A look at what we have learned one year on from the WannaCry attacks, and what universities can do to prevent a major cyber attack today.
The WannaCry attack last year is estimated to have affected more than 200,000 computers across 150 countries. Shortly after that, several universities in the UK, including UCL and Ulster, reported that they were victims of a ‘zero-day’ ransomware attack that left users locked out of their files.
“While most ransomware attacks are relatively unsophisticated, there is always the potential that the next will be a zero-day attack exploiting a previously unknown security vulnerability,”
Alex Fagioli, CEO of Tectrade gave the example of “a prominent research” university he has worked with that holds large quantities of valuable intellectual property. He explains how they were well aware that they could be the target of a cyber-attack and understood that even with the most sophisticated cyber defence capabilities on the market it is impossible to detect and defeat a zero-day cyber-attack. “For that very reason, they put significant value in implementing a rapid disaster recovery capability as their true last line of defence.”
The university worked with Tectrade to help audit, test and refine their IT infrastructure and policies to make sure their backup and recovery processes were cost-effective and fit for purpose. By doing so, they got the peace of mind that should the worst happen and they were hit by ransomware, they can be back up and running within a matter of hours. Fagioli said: “Furthermore, the project paid for itself as the resulting optimisation of their infrastructure enabled them to defer the purchase of new storage hardware by nine months.”
Read University Business's full article here: https://universitybusiness.co.uk/Article/protecting-the-safety-net