CIO Influence
CIO Influence News Cloud Security

Data Encryption Cyber Security Software Firm, DAtAnchor, Inc., Deploys Unique Capabilities

Data Encryption Cyber Security Software Firm, DAtAnchor, Inc., Deploys Unique Capabilities
DAtAnchor deploys unique data encryption features that can prevent data stolen during a Doxware Ransomware attack from being used.
DAtAnchor: Crypto-Technology for Ransomware and Doxware Protection

Ransomware is used to lock up data and make organizations pay a ransom to regain access. Ransomware has now evolved into something even more dangerous called Doxware. A Doxware attack not only keeps your data from you, but also threatens to publish the most sensitive data on Leak Sites or the Dark Web unless you pay a ransom. “Even then, organizations will never really know if their data will be ransomed again after being extorted the first time,” said Jake Cleveland, General Manager at DAtAnchor. Unless you deploy a Zero Trust security plan with solutions providing Revocable Access Data Security, it’s nearly impossible to stop sensitive data from being stolen from your organization. DAtAnchor provides a solution that can be implemented quickly and begin protecting your data immediately.

Recommended ITech News: Menlo Micro Launches Industry’s First 40 Gbps DPDT Differential Switch for High-speed Switching Applications

Built on a Zero-Trust framework, DAtAnchor has developed a crypto security technology designed to allow data security to travel with the data, while providing an organization full data governance control and automatic revocation. Should data be used outside of the organization’s governance of use perimeters, the data is automatically rendered un-readable as ciphertext. DAtAnchor also provides geofencing and geolocation for data. This is critical in preventing data loss from cyber criminals who utilize Ransomware and Doxware attack techniques. In addition, DAtAnchor deploys light-weight Data Security Agents or DSAs. The DSA interprets encryption type and any access control authorizations of the data, and can unlock the encryption keys for authorized users. These DSAs have a unique certificate of authenticity – this means data without the correct DSA is unreadable, providing yet another security authentication layer to keep your data safe.

Recent Ransomware attacks at Colonial Pipeline and Quanta Computer demonstrate the need for a sophisticated Zero Trust technology. “These attacks cripple businesses of all sizes and industries,” said Chris Mills of Strategic Communications, a DAtAnchor Partner. “Of the total number of organizations that paid the ransom, only 8% retrieved all of their data.”

Recommended ITech News: SqlDBM Achieves SOC 2 Type II Compliance for Secure and Operationally Effective Cloud Services

Related posts

Key Takeaways from Day 1 at Qualtrics X4

CIO Influence Staff Writer

Configit Ace Now Available in the Microsoft Azure Marketplace

PR Newswire

SafeGuard Cyber Announces New CEO

CIO Influence News Desk