The Best Line of Defense

The Best Line of Defense

Keeping Ransomware threats exactly where they belong

Of the many challenges plaguing the security industry today, stricter compliance regulations are a top concern for many administrators. A main reason for this is because the longer data must be retained, the longer the window of opportunity for a cyberattack grows.

With IDC’s Video Surveillance Survey 2022 showing that a growing number of enterprises are expecting their video surveillance storage requirements to increase over the next three years, it is likely these windows for attacks will grow even more. Not only can a cyberattack put sensitive data into the hands of bad actors who could destroy or tamper with it, but it can also be costly. Recent data found that the average ransom paid is up over $100,000 this year, and that is not counting investigation costs.

One of the simplest and most cost-effective means to protect security data against ransomware threats is by storing a second copy in the cloud. Cloud storage offers several key benefits when it comes to fighting cyberattacks, including, zero-trust, immutability, and scalability.

Why a Zero-trust Approach to Cloud Storage is Key
Now that enterprises operate in an age of interconnected access to data, many have seen the need to adopt a less trusting model of security where focus is placed on users and their access to certain resources and data. As a result, many have adopted zero trust security, an approach that requires all members of an organization to be authenticated and authorized to access sensitive data.

A major part of zero trust that security administrators must keep an eye on is cloud storage. Since the cloud can potentially be vulnerable to cyberattacks, administrators should take added zero trust precautions. This can include end-to-end encryption, two-factor authentication, and immutable buckets. The less access users have to data, the better it is protected from malicious changes, deletion, or encryption from bad actors.

The Importance of an Having a Copy in the Cloud
Most surveillance video is still traditionally stored on premises. However, there are numerous benefits to storing a copy in the cloud, from freeing up on-site storage space, to safeguarding a copy against other security incidents like ransomware or accidental deletion.

Since the onset of the cloud, this strategy has evolved to consist of another added layer of protection, which is an immutable copy of data. An immutable layer is locked and cannot be altered or deleted. Companies leave the replication of the cloud copies to the cloud vendor.

The user backs up to one cloud location and the cloud vendor replicates the backup, remaining unseen by the corporate network.

An immutable copy of data is critical to any cybersecurity strategy, considering security administrators must plan for any kind of incident that can occur. Since most ransomware attacks occur because of human error, an additional layer of immutable backup can help restore data if it is affected by an attack.

This layer is “air gapped,” which means it is disconnected from the corporate network, making it impenetrable from potential hackers. It also helps ensure the chain of custody for evidence in investigations.

Simple Ability to Scale Up and Down
As security footage regulations change, the amount of content that the cloud must store also changes. Cloud storage allows for administrators to easily scale their storage up or down, based on demand. This is especially helpful for organizations that use motion-based cameras and have busier times of year, for example sports stadiums or schools.

For states or organizations that require longer retention time, it is even more critical to have secure cloud storage, since bad actors have more time to plan their attacks. By being able to increase or decrease cloud storage as needed, security administrators can ensure that the necessary data is being protected for the required amount of time. This way, they are meeting regulations while also keeping data and security footage safe.

Ensuring protection is not a simple task. It requires thorough planning and regular reassessment and checkups. Beyond cloud storage, organizations should ensure that they are regularly training their employees on cybersecurity best practices, such as how to spot phishing emails and updating who is authorized to access data. With regular cybersecurity assessments and proper cloud storage, security administrators can ensure that they are protecting their data from bad actors to the best of their ability.

This article originally appeared in the September / October 2023 issue of Security Today.

Featured

  • Gun Violence Report Finds Retail Spaces, K-12 Schools Most Targeted

    ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, today announced the release of its annual Gun Violence Report, offering a deep dive into the landscape of gun-related incidents across the United States. This analysis extends beyond mass fatality events, providing a more nuanced understanding of when, where, and why shootings occur. Read Now

  • Agentic AI Will Revolutionize Cybercrime in 2025 According to New Report

    Malwarebytes, a provider in real-time cyber protection, recently released its 2025 State of Malware report, which reveals insight into the emergence of agentic artificial intelligence (AI), plus the year’s most prominent threats and cybercrime tactics. The report details a significant uptick in the number of known ransomware attacks, the total value of ransoms paid in 2024, and how IT teams can address them. Read Now

  • ESX 2025 Announces Expanded Schedule of Events

    ESX has announced its dynamic 2025 schedule, set to provide an unparalleled experience for professionals in the electronic security and life safety industry. Taking place June 16-19 at the Cobb Galleria Centre, this year’s event features an expanded lineup of educational sessions, hands-on workshops, inspiring main stage speakers, networking opportunities, and an engaging expo floor showcasing the latest technology. Read Now

  • City of New Orleans Launches NOLA Ready Public Safety App Before Super Bowl

    The City of New Orleans Office of Homeland Security and Emergency Preparedness (NOHSEP) is pleased to announce the official launch of the NOLA Ready Public Safety App, powered by Motorola Solutions. This new mobile application is designed to enhance public safety and emergency preparedness for both residents and visitors. All individuals planning to attend major events in New Orleans, including the Super Bowl, Mardi Gras, and other large gatherings, are encouraged to download the app. Read Now

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.