• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Colorado’s CTO emphasizes on layered security

November 18, 2018Simeon Georgiev

In February 2018, Colorado’s Department of transportation became the first major ransomware casualty of the year. Cryptovirological attackers targeted the department’s server with a variant of SamSam ransomware.  The administration had to go offline while experts were dealing with ransomware removal and recovery measures. The administration should be applauded for they didn’t go into negotiations with the attackers for ransomware removal.

Colorado’s CTO (Chief Technology Officer) David McCurdy recently attended National Association of State Chief Information Officers (NASCIO) conference where he extensively talked about the changing landscape of organizational cybersecurity particularly after the infamous ransomware attack on CDOT.

No foolproof security

McCurdy has acknowledged that even after the attack the state is struggling to devise a foolproof security system. Working out a 100 percent foolproof digital security system in this time and age has become virtually impossible. So, security experts can only strive for anything close to an ideal cybersecurity regimen.

Improved awareness and investment

McCurdy also thinks that that state machinery is now taking cyber threats more seriously. Six years ago, Colorado government allocated a mere $6,000 dollars for the cybersecurity of the statewide digital systems. And now the budget promises a supplementary grant of $9.8 million for cybersecurity. He has also talked about how the governor and key state legislators are on board to revamp the cybersecurity of the state’s digital front.

The need for layered security protocols

Colorado’s CTO also believes that the organizations and governments must upgrade to multi-layered security from the existing archaic unidirectional protocols. Layered security arrangement can help in materializing the three basic elements for securing valuable digital assets in their most optimal form. These three elements are prevention, detection, and response. Any cyber attack including ransomware can be dealt with in a better manner only if these three elements could be modernized accordingly.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post SymmyWare ransomware Next post Hidalgo County hit by ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.