RANSOM HEALTHCARE HACKS MAKE HEADLINES Source: Bitsight 4X MORE LIKELY BUT EDUCATIONAL INSTITUTIONS ARE ALMOST TO GET HIT WITH RANSOMWARE
  • 5. EDUCATION Source: Bitsight IS NOW THE FOR RANSOMWARE TOP TARGET
  • 6. 1. DECENTRALIZED IT 3 Reasons Why Education is So Vulnerable DIFFERENT DEPARTMENTS— DIFFERENT TECH
  • 7. INCONSISTENCIES CREATE HOLES RANSOMWARE FINDS THE VULNERABILITIES
  • 8. SPEAR PHISHING MADE EASY “Higher education institutions have become particularly vulnerable to ‘spear phishing.’” – 2016 Beazley Breach Insights Report INBOX SEARCH CONTACTS SETTINGS SUBJECT: URGENT To: All Departments From: The Dean Please review the attached document immediately. 12/12/2016
  • 9. 2. ONCE RANSOMWARE HITS, IT SPREADS EASILY 3 Reasons Why Education is So Vulnerable
  • 10. COLLABORATIVE CULTURE “The relatively open nature of campus IT systems… and a lack of restrictive controls…make higher education institutions particularly vulnerable to breaches.” - Beazley Breach Insights
  • 11. FILE SYNC SHARE SPREADS THE INFECTION
  • 12. 3. USERS HOLD VALUABLE DATA 3 Reasons Why Education is So Vulnerable Security policy can’t fix unpredictable users
  • 13. EDUCATION HAS ALL THE TRADITIONAL TARGETS Student Records Financial Data Proprietary Research
  • 14. THE BIG TARGET: INTELLECTUAL PROPERTY (IP) THE IDEAS THAT DRIVE EDUCATION RESEARCH
  • 15. RANSOMWARE + USER ERROR “A developer was infected by ransomware just as she was completing a major project, and she hadn’t backed up her work to the server. She thought her work was lost and would surely have to pay, but with Code42 CrashPlan, we were able to get her data back.” — Diana Williams, Sr. Systems Administrator, University of Georgia, Code42 CrashPlan user A Costly Combo
  • 16. IDEAS AREN’T CREATED ON SERVERS INTELLECTUAL PROPERTY LIVES ON DEVICES
  • 17. ENDPOINT DATA: A MAJOR BLIND SPOT What data lives on the devices? Is that data backed up?
  • 18. LEGACY BACKUP RESTORE CAN’T BE TRUSTED User-dependent Backups Infrequent Backups File Size Limitations Unreliable Restores
  • 19. SYNC SHARE ­≠­BACKUP + + =Incomplete Data Repositories Synced Encryption Limited Versioning End User Data Loss
  • 20. 1. COMPREHENSIVE DATA BACKUP Never lose your data. Never pay the ransom. 2. UNLIMITED FILE VERSIONING Make a clean point-in-time restore. 3. USER PROFILE BACKUP Restore user settings and get users back to work. 4. SELF-SERVICE RESTORES Reduce IT costs and minimize downtime. 4 Steps to Ransomware Preparedness
  • 21. THE BIG PICTURE: PLUGGING HOLES WITH CENTRALIZED DATA SECURITY
  • 22. BENEFITS OF A CENTRAL DATA SECURITY POSTURE • Eliminate gaps and blind spots • Enable complete visibility • Ensure comprehensive backup • Respond and recover faster
  • 23. WHY CODE42? DON’T TAKE OUR WORD FOR IT 7 Only enterprise backup provider trusted by Internet2 consortium Ivy league schools trust Code42 to secure their data of8
  • 24. ARE YOU PREPARED FOR RANSOMWARE? LET’S TALK. code42.com/contact