Загрузка страницы

What We can Learn from KASEYA Ransomware Attack

Let's talk about Kaseya Zero-day and Supply-chain Ransomware Attack. No matter how you pronounce KASEYA, it doesn’t change the fact that this company is at the forefront of yet another ransomware attack. I’d go as far as saying that we can call it Ransomware 2.0. Colonial pipeline, SolarWinds, Kaseya – I can now almost foretell what companies are next to get hit by a ransomware attack. Let me share with you a secret. So, if a company is owned by private equity and run by salespeople, it is likely to be in trouble. How do I know? Let’s see. So, what’s common among SolarWinds, Colonial Pipeline, and Kaseya? They are all owned by private equity owners. You may ask, why is that a big deal? Because cybersecurity best practices are not in the PE owner’s ROI and compensation plans. Next up. If a company has fired infosec experts who made calls to improve security practices and posture, it is likely to get a spot on the ransomware hall of shame. And finally, if a company’s software consists of questionable supply chain components or practices then it is super likely to land in trouble with hackers.

★★ CISCO AND DEVNET CERTIFICATIONS LEARNING MATERIAL ★★
https://cciein8weeks.com
https://fullstacknetworker.com

★★ WHO AM I ★★
https://bit.ly/3qZsCLm
https://twitter.com/AfaqMKhan

#kaseya #ransomware #supplychain

Видео What We can Learn from KASEYA Ransomware Attack канала Technology Leadership
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
14 июля 2021 г. 18:00:07
00:07:23
Яндекс.Метрика