Mar 25
​Optimizing Windows Performance: Configuration for High-Memory Systems

​Why This Matters for System Performance

Windows relies on a process named svchost.exe to manage system services efficiently. In earlier versions of Windows, multiple services were grouped into a single svchost.exe process to reduce memory usage. However, as system memory has increased over the years, this default behavior can sometimes lead to performance bottlenecks, crashes, and debugging difficulties when too many services are bundled together.

By adjusting a Windows registry setting, your workstation/laptop can optimize performance by ensuring services run in separate processes. This improves system stability, security, and troubleshooting while making better use of available RAM.

How To?

SvcHostSplitThresholdInKB is a Windows registry setting that defines the memory threshold split into separate processes. By increasing this threshold, you can prevent too many services from running in a single service instance, which improves system performance and stability, especially on high-memory machines.

Step 1: Open Registry Editor

  1. Press Win + R, type regedit, and press Enter.

Step 2: Navigate to the Registry Key

  1. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control

Step 3: Modify or Create SvcHostSplitThresholdInKB

  1. Look for SvcHostSplitThresholdInKB in the right pane.
  2. If it does not exist, create a new DWORD (32-bit) Value:
    • Right-click ControlNewDWORD (32-bit) Value.
    • Name it SvcHostSplitThresholdInKB.

Step 4: Set the Value

  1. Double-click SvcHostSplitThresholdInKB.
  2. Select Decimal and enter the value from the table above based on your system RAM.

The following are recommended values based on RAM by using the table below to determine an optimal configuration based on your available system memory:

Memory RegEx.png
System RAMValue data:Value Data: (Hexadecimal Value)
4 GB4,096 KB1000
8 GB8,192 KB0x2000
16 GB16,384 KB0x4000
24 GB25,165,824 KB0x1800000
32 GB33,554,432 KB0x2000000
64 GB67,108,864 KB0x4000000

 

  1. The higher your RAM, the more memory Windows can allocate before splitting services into separate processes. For systems with 16GB or more RAM, increasing this threshold can enhance performance.
  1. Click OK to save.

Step 5: Restart Your PC

For the changes to take effect, restart your computer.

Is This Setting Right for You?

Adjusting SvcHostSplitThresholdInKB is beneficial if:

  • You have 16GB or more RAM
  • You experience service crashes due to too many processes running under svchost.exe
  • You want better system diagnostics by isolating critical services

However, if you have low RAM (8GB or less), increasing this value may lead to higher memory usage without noticeable performance improvements.

Final Thoughts

In conclusion, adjusting the SvcHostSplitThresholdInKB is an effective way to improve stability and performance on high-memory systems. For Windows machines with 16GB or more of RAM, this registry tweak allows for better distribution of system services, enabling more efficient memory allocation and enhanced overall performance.

Mar 21
158 Years in Business—Gone in One Cyberattack.

Another day, another devastating cyberattack—one that serves as a brutal reminder of the cybersecurity risks businesses face.

A 158-year-old company, Knights of Old (1865–2023)—great name, tragic ending—was completely wiped out by a single ransomware attack.

The aftermath?

  • Files encrypted
  • Financial systems wrecked
  • 700 employees out of work
  • A $100-million-a-year business reduced to a statistic

They refused to pay the ransom, knowing there were no guarantees they'd get their data back even if they did. Instead, they turned to their backups—only to discover the attackers had destroyed those too. This is one of the most common and catastrophic attack vectors.

And how did the hackers get in? Brute-force password guessing. No zero-days. No nation-state-level tactics. Just poor security hygiene and a lack of detection and response.

Even with a $1 million cyber insurance policy, there was no coming back. Cyber insurance is not a silver bullet. It won't save a business that's lost everything.

Think this won't happen to you? It will. This keeps me up at night, and it should do the same for you. These aren't just startups running on a shoestring budget—many of the victims are well-established companies with extensive operations, long-standing partnerships, and deep industry roots.

The lesson?

Weak passwords and poor security fundamentals can still bring down giants. Brute-force attacks aren't sophisticated, but without strong detection, response, and secure backups, they're still devastating.

Your backups are your company's lifeline in a ransomware attack. And if they're not properly protected, they're worthless.

At Myota, we secure backup data in a way that neutralizes all ransomware attack vectors, ensuring your data is trustworthy and accessible when you need it most. Learn more at https://Myota.io.

What are you doing to mitigate risk from the network? Let's talk.​

Mar 14
Hackers Are Exploiting reCAPTCHA to Spread Malware – How to Stay Safe

Verifying that you're not a robot online can be an inconvenience, but now it can also be a security risk. Cybercriminals have found a way to manipulate seemingly benign CAPTCHAs to distribute malware, putting unsuspecting users in harm's way.

Understanding CAPTCHAs and reCAPTCHAs

A CAPTCHA (Completely Automated Public Turing Test to tell Computers and Humans Apart) is a widely used security feature designed to distinguish human users from bots. These tests, such as typing distorted characters or selecting images from a grid, are commonly found on websites to prevent automated attacks.

reCAPTCHA, an advanced form of CAPTCHA which simplifies this process by requiring users to identify objects in images or confirm their human presence with a simple checkbox. While these measures have been effective in reducing spam and bot activity, hackers have now found a way to weaponize them.

How Hackers Are Exploiting reCAPTCHAs

According to a recent report by Malwarebytes, attackers are using reCAPTCHAs to trick users into executing malicious commands. Initially, these scams targeted specific companies, but they have since become widespread, making anyone a potential victim.

The attack typically begins when a user visits a compromised website promising access to movies, music, news articles, or other enticing content. When prompted to complete a CAPTCHA verification, users unknowingly initiate a malicious process.

Upon clicking the verification checkbox, a message appears, instructing users to perform another series of verification steps such as copying and pasting copied content into another box, etc. These steps, seemingly harmless, however this can execute a hidden command from the clipboard, which downloads and installs malware onto the victim's computer.

The Malware Threat

Once the malicious script is executed, different types of malware can be installed. Malwarebytes has identified two prominent threats:

  • Lumma Stealer: An info-stealing malware that extracts browser data, two-factor authentication (2FA) codes, and cryptocurrency wallet credentials.
  • SecTopRat: A remote access trojan (RAT) that grants cybercriminals control over an infected system, allowing them to steal data and execute additional malicious activities.

How to Stay Safe

To protect yourself from falling victim to these deceptive tactics, follow these cybersecurity best practices:

1. Be Cautious of CAPTCHA Requests

  • While CAPTCHAs are common on high-traffic websites, smaller or unfamiliar sites rarely require them. If a site unexpectedly prompts you for CAPTCHA verification, proceed with caution.
  • Avoid engaging with CAPTCHAs that request unusual actions, such as keyboard shortcuts or command executions.

2. Use Reputable Security Software

  • Install and maintain up-to-date antivirus software to detect and block malicious threats.
  • Consider using browser security extensions that identify and prevent access to phishing and malware-laden sites.

3. Disable JavaScript (With Caution)

  • Since this attack exploits JavaScript to manipulate clipboard actions, disabling JavaScript in your browser can prevent such exploits.
  • However, turning off JavaScript may break essential website functionalities. If you choose this route, consider using site-specific permissions rather than disabling JavaScript entirely.

4. Stay Informed and Practice Good Cyber Hygiene

  • Cybercriminals constantly evolve their tactics, so staying updated on new threats is crucial.
  • Regularly update your operating system, web browser, and security software to protect against vulnerabilities.
  • Be skeptical of online prompts requiring unusual or unexpected interactions.

Final Thoughts

Cybersecurity is a never-ending battle between security professionals developing protective measures and cybercriminals finding new ways to bypass them. The emergence of CAPTCHA-based malware attacks is a reminder that even widely trusted security tools can be exploited by bad actors.

To stay ahead of these threats, it's crucial to remain vigilant and adopt proactive security habits. Always double-check website URLs, be cautious when prompted to complete verification steps that involve unusual actions—such as copying and pasting text into system dialog boxes—and use reputable security software to detect and block potential threats.

Additionally, keeping your operating system, browser, and security tools up to date ensures you have the latest protection against evolving attack methods. Educating yourself and others about these scams can also go a long way in preventing malware infections.

By staying informed, practicing good cyber hygiene, and maintaining a healthy level of skepticism online, you can significantly reduce the risk of falling victim to these increasingly sophisticated attacks.

 


Mar 04
Full vs. Incremental Backups: Balancing Efficiency and Risk

When it comes to data protection, choosing the right backup strategy can mean the difference between a smooth recovery and a catastrophic data loss. The two most common approaches—full backups and incremental backups—each offer advantages, but they also come with risks that organizations must consider.

If you have the storage space, should you rely on full backups for simplicity or use incremental backups to save time and resources? More importantly, what are the hidden dangers of incremental backups? Let's explore the pros, cons, and best practices for balancing efficiency and reliability.

What Are Full and Incremental Backups?

Full Backups: The Gold Standard of Data Protection

A full backup captures all data at a specific point in time, creating a complete copy that can be restored independently.

Pros of Full Backups:

  • Quick and efficient recovery process – Fast and straightforward recovery
  • No reliance on prior backups – minimizing risks of data corruption
  • Ideal for compliance – Ideal for compliance, long-term storage, and security

Cons of Full Backups:

  • Requires more storage – If you have the space, it's a good opportunity to keep comprehensive backups
  • Takes longer to complete a backup – While it's more time-consuming, the process ensures all data is included at once.
  • Puts a higher load on systems during backup – This may impact performance temporarily, but it guarantees you have a complete, up-to-date snapshot

An incremental backup only stores changes made since the last backup, whether full or incremental. This minimizes backup time and storage usage but complicates the recovery process.

Pros of Incremental Backups:

  • Reduces storage needs and backup time
  • Minimizes system impact during backup operations
  • Ideal for frequent backups (e.g., hourly or daily snapshots)

Cons of Incremental Backups:

  • Slower recovery time – The last full backup plus all incrementals must be restored in sequence.
  • Higher risk of data loss – If one incremental backup is lost or corrupted, all backups afterward could be useless.
  • Complex management – Long incremental chains require careful monitoring to prevent failures and increases the likelihood of mistakes during the recovery process.
  • Harder to meet your RTO requirements – The longer the incremental chain, the more difficult it becomes to restore data quickly and meet recovery time objectives (RTO).

The Risks of Relying on Incremental Backups

While incremental backups offer efficiency, they introduce serious risks that can impact data reliability.

Single Point of Failure in the Backup Chain

Incremental backups depend on a sequence of previous backups. If any backup in the chain is lost or corrupted, it can render the entire dataset unrecoverable. This risk increases as the chain grows longer.

Slow and Complex Recovery

Unlike full backups, which restore in one step, recovering from incremental backups requires restoring the last full backup and every incremental backup taken since. This can take hours—or even days—depending on the number of incrementals.

Higher Risk of Corruption Over Time

Incremental backups accumulate over time, meaning even a minor corruption in one incremental file can affect all subsequent backups. Hardware failures, ransomware, or accidental deletions can make an entire backup chain unusable.

Data Fragmentation and Versioning Issues

Since each incremental backup contains only the changed data, files can become scattered across multiple backup files, leading to inconsistent recovery points and version confusion.

Increased Management Overhead

IT teams must carefully monitor backup chains, conduct integrity checks, and periodically refresh full backups to avoid excessive dependency on old incrementals.

What the Research Says

A recent study published in the Software Quality Journal titled "Periodic and Random Incremental Backup Policies in Reliability Theory" by Xufeng Zhao et al. analyzed the reliability of incremental backup strategies in 24/7 database environments.

  • The study found that long incremental backup chains increase failure risks, especially when backup intervals are poorly managed.
  • It emphasized the need for regular full backups to break incremental chains and improve reliability.
  • It also highlighted the importance of integrity checks to detect corruption before recovery is needed.

For organizations relying heavily on incremental backups, this study reinforces the importance of a structured backup schedule and proactive monitoring.

The Best Approach: Hybrid Backup Strategy

To maximize both efficiency and reliability, a hybrid backup approach is ideal:

Perform full backups weekly and monthly to ensure a clean and independent recovery point.

Use incremental backups daily or hourly to capture frequent changes.

Keep incremental chains short (e.g., limit to a week before another full backup).

Run regular integrity checks to detect corruption early.

Use object storage with deduplication (e.g., Myota) to reduce storage overhead while maintaining frequent full backups.

Backup Schedule Here's a simple schedule for your backup strategy:

  • Day 1 (Sunday): Full Backup
  • Day 2–6 (Monday–Friday): Incremental Backups
  • Day 7 (Saturday): Incremental Backup – Monthly Full Backup & Archival

Monthly Process

  • The first full backup of the month is archived for long-term storage.
  • All incremental backups reset after the monthly archival, and the cycle repeats.
https://media.licdn.com/dms/image/v2/D5612AQG57kq1rS-ZOQ/article-inline_image-shrink_1000_1488/article-inline_image-shrink_1000_1488/0/1739303960828?e=1746662400&v=beta&t=Fc-gMD_RrSzAr2C9lV-6NSONHCwv7WBmS1KWGW4JSjk

Final Verdict: Full or Incremental?

  • If fast recovery and reliability are your top priorities (RTO) – Use full backups with limited incrementals.
  • If storage and efficiency are your main concerns – Use incremental backups with regular full backups to reset the chain.
  • If disaster recovery time is critical – Keep multiple full backups readily available.

Ultimately, a backup is only as good as its ability to restore your data when you need it most. Regularly test your backups, monitor for corruption, and don't rely solely on incrementals.

Mar 04
The Critical Role of Traditional Backups in Data Protection Beyond Replication

​Modern storage solutions that leverage native data replication services offer crucial real-time recovery capabilities for disaster recovery (DR) scenarios. However, replication alone is not enough to protect against malicious threats like ransomware. While replication ensures business continuity by maintaining up-to-date copies of data across multiple sites, it does not prevent ransomware from spreading or data from being intentionally destroyed. This highlights the importance of traditional backups as a key part of a comprehensive data protection strategy, ensuring both short-term and long-term data retention and protection against such threats.

The Risks of Solely Relying on Replication

1. Propagation of Encrypted Data Across Sites

  • If ransomware infects the primary site, replicated data may also become encrypted, spreading the attack across secondary and tertiary sites.
  • Continuous and near-synchronous replication can exacerbate this issue by instantly transferring compromised data before anomalies are detected.

2. Deletion of Snapshots and Backup Copies

  • Advanced ransomware attacks now target snapshots and backups, attempting to delete or encrypt them before executing a broader attack.
  • Without isolated backups, ransomware can destroy all recovery points, even by passing some immutable policies through advanced attacks.

3. Compromise of Storage Management Interfaces

  • Attackers gaining access to storage management systems can manipulate replication settings, delete volumes, or forcefully replicate corrupted data across sites.

4. Credential Theft and Privilege Escalation

  • If attackers acquire administrative credentials, they can modify replication configurations, delete snapshots, or override healthy copies.

5. Latency in Detection and Response

  • Replication does not validate data integrity; if ransomware lies dormant, it can replicate unnoticed, making recovery difficult once encryption is triggered.

The Importance of Traditional Backups for Data Retention

Replication plays a crucial role in disaster recovery, however a robust data protection strategy must incorporate traditional backups that provide:

  • Short-Term Retention: Fast recovery points from recent data to restore operations quickly.
  • Long-Term Retention: Historical copies that allow restoration beyond ransomware dwell times or long-tail data loss scenarios.

Best Practices for Mitigating Ransomware Risks

Ransomware attacks come in various forms, each with unique methods of targeting victims. Some ransomware encrypts files and demands payment for decryption, while others may lock entire systems or delete data entirely. Variants like double extortion involve stealing sensitive data and threatening to release it unless paid. Ransomware-as-a-service enables criminals to use pre-made kits, while wiper ransomware destroys data permanently rather than encrypting it. These diverse tactics make ransomware unpredictable and highly dangerous.

Organizations face a broad spectrum of cyber threats that can compromise data security, disrupt operations, and lead to financial or reputational harm. From encryption-based ransomware to vulnerabilities in the supply chain, these threats target data in many ways, affecting its integrity, availability, and confidentiality. Below are some of the most common threats organizations face today.

  • Ransomware Encrypts data and demands payment to unlock it. Variants include encryption-based, locking systems, or deleting data.
  • Data Theft Stealing sensitive data through methods like phishing, credential stuffing, or insider threats.
  • Data Corruption Attacks that alter or delete data, such as SQL injections or poisoning data used in AI systems.
  • Malware Software like Trojans or spyware that steals or damages data.
  • DDoS Attacks Overloading systems to cause downtime and prevent access to data.
  • Supply Chain Attacks Attacking third-party vendors or software to gain access to customer data.
  • Cloud & SaaS Attacks Hacking cloud accounts or exploiting weak security settings.
  • Zero-Day Exploits Exploiting unknown software vulnerabilities before patches are available.

Best Practices for Mitigating Ransomware Risks

Best practices for mitigating ransomware risks include regularly backing up critical data, ensuring backups are offline or in a separate network, and keeping software and systems up to date with the latest patches.  Additionally, implementing network segmentation and employing advanced endpoint protection can help detect and block ransomware before it spreads.

1. Implement Immutable and Air-Gapped Backups

  • Use technologies such as Myota to create immutable, tamper-proof backups.
  • Maintain air-gapped or logically isolated copies that ransomware cannot access.

2. Adopt a Tiered Backup Strategy

  • Short-Term: Maintain snapshots with retention lock to recover from recent incidents.
  • Mid-Term: Store backup copies in an isolated recovery environment (IRE) to provide resilience against ransomware propagation.
  • Long-Term: Use offline or WORM (Write Once, Read Many) storage solutions like Myota with extended retention to protect against delayed ransomware activation.

3. Enable Behavioral and Anomaly Detection

  • Deploy tools to monitor for encryption patterns, unauthorized access attempts, and unusual data changes before replication occurs.

4. Introduce Delayed Replication Strategies

  • Instead of real-time replication, configure asynchronous replication with a delay to allow time for threat detection and rollback.
  • Maintain multiple backup recovery versions to restore data before an attack occurred.

5. Strengthen Access Controls and Zero Trust Security

  • Implement strict Role-Based Access Control (RBAC) and Multi-Factor Authentication (MFA) for storage and backup management.
  • Utilize "Four-Eyes Approval" (dual-admin authorization) for critical changes to replication and backup settings.

6. Regularly Test Backup Integrity and Recovery Readiness

  • Conduct frequent recovery drills to validate that backups are clean, uncorrupted, and readily available for restoration.
  • Automate integrity checks to detect potential ransomware infection before restoring backups.

Conclusion: A Layered Approach to Data Protection

While site replication ensures rapid recovery in traditional disaster scenarios, it is not a defense against ransomware or other cyberattacks. In the event of a ransomware attack, replicated data can easily become encrypted or corrupted, spreading across multiple locations and rendering replication ineffective for recovery. Additionally, replication does not protect against human error, accidental deletions, or other forms of data corruption, which limits its ability to act as a comprehensive recovery solution.

Traditional backups, however, are crucial for defending against ransomware and other risks. Backups with immutability, air-gapping, and extended retention provide secure, unaltered copies of data that are essential for recovery, even in the case of an attack. Without proper backups, organizations risk losing access to critical data, facing prolonged downtime, or suffering long-term financial and reputational damage. Moreover, the absence of robust backup solutions leaves organizations exposed to risks such as accidental data deletion, insider threats, or data corruption from system failures, all of which could be mitigated through secure backup practices.

To ensure comprehensive data protection, organizations should adopt a layered security strategy. This approach combines the rapid recovery capabilities of site replication with robust backup solutions and proactive threat detection. By integrating these layers, businesses can minimize the risk of data loss, reduce downtime, and maintain business continuity, regardless of the threat or incident type.

Mar 08
The Rising Threat of Ransomware: Understanding its Dangers
In today's digital age, the threat of ransomware looms larger than ever before. Ransomware attacks have become increasingly prevalent, targeting individuals, businesses, and even critical infrastructure. Understanding the dangers posed by ransomware is crucial for safeguarding against this pervasive threat.

Ransomware is a type of malicious software designed to encrypt files on a victim's computer or network, rendering them inaccessible. Once the files are encrypted, the attackers demand a ransom payment in exchange for providing the decryption key or the theft of the sensitive data. Cybercriminals may threaten to leak this data unless a ransom is paid. This form of cyber extortion has become a lucrative business for cybercriminals, with ransom payments often demanded in cryptocurrency to maintain anonymity.

The fallout from a ransomware attack can tarnish an organization's reputation and erode customer confidence.  Ransomware attacks often result in significant financial losses for individuals and businesses. Organizations may incur additional costs associated with downtime, data recovery, and cybersecurity remediation efforts.

Ransomware attacks often exploit vulnerabilities in an organization's cybersecurity defenses. These incidents serve as a wake-up call, highlighting the need for robust security measures, regular software updates, and employee training to mitigate future risks.  Prevention is key when it comes to defending against ransomware attacks. Here are some essential steps organizations and individuals can take to protect themselves.

Backup Data Regularly - Maintain regular backups of critical data and ensure they are stored securely offline. This can help mitigate the impact of a ransomware attack by allowing for the restoration of encrypted files without paying the ransom.

Implement Security Measures - Deploy robust cybersecurity solutions, including firewalls, antivirus software, and intrusion detection systems. Keep software and operating systems up to date with the latest security patches to address known vulnerabilities. 

Educate Employees - Train employees on cybersecurity best practices, such as recognizing phishing emails, avoiding suspicious links, and practicing good password hygiene. Human error remains a significant factor in ransomware attacks, making employee awareness crucial. 
Exercise Caution - Exercise caution when downloading files or clicking on links, especially from unfamiliar or suspicious sources. Be wary of unsolicited emails, messages, or attachments, as they may contain malware.  Make this part of your yearly cybersecurity training!

Develop an Incident Response Plan - Prepare an incident response plan outlining the steps to take in the event of a ransomware attack. This should include procedures for isolating infected systems, notifying relevant stakeholders, and coordinating with law enforcement and cybersecurity experts. Make this part of your continuity and BC/DR plan!

Engage in Threat Intelligence - Stay informed about the latest ransomware threats and tactics through threat intelligence sources. Understanding the evolving landscape of ransomware can help organizations better anticipate and mitigate potential risks.

The take away here is that ransomware poses a significant and evolving threat to individuals, businesses, and critical infrastructure. By understanding the dangers of ransomware and implementing proactive cybersecurity measures, organizations can better protect themselves against this pervasive threat and minimize the potential impact of attacks.

Feb 14
I Love You...
​I found myself engaged in a nostalgic conversation with a colleague about the "I Love You" Virus. Ah, those were memorable times, weren't they?

In the realm of digital romance, where bytes replace roses and algorithms whisper sweet nothings, one particular declaration of love left an indelible mark on the history of cybersecurity. Just over twenty years ago, the world was swept up in the throes of the "I Love You" bug, a malicious code masquerading as a heartfelt message, spreading like wildfire through email inboxes and bringing chaos in its wake.

It was May 5, 2000 when unsuspecting users around the world was greeted by an email with a subject "I Love You." Little did any of us know that opening this seemingly affectionate note would unleash a digital plague of epic proportions? Concealed within was a Visual Basic script that quickly proliferated by overwriting files, stealing passwords, and wreaking havoc.

In the aftermath of the chaos, the true extent of the damage became apparent. Estimates suggested that the "I Love You" bug caused billions of dollars in damages, paralyzing businesses, governments, and individual users alike. From corporate networks to personal computers, no system was immune to its charms.

Yet, amidst the chaos, lessons emerged. The "I Love You" bug served as a wake-up call, highlighting the vulnerability of interconnected systems and the importance of robust cybersecurity measures. Organizations and individuals scrambled to bolster their defenses, implementing antivirus software, firewalls, and user education programs to mitigate the risk of future attacks.

Moreover, the "I Love You" bug underscored the evolving nature of cyber threats, demonstrating that malicious actors could weaponize even the most innocuous of messages for nefarious purposes. It paved the way for greater awareness of social engineering tactics and the need for vigilance in an increasingly digitized world.

Two decades later, the legacy of the "I Love You" bug endures as a cautionary tale, a reminder of the power of love, both genuine and malicious, in the digital age. It serves as a testament to the resilience of cybersecurity professionals and the ongoing battle to stay one step ahead of cyber threats.

As we reflect on the events of May 2000, let us not forget the havoc wrought by a simple declaration of love gone awry. And let us remain ever vigilant, lest history repeat itself in a new guise, reminding us that in cyberspace, love may conquer all, but vigilance is the ultimate defense.
Feb 28
The Rise of Ransomware: A Growing Threat to Digital Security

​The rise of ransomware can be attributed to several factors. First, world conflict has certainly led to intensified cyber-attacks and the exponential growth of digital communication and storage has created a vast landscape of potential targets.

Second, the increasing sophistication of ransomware attacks, often involving social engineering techniques, has made it easier for attackers to gain access to sensitive information and the means to force payment through cryptocurrencies has made it easier for attackers to remain anonymous and avoid detection. Ransomware attacks are usually carried out through phishing emails, infected downloads, or vulnerabilities in outdated software. Once the ransomware is installed on the victim's device, it can spread to other data on the same network, making it a particularly dangerous threat to the enterprise.

Ransomware attacks can have severe consequences for victims. In addition to the loss of data, companies may face significant financial losses and reputational damage. Governments may also experience disruptions in critical infrastructure, leading to potential public safety concerns. According to the IBM and the Ponemon Institute, the average data breach cost in 2022 was 4 million dollars USD.

Preventing and mitigating ransomware attacks requires a multi-pronged approach. Companies and individuals should take steps to secure their networks and data, including implementing robust password policies, regularly backing up data, and using antivirus software. In addition, education and awareness campaigns can help to reduce the risk of falling victim to social engineering techniques used in ransomware attacks.

One of the most effective means to protect your sensitive data is to use a data at rest encryption for your storage mediums such as file servers and cloud storage locations.

In addition, using a process known as sharding can provide excellent resiliency to protect your data by dividing it into smaller parts called shards. Each shard will only contain a portion of that file/data, so that even if one shard is compromised, the entire file process provides resiliency from ransomware and data exposure by the bad guys. This process also uses encryption keys employing strong encryption algorithms such as AES-256 to encrypt the sensitive data before storing it in the storage medium thus ensuring that only authorized users can access the data.

Together, data at rest encryption and sharding can provide a high level of security for sensitive data. 

This ensures that even if the data is stolen, it will be unreadable to unauthorized users and thus personally identifiable information (PII) can't be shared to the world. This also helps organizations greatly improve their compliancy requirements for data protection laws such as GDPR, POPIA, CCPA/CPRA, etc.

STEP 1 should include the use of a technology that provides at rest encryption for your sensitive data significantly minimizing the bad guy's access to your organizations crown jewels. Coupled with a technology that provides sharding which by its nature provides point-in-time recovery; this assures productivity even in what may seem the worst of times. Make this part of your Zero Trust approach.

Feb 01
Export as CSV File (Spirion Agent)

The Spirion Agent UI allows the export of data in CSV format.  If the “Save as CSV" option is not present its necessary to alter a registry key to enable it.


  • ​HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Identity Finder\Client\Settings\Save\Disable
  • Set this key to a value of 0
    • disableFeature_SaveInClearText

Once you reopen the Spirion Agent you will see the option to save as a .csv.

You can also import the following registry to add the key for the Spirion client.​

Save as .csv Reg.reg

​Reference:

http://www.identityfinder.com/help/client_win/index.htm#saving_results.htm?TocPath=Saving%2520and%2520Loading%257C_____1

Jul 20
SharePoint Modern Authentication

Using the Sensitive Data Manager Agent version 11.8.2 or later provides support for SharePoint on premise and online Modern Authentication.  This is a more secure way than using Basic Authentication.  The following Microsoft guide provides guidance to setup the SharePoint app-only principal to use Modern Authentication with other technology integrations.

You will first need to grant access using SharePoint App-Only by following either the Microsoft documentation or by the following.

​Navigate to your SharePoint site using the following URL to generate the required Client Id and Client Secret -  https://contoso.sharepoint.com/_layouts/15/appregnew.aspx​

  • ​Click both the Generate buttons to create the Client Id and Client Secret​​
  • Add the appropriate information in the following fields.
    • Example
      Title:
      SharePoint App

      App Domain:
      coryretherford.com

      Redirect URI:
      https://coryretherford.com​


Note*

  • If you receive a SharePoint permissions access error when accessing the https://contoso.sharepoint.com/_layouts/15/appregnew.aspx URL then use the below URL instead.
    • https://contoso-admin.sharepoint.com/_layouts/15/appregnew.aspx
As indicated in the below image:
  • Input the generated Client Id: into the Spirion Identity Provider Id field.
  • Input the generated Client Secret: into the Spirion Password field.
    • ​​*Note – the username is not needed and will result in error if added.
SharePointModernAuthSPirion.png
1 - 10Next
Copyright © | CoryRetherford, LLC | Contact MeNetwork Storage and Security Solutions, LLC, Rights Reserved.®
TLS 1.2, AES with 256 bit encryption

 ‭(Hidden)‬ Blog Tools