<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Backups Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/backups/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/backups/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 24 Jun 2021 13:55:38 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Backups Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/backups/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 083 HSE Ransomware Update</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 01:15:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backup Strategy]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Encryption Key]]></category>
		<category><![CDATA[HSE]]></category>
		<category><![CDATA[HSE Ransomware Update]]></category>
		<category><![CDATA[HSE Update]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Ransomware Incident]]></category>
		<category><![CDATA[Ransomware Key]]></category>
		<category><![CDATA[Ransomware Update]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2546</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 83. This week we&#8217;re going to talk about HSE Ransomware Update. This is a quick HSE Ransomware Update At the time of recording, we&#8217;re just one day shy of it being 5 weeks since we learned of the devastating impact of the HSE ransomware incident. To all of those experts that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/">#WeekendWisdom 083 HSE Ransomware Update</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 83. This week we&#8217;re going to talk about HSE Ransomware Update.</p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2546-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4</a></video></div>
<h3>This is a quick HSE Ransomware Update</h3>
<p>At the time of recording, we&#8217;re just one day shy of it being 5 weeks since we learned of the devastating impact of the HSE ransomware incident. To all of those experts that were on TV, Radio, Newspapers and other online media who were saying &#8220;Just pay the ransom and we&#8217;ll get back up and running.&#8221;</p>
<p>Here we are 5 weeks later and they&#8217;re still not back up and running. That&#8217;s even with them getting the key to decrypt the data within 3 days of the incident. So even having the key, it&#8217;s taking them so much longer to recover.</p>
<h3>Why is it taking so long?</h3>
<p>This is because the HSE has huge, vast quantities of data that needs to be checked and made sure the integrity is perfect. Because you don&#8217;t want your health records to be damaged in anyway, do you? I certainly wouldn&#8217;t. So they have to be so very careful with getting the data back.</p>
<h3>What hope does a small business owner have?</h3>
<p>For smaller businesses, which is where more my focus would be, things can be a lot simpler. It can be a lot easier for you to be able to recover from these type of ransomware incidents, if you put in place a decent backup strategy. I am happy to talk to any small business owner that needs any kind of assistance in making sure they have good backups in place.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<div class="fl-post-meta fl-post-meta-bottom">
<div class="fl-post-cats-tags">Posted in <a href="https://www.l2cybersecurity.com/category/news/" rel="category tag">News</a> and tagged <a href="https://www.l2cybersecurity.com/tag/securitysimplified/" rel="tag">#SecuritySimplified</a>, <a href="https://www.l2cybersecurity.com/tag/weekendwisdom/" rel="tag">#WeekendWisdom</a>, <a href="https://www.l2cybersecurity.com/tag/cdn/" rel="tag">CDN</a>, <a href="https://www.l2cybersecurity.com/tag/cdn-failure/" rel="tag">CDN Failure</a>, <a href="https://www.l2cybersecurity.com/tag/clare/" rel="tag">Clare</a>, <a href="https://www.l2cybersecurity.com/tag/content-delivery-network/" rel="tag">Content Delivery Network</a>, <a href="https://www.l2cybersecurity.com/tag/cyber-security/" rel="tag">Cyber Security</a>, <a href="https://www.l2cybersecurity.com/tag/fastly/" rel="tag">Fastly</a>, <a href="https://www.l2cybersecurity.com/tag/fastly-cdn/" rel="tag">Fastly CDN</a>, <a href="https://www.l2cybersecurity.com/tag/fastly-failure/" rel="tag">Fastly Failure</a>, <a href="https://www.l2cybersecurity.com/tag/internet-down/" rel="tag">Internet Down</a>, <a href="https://www.l2cybersecurity.com/tag/internet-down-situation/" rel="tag">Internet Down Situation</a>, <a href="https://www.l2cybersecurity.com/tag/limerick/" rel="tag">Limerick</a>, <a href="https://www.l2cybersecurity.com/tag/tipperary/" rel="tag">Tipperary</a></div>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-083-hse-ransomware-update/">#WeekendWisdom 083 HSE Ransomware Update</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/06/WeekendWisdom-083-lo.mp4" length="30406366" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 078 Dealing with Ransomware</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-078-dealing-with-ransomware/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 May 2021 01:15:49 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Dealing with Ransomware]]></category>
		<category><![CDATA[Incident Response Plan]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Ransomware handling]]></category>
		<category><![CDATA[Ransomware mitigation]]></category>
		<category><![CDATA[Tested backups]]></category>
		<category><![CDATA[Tested Incident Response Plan]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2518</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 78. This week we&#8217;re going to talk about Dealing with Ransomware. My favourite subject &#8211; NOT! I touched on this back in #WeekendWisdom number 043, but just this week I&#8217;ve seen some posts from IT people and I was also on a webinar this week where there was an IT person&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-078-dealing-with-ransomware/">#WeekendWisdom 078 Dealing with Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 78. This week we&#8217;re going to talk about Dealing with Ransomware.<span id="more-2518"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2518-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4</a></video></div>
<h3>My favourite subject &#8211; NOT!</h3>
<p>I touched on this back in <a href="https://www.l2cybersecurity.com/weekendwisdom-043-paying-the-ransom/" target="_blank" rel="noopener">#WeekendWisdom number 043</a>, but just this week I&#8217;ve seen some posts from IT people and I was also on a webinar this week where there was an IT person that claimed they have cybersecurity skills and they all implied that if you get hit with ransomware that if you just paid the ransom you will be back in business. If you hear somebody say that to you, do not believe them because it is completely false! It is totally wrong! They are lying to you!</p>
<h3>What is the reality in dealing with Ransomware?</h3>
<p>First of all if you do manage to pay the ransom and get your data back, it will take a long time to recover your data, to decrypt all that stuff that&#8217;s been encrypted.</p>
<p>But you might not get your data back at all after paying it. They might not give you the key.</p>
<p>Even if you do get your data back some of it may be corrupted. Particularly if you have large databases.</p>
<p>But even still, if you get the data back, you still have to go through an exercise of sanitizing your complete infrastructure to make sure you remove all traces of the ransomware and any other infections they may have left behind. Any kind of back doors.</p>
<p>A lot of time and effort will be required to recover from a ransomware incident.</p>
<h3>What should you do?</h3>
<p>So if some IT service person says to you &#8220;Ah yeah. Pay the ransom. You&#8217;ll be grand&#8221; They&#8217;re lying. Walk away from them. They haven&#8217;t a clue what they&#8217;re talking about.</p>
<p>What you really need to have in place folks, is have a good backup strategy which is tested. Also have in place incident handling procedures, which you again need to test. Having them in place will help you recover from such an incident much more quickly and easily.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-078-dealing-with-ransomware/">#WeekendWisdom 078 Dealing with Ransomware</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/05/WeekendWisdom-078-lo.mp4" length="36861697" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 046 Securing Backup Servers</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 23:05:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backup Servers]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Development Servers]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Offline Backups]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Securing Backup Servers]]></category>
		<category><![CDATA[Securing Development Servers]]></category>
		<category><![CDATA[Securing Test Servers]]></category>
		<category><![CDATA[Test Servers]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2287</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 46. This week we&#8217;re going to talk about securing backup servers. OK. Who wasn&#8217;t securing backup servers? Earlier this week I was reading a story about a large Canadian second-hand car business which had a data breach involving some 260,000 users. What had happened was that they had a backup server&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/">#WeekendWisdom 046 Securing Backup Servers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 46. This week we&#8217;re going to talk about securing backup servers.<span id="more-2287"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2287-3" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4</a></video></div>
<h3>OK. Who wasn&#8217;t securing backup servers?</h3>
<p>Earlier this week I was reading a story about a large Canadian second-hand car business which had a data breach involving some 260,000 users. What had happened was that they had a backup server that wasn&#8217;t appropriately secured. People were able to get onto that backup server and download the data of all these users.</p>
<p>Basically that business did not appropriately secure the backup server. Maybe they thought &#8220;It&#8217;s a backup server it doesn&#8217;t need that much protection.&#8221; But think about it. A backup server is going to have a lot of your production data.</p>
<h3>So what does it need to set to?</h3>
<p>So the backup server needs to have the same level of security if not more so than your primary servers. Make sure that they are properly secured.<br />
Also with backups, I would also highly recommend having offline copies of the backups. Just in case that backup server ever gets damaged in any way by ransomware. So it&#8217;s important to back those up offline as well.</p>
<h3>Is that all?</h3>
<p>No. It&#8217;s not just backup servers that you need to take consideration of. Things like development servers or test servers. If you have some of those in your environment, they should have appropriate protections on there as well, because maybe they have some test data with actual personal data on them too. So ask your IT or your development team &#8220;Have you put appropriate protections in place on these servers?&#8221;</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>For small business, we can carry out assessments on your server infrastructure and point out discrepancies on the security configurations.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/">#WeekendWisdom 046 Securing Backup Servers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4" length="24796104" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 043 Paying The Ransom</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-043-paying-the-ransom/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 27 Aug 2020 23:05:19 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Clean up]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Digital Forensics]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Paying the Ransom]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2273</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 43. This week we&#8217;re going to talk about Paying The Ransom. What&#8217;s brought you back to your favourite topic? Late last month, the city of Lafayette, in Colorado, USA, suffered a ransomware incident. Now some reporting on this incident indicated that they had paid the ransom because they did not want&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-043-paying-the-ransom/">#WeekendWisdom 043 Paying The Ransom</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 43. This week we&#8217;re going to talk about Paying The Ransom.<span id="more-2273"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2273-4" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-043-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-043-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-043-lo.mp4</a></video></div>
<h3>What&#8217;s brought you back to your favourite topic?</h3>
<p>Late last month, the city of Lafayette, in Colorado, USA, suffered a ransomware incident. Now <a href="https://www.theregister.com/2020/08/10/in_brief_security/" target="_blank" rel="noopener noreferrer">some reporting</a> on this incident indicated that they had paid the ransom because they did not want to go through cleaning up of their systems after the incident.</p>
<h3>Lots of people do that, right? So everyone just gets on with paying the ransom.</h3>
<p>However the <a href="https://cityoflafayette.com/CivicAlerts.aspx?AID=5729" target="_blank" rel="noopener noreferrer">statement on their own website</a> was quite contradictory to that. Yes they did pay the ransom but that was because they hadn&#8217;t adequate backups. So they did a cost benefit analysis and the cost of rebuilding the data as opposed to recovering it through paying the ransom was quite substantial.</p>
<h3>Did they do anything else?</h3>
<p>But they also did a lot of other things right in that incident. The first thing they did was to hire a Digital Forensics expert whose job would be to come in and determine how the incident occurred in the first place so that they could prevent it from happening again and also to determine if any data was breached as result of the incident.</p>
<h3>OK, but they still have dirty machines, right?</h3>
<p>They also then were carrying out cleaning and rebuilding of all affected servers and computers which is really a good idea and I would insist on that.<br />
Also they were looking to improve their backups, so that they would never be in that situation again. So while it&#8217;s regretful that they did have to pay the ransom, they&#8217;re in a better position now for the future.</p>
<h3>What does Paying the Ransom fund?</h3>
<p>When you pay the ransom, you are funding organised crime. You are paying criminals who not only do cyber crime, but also human trafficking, drug smuggling, gun running, child sexual abuse, terrorism, etc. So paying the ransom really should be avoided at all costs. Put in place proper preventative measures to stop it happening.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>. We show people the types of phishing emails that are sometimes used to execute #Ransomware, but more often than not they break into a network through poorly protected Remote Access solutions. So we can advise on how to protect your organisation from these types of risks.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-043-paying-the-ransom/">#WeekendWisdom 043 Paying The Ransom</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/08/WeekendWisdom-043-lo.mp4" length="20835743" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 013 Data Backups</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-013-data-backups/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 31 Jan 2020 13:02:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data]]></category>
		<category><![CDATA[Data Backups]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1826</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 13. This week we&#8217;re going to talk about Data Backups. Why do you need data backups? If you have any computers in your organisation then you will probably have data that you need to backup. Data backups are really crucial to be able to recover your data in case of an&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-013-data-backups/">#WeekendWisdom 013 Data Backups</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 13. This week we&#8217;re going to talk about Data Backups.<span id="more-1826"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1826-5" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-013-lo.mp4?_=5" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-013-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-013-lo.mp4</a></video></div>
<h3>Why do you need data backups?</h3>
<p>If you have any computers in your organisation then you will probably have data that you need to backup. Data backups are really crucial to be able to recover your data in case of an incident such as a fire, flood or ransomware.</p>
<h3>I have somebody responsible for doing my backups</h3>
<p>If you have an IT Department or IT service provider, I suggest that you challenge them to prove to you that they are backing up your data correctly and that the backups are working. That could be getting a monthly log from them to show the backup successes and failures.</p>
<p>Also you should challenge them to prove that they have tested the recovery of data from those backups. They don&#8217;t have to do that every week or every day but perhaps on a monthly basis they could do it or no more than on a quarterly basis that they test the recovery of some of the data.</p>
<h3>I have everything in the cloud, so I&#8217;m OK</h3>
<p>If you depend on the cloud, don&#8217;t just put all your eggs in the one basket and stick things in the cloud and believe they&#8217;re safe. that&#8217;s not always the case, you should have some offline copies of your backup as well.</p>
<h3>Oops &#8211; I have no Data Backups. What can I do?</h3>
<p>So if you have no backup strategy in place at the moment, I would suggest you use a strategy I call 3-2-1-1. That&#8217;s having 3 copies of your data, one of which is your live working copy. The other 2 copies should be on two separate media. So that could be an external hard drive, USB sticks or in the cloud. Then 1 copy should be off-site which could be a cloud copy. Finally 1 copy should be off-line. This means it iss not connected to any computer unless its being backed up to. So that will protect you against Ransomware.</p>
<p>So that&#8217;s it for this week. Let&#8217;s be careful out there and we&#8217;ll talk to you again next week.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">www.L2CyberSecurity.com</a></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-013-data-backups/">#WeekendWisdom 013 Data Backups</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/01/WeekendWisdom-013-lo.mp4" length="25471360" type="video/mp4" />

			</item>
		<item>
		<title>Luas Ransomware Incident &#8211; Offline a while now</title>
		<link>https://www.l2cybersecurity.com/luas-ransomware-incident/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 04 Jan 2019 16:14:55 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1543</guid>

					<description><![CDATA[<p>How did you hear about the Luas Ransomware incident? Was it on the news? Online? Facebook? Twitter? Instagram? Or did you happen to visit the website to check some fare information and get confronted by a very basic ransom demand. Whatever way you found out about it, it happened over 40 hours ago and the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/luas-ransomware-incident/">Luas Ransomware Incident &#8211; Offline a while now</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignleft size-thumbnail wp-image-1544" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-150x150.jpg" alt="Luas Ransomware" width="150" height="150" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-150x150.jpg 150w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware.jpg 300w" sizes="(max-width: 150px) 100vw, 150px" />How did you hear about the Luas Ransomware incident? Was it on the news? Online? Facebook? Twitter? Instagram? Or did you happen to visit the website to check some fare information and get confronted by a very basic ransom demand. <span id="more-1543"></span>Whatever way you found out about it, it happened over 40 hours ago and the website is still unavailable. They say that some <a href="https://www.irishtimes.com/news/ireland/irish-news/over-3-000-luas-user-records-may-have-been-compromised-in-cyber-attack-1.3746674" target="_blank" rel="noopener">3,226 user records</a> may have been compromised in this attack. They have now been contacted and the Data Protection Commission have been notified.</p>
<p>They claim that their <a href="https://payments.luas.ie/" target="_blank" rel="noopener">Standard Fare Notices</a> and <a href="https://taxsavertickets.luas.ie/" target="_blank" rel="noopener">Tax Saver Ticket</a> pages are not affected and are still available. I wonder about this, as I went to the version of their website from <a href="https://web.archive.org/web/20181127011542/https://luas.ie/" target="_blank" rel="noopener">last December</a> and there is no other part of the site there that records personal data. So the data breached must be belonging to those types of people. We&#8217;ll hear soon enough about this. It&#8217;s not what I want to focus on.</p>
<h3>The site has been down for a long time.</h3>
<p>For a company as large as Transdev is, I&#8217;m surprised at how long the home page for their major operation in Ireland has been unavailable. If they were following best practice, then this is, at a high-level, what should have happened on Wednesday night last:</p>
<ol>
<li>Ransomware compromises the web site.</li>
<li>IT team become aware &#8211; incident response effort commences &#8211; server, web and security teams scrambled.</li>
<li>Server(s) disconnected from all networks by physically pulling the network connectors out of the server(s), but they are left powered on.</li>
<li>Security team take a forensic snapshot of the affected server&#8217;s memory and disk. This is a long slow process.</li>
<li>Server team, bring up backup server or request a new server from service provider.</li>
<li>Web team commence restore of the website from most recent backup on that server. Tests that all the pages work.</li>
<li>Replacement server(s) put into production &#8211; website back online.</li>
<li>Once the security team have completed their snapshots of the affected servers, these machines can be wiped and put to use again.</li>
<li>Security team analyse the forensic images to discover source of the compromise and any loss of data. This process could take days and even weeks.</li>
</ol>
<p>Given that the Luas site is pretty basic, step 7 above should easily have been achievable, I think, within 24 hours. Probably even faster if they had a backup server on stand-by, ready to take the restore.</p>
<h3>Why is it taking so long?</h3>
<p>I&#8217;m going out on a limb here. I&#8217;m guessing that they don&#8217;t have decent backups of their website. If they don&#8217;t have that, then they literally have to rebuild it from scratch and this will take time. Probably days.</p>
<p>Perhaps they thought they did have backups, but here&#8217;s the thing. You actually should test your backups occasionally to see if they are working OK. If they never tested that these backups work, they may have discovered that they weren&#8217;t backing up enough and they are going to have to rebuild it from scratch.</p>
<p>With good, tested backups this would not take much time at all.</p>
<h3>How did the Luas Ransomware get in?</h3>
<p>That&#8217;s a good question. We may never find out, but the likely cause is that they had a poorly secured website or webserver. It looks like they use WordPress and if you have a very old version of that, then it is trivial for a hacker to compromise it. The message from the bad guys was interesting:</p>
<p><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-1545" src="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-Message.png" alt="Luas Ransomware Messsage" width="487" height="166" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-Message.png 487w, https://www.l2cybersecurity.com/wp-content/uploads/2019/01/Luas-Ransomware-Message-300x102.png 300w" sizes="(max-width: 487px) 100vw, 487px" /></p>
<p>This person states that he warned the company some time ago that they had vulnerabilities and they never responded. This could be a complete lie, but it&#8217;s also quite possibly true.</p>
<p>Based on the wording of the message above, if I received a similarly worded e-mail, warning me about something wrong on my website, I might dismiss that too. However, I take my website security seriously and keep it updated on a weekly basis. I also back it up daily and finally, I have tested those backups.</p>
<h3>What can you do to avoid such a long outage?</h3>
<p>You don&#8217;t want to be affected by something like the Luas Ransomware do you?</p>
<p>There&#8217;s some simple steps that you can take. Basically keep your <a href="http://www.l2cybersecurity.com/use-automatic-updates/" target="_blank" rel="noopener">website updated</a> regularly and have <a href="http://www.l2cybersecurity.com/iv-thou-shalt-always-backup-thy-data/" target="_blank" rel="noopener">good backups</a> which get tested. There are more, but these two will give you a quick win.</p>
<p>You could also give us a call on <span style="color: #0000ff;">087-436-2675</span> or drop a line to <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a> and we can have a chat about the service that I can provide. We also have some Cyber Security training coming up soon too, which you can <a href="https://www.l2cybersecurity.com/upcoming-public-training-schedule/" target="_blank" rel="noopener">book a place on</a>.</p>
<p>Lets be careful out there.</p>
<p>#SecuritySimplified #GDPR</p>
<p>The post <a href="https://www.l2cybersecurity.com/luas-ransomware-incident/">Luas Ransomware Incident &#8211; Offline a while now</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
