Transitioning from POTS Lines to Modern Telecom Solutions: A Guide for Government Entities

Remember the days of dialing up friends on clunky POTS lines? It’s time to say goodbye to the old and embrace the new in telecom solutions.

Remember the days of dialing up friends on clunky POTS lines? It’s time to say goodbye to the old and embrace the new in telecom solutions. POTS lines include traditional copper-based analog phone service organizations use for voice, elevator phones fax machines, security, fire, and alarm sensor lines to name a few.

For government entities like schools, cities, and counties, transitioning from outdated POTS (Plain Old Telephone Service) lines isn’t just about keeping up with the times—it’s about saving costs, ensuring compliance, and preparing for the future of communications.

POTS Lines are Going Away
Analog phone carriers in the U.S. are no longer required to maintain their networks, guarantee reliability, or keep costs low. This is a result of the recent 19-72 ruling from the Federal Communications Commission (FCC) titled “FCC Grants Relief From Outdated, Burdensome Phone Industry Regulations.”

Copper-based carriers are now free to raise costs at will, reduce reliability SLAs, or even discontinue analog service altogether anytime at their discretion.

Why Upgrade from POTS Lines Now?

Let’s face it: relying on traditional POTS lines is like sticking with your flip phone while everyone else is on smartphones. Costs have skyrocketed, and the reliability of these aging systems is becoming less dependable.

That’s why transitioning to modern, internet-based solutions like VoIP and cloud-based services is not just a trend—it’s a smart move for your budget and your operational efficiency.

Navigating Compliance and Safety

In today’s regulatory landscape, compliance isn’t optional—it’s crucial. Whether it’s fire alarms, security systems, or emergency call boxes, ensuring your systems meet UL, NFPA 72, and ASME A17.1B standards is paramount.

Avoiding penalties and downtime due to outdated technology is a clear incentive to make the switch sooner rather than later.

Transitioning to Modern Telecom Solutions: How to Do It Right

  1. Assess Your Current Setup: Take inventory of your existing POTS lines and understand their usage and locations. Knowledge is power when planning your transition.
  2. Explore Modern Alternatives: Consider solutions that offer reliability and cost-effectiveness in transitioning away from POTS lines. For instance, opting for privately peered solutions ensures unparalleled security and performance.
  3. Plan and Execute: Start planning your transition now to minimize disruptions. Providers like Trinsio offer tailored solutions that keep your operations running smoothly.
  4. Partner with Trinsio: Trinsio is the pioneer in privately peered POTS replacement solutions. Unlike traditional providers, Trinsio’s approach guarantees superior reliability and security for your critical telecom needs.

Why Trust Trinsio for Your Government’s POTS Replacement Needs?

Trinsio leverages over 30 years of experience in network design, cloud technologies, and secure data center operations. Our team is dedicated to delivering reliable POTS replacement solutions tailored to meet the unique needs of government entities.

All of Trinsio’s POTS replacement solutions include an industry-exclusive privately peered connection between the hardware inside your buildings and the POTS replacement service provider.

 This allows Trinsio to provide your organization with increased speed, security, control, and reliability compared to any other POTS replacement solution from any/all other vendors or resellers.

Discover Reliable Telecom Solutions Today

Contact us today to learn how we can help your government seamlessly transition to modern telecom solutions. Let’s work together to ensure continuity and efficiency in your telecommunications infrastructure.

The Advantages of Privately Peered Connections for Critical Internet-connected Security, Alarm, Fire, Elevator and Communications Systems

In today’s digital age, the backbone of our connected world lies in the seamless communication between various internet-connected hardware components and critical systems.

As organizations increasingly rely on these connections, the importance of their speed, security, control, and reliability cannot be overstated. 

Although somewhat rare, special Privately Peered Connections, which involve direct interconnections between networks, offer significant advantages in these areas. 

What are some of the benefits to leveraging private peering when possible?

Speed – Reducing Latency and Enhancing Performance

One of the most immediate benefits of privately peered connections is the significant reduction in latency. When data travels over the public internet, it often takes a convoluted path, hopping through multiple routers and networks before reaching its destination. 

This journey can introduce considerable delays, especially during peak traffic times. In contrast, privately peered connections enable direct data exchange between networks, bypassing the congested public internet.

A direct path minimizes the number of hops and reduces the overall distance data must travel, resulting in lower latency and faster data transfer speeds. 

Faster connections translate to more responsive systems, improved user experiences, and a competitive edge in the market.

Security – Safeguarding Sensitive Data

Security is a top concern for any organization handling sensitive data. When data traverses the public internet, it is exposed to a myriad of potential threats, including interception, hacking, and other forms of cyberattacks. 

Privately peered connections provide a robust security advantage by creating a dedicated, isolated link between networks.

With a privately peered connection, data bypasses the public internet entirely, significantly reducing the risk of interception. This isolation ensures that sensitive information remains within a controlled environment, enhancing overall data security. 

For industries such as healthcare, finance, and government, where data breaches can have severe consequences, privately peered connections offer peace of mind and regulatory compliance.

Control – Customizing Network Management

Control over network management is another compelling reason for privately peered connections. Public internet traffic is subject to the policies and priorities of multiple Internet Service Providers (ISPs), which can lead to unpredictable performance and limited control over routing decisions. 

Privately peered connections, on the other hand, grant organizations greater control over their network infrastructure. You can often tailor their network configurations to suit specific needs, ensuring optimal performance and reliability. 

This control extends to bandwidth allocation, Quality of Service (QoS) policies, and traffic prioritization, allowing organizations to fine-tune their networks to meet the demands of their critical applications.

Reliability – Ensuring Consistent Connectivity

Reliability is a cornerstone of any robust network infrastructure. The public internet, with its susceptibility to congestion, outages, and route changes, can be unreliable for mission-critical use cases. 

Privately peered connections offer a more dependable alternative by providing a stable, dedicated link between networks.

This dedicated connection is less prone to the fluctuations and failures that can plague public internet routes. By reducing the dependency on third-party ISPs, organizations can ensure more consistent and predictable network performance. 

This reliability is particularly crucial for services that require uninterrupted connectivity, such as POTS line replacement solutions, VoIP services, security/fire alarm sensor panels, or online transaction processing systems.

The Trinsio Private Peering Advantage

All of Trinsio’s POTS replacement solutions include an industry-exclusive Privately Peered Connection between the hardware inside your buildings and the POTS replacement service provider.

This allows Trinsio to provide your organization with increased speed, security, control, and reliability compared to any other POTS replacement solution from any/all other vendors or resellers.

This key feature, combined with Trinsio’s preferred pricing status, gives you a better overall solution at unbeatable prices.

Trinsio is focused on empowering you to future-proof your organization’s critical communication systems to handle the demands of tomorrow. 

Contact us today to see how much you could save today on a POTS replacement solution for your organization.

Ransomware Attack in New Mexico: A ‘Gut-Check’ for Local Government Entities

Ransomware Strikes New Mexico

On January 5, 2022 between Midnight and 5:30 a.m. ransomware struck Bernalillo County in New Mexico. The Albuquerque Journal reported that the attack affected “a wide variety of county government operations. Most county buildings were closed” which halted many of the counties operations.

All Bernalillo County websites were offline as a result of the cyber attack which made working with the public very difficult, but most concerning was the way the county-operated jail was affected. Government officials were unable to access cameras which caused inmates to be temporarily limited to their cells. Inmates were also reduced in their access to telephones, tablets, and unable to have visitors. The facility was on lockdown for several days following the attack. 

Bernalillo County was not the first Ransomware attack on a local government entity and certainly will not be the last. These ransomware attacks are frequent and not only disrupt government services but can also compromise data and have significant impacts on local communities.

Ransomware Attacks Targeting Local Government Entities

According to The Washington Post, “in 2019, cybersecurity experts noticed a significant increase in ransomware attacks on municipalities, cities, and towns across the country and these attacks continue to trend upward. Cyber criminals target local governments because oftentimes these organizations have limited personnel, equipment, budget, and resources to devote to cybersecurity. 

The FBI has said concerning the matter that local government entities will continue to experience ransomware attacks. Especially as “deployment and targeting tactics evolve, further endangering public health, safety, and resulting in significant financial liabilities.”

Is your City/State/Municipality Prepared?

Months later, Bernalillo County continues to feel the effects of this ransomware attack. This devastating attack certainly serves as a gut check for other local government entities. Are you prepared to withstand a ransomware attack? Do you have a data backup strategy in place? Are your employees adequately informed and understand the risks/vulnerabilities?

ENSURE you are SECURE

Trinsio is a data backup solution that will ensure that your data is secure. As a Rubrik strategic partner, Trinsio offers top-of-the-line technology for a fraction of the cost. Trinsio understands that your small town is important to you & will help you first, to understand your data, and then create a plan to protect it.

US Trucking and Logistics Companies Fall Prey to Ransomware Gangs

Cybersecurity is an ever increasing necessity as ransomware attacks occur more frequently. Three companies, all a part of the transportation and logistics industry, have experienced this in the past few months. 

 

Transportation and Logistics ransomware attacks

On December 15, 2020, Forward Air, a trucking and logistics company located in Tennessee, was attacked by ransomware group Hades, which resulted in a loss of revenue. This targeted attack left the company vulnerable to further data loss and affected both their operational and information technology systems. A note found on their computer screens threatened the total loss of their data unless they complied with the instructions to follow a link to a dark website. No ransom amount was included with the initial message, only a note that the link would provide further instructions.  A week later their website was back up and they looked to be on their way to a recovery.

During that same month, another company, OmniTRAX, was attacked and had at least 70 GB stolen and leaked through a well known leak site. OmniTRAX was the first US Freight rail operator company to be targeted by this kind of cyber attack. OmniTRAX, located in Colorado,also refused to comment on the scale of the attack, however they will be inputting more cyber security measures to prevent future attacks. 

DSC Logistics, located in Illinois, was also attacked  late January of this year. As with the previous companies, they did not comment on the effects of the attack. They did not pay the ransom demanded, apparent by the company being listed on a leak site. However, due to cyber security measures already in place, the attack did minimal damage to the company, with data unknown to have been stolen.With “security practices and response measures” already in place, DSC Logistics was the most prepared for and least affected by a cyber attack (Tabak, 2021). Even so, they are also increasing their cyber security to prevent further damages.

 

Federal Bureau of Investigation taking steps to take down ransomware gangs

As evident by the location of each of these companies, the entire nation is susceptible to cyber and ransomware attacks. It is a growing concern, and one that our nation is taking steps to eliminate. The Federal Bureau of Investigation recently disrupted activities of a well known ransomware gang Emotet. They are responsible for millions of computers affected and hundreds of millions of dollars in damages. The FBI are currently working with private and public entities to stop Emotet from further destruction. 

Along with ransomware gangs, individuals involved in these gangs are being investigated. Take Sebastien Vachon-Desjardins, a Canadian indicted in Florida. From his charges in the indictment, it is supposed that Desjardins has accumulated over $25 million from cyber crime.

The Department of Justice is also actively pursuing and investigating the ransomware gang NetWalker. NetWalker’s attacks have targeted several different entities, from hospitals to universities. The FBI has seized approximately $500,000 of their ransom payments. 

No one is completely safe from ransomware attacks, as evident by these three examples. It is in your best interest to have the security measures in place that will prevent damage to your company and yourself. Do your part by increasing your cybersecurity. If you are a victim of an attack, contact your local FBI authorities and file a report. Every recorded attack helps the effort to stop cyberattacks and ransomware gangs.

New CyberEdge Cyberthreat Defense Report Shows Scary Stats

CyberEdge Group, a well-known marketing and research firm with a focus in technology, recently came out with the newest CyberEdge Cyberthreat Defense Report (CDR). The report surveys large companies (500 or more employees) around the world and spans 19 different industries. It reports on the companies’ relative preparedness to the rest of the survey population and the cyberthreats they encountered throughout the year. The survey is fairly comprehensive and provides a good standard on how to measure how businesses across the world are combating cybersecurity threats. 

This year’s report confirmed the prevalence of ransomware and other cyberthreats, as well as introduced new IT trends. We’ve brought to you the top five insights from this year’s report:

1. In 2020, over one-third of the organizations surveyed by CyberEdge experienced more than 6 successful cyberattacks. 2020 saw the highest percent of organizations experiencing successful cyberattacks since 2015 (80.7%). 

While the trends on cyberattacks have been scary, never before have we seen these kinds of statistics. Let’s think about what this means; on average, over one-third of the organizations surveyed fell prey to a cyberattack every two months. With that magnitude of interruptions, cyberattacks are sure to be a serious hindrance to those businesses’ ability to create new value for themselves and their customers. 

Additionally, we have seen an increase of 10 percent in the number of organizations who experienced a successful attack since 2015. With over 80 percent of those surveyed reporting that they experienced at least one attack in 2020, the chances of any business experiencing a cyberattack at least once during 2021 are only ever increasing.

2. 62% of organizations were victims of ransomware (this has been steadily rising since 2017). An increased number are paying the ransom demand, too (58% of victims, compared to 45% in 2019).

Lane Livingston, CTO and Co-Founder of Trinsio said in a recent interview, “In today’s world there are a few things that will make or break your company, regardless of your size or industry. In addition to the list you are thinking about (key employee retention, brand and reputation, sales and marketing, customer retention), an often overlooked but potentially even more devastating source of disruption and destruction is cybersecurity.

“If your IP or critical data is exposed or encrypted and held for ransom (Ransomware), what’s the impact on your business? What if that data is irretrievably lost? Two critical facts: 1, According to DHS, every business will have a cybersecurity breach within the next two years. That is everyone. 2, 70%+ of all businesses who lost critical data in a data breach or data loss scenario will go out of business within 2 years.   Prepare and plan or crash and burn.”

3. More organizations than ever are saying they are very likely to experience a cyberattack in the next year (69%). 

While the number of organizations that recognize that they are susceptible to cyberattacks has increased, it is still in question whether organizations are doing enough to turn that around. The CyberEdge DFR reported that the organizations surveyed saw lack of budget as a barrier which inhibited their organizations from adequately defending against cyberthreats. 

4. 85% of respondents said they wanted security products with machine learning and AI. 

Many of the other barriers which prevented adequate defence against cyberthreats (such as too much data to analyze, insufficient automation of threat detection and response processes could be solved with Artificial Intelligence (AI). AI as a tool against ransomware has proved to be a great asset, and this new trend suggests that companies are beginning to see that. As the threats against us get smarter, so must we! 

5. One of the biggest barriers in 2020 in cybersecurity remains the lack of available skilled professionals.

The highest ranked barrier to establishing effective cybersecurity defenses for 2020 was the lack of skilled personnel, with the next highest barrier being the low security awareness among employees. Until organizations can effectively increase the security awareness for their employees, they will be hard pressed to have an effective cybersecurity posture. As the saying goes, the chain is only as strong as its weakest link.

Want to check out more interesting security trends in 2020? Read this article. Looking for ways to improve your organization’s cybersecurity posture? Click here.

Joe Biden, Bill Gates, Elon Musk, Apple, Uber Twitter Accounts Hacked and Used in Bitcoin Scam

Yesterday between the hours of 4 and 7 pm, the Twitter accounts of several prominent people, including Elon Musk, Bill Gates, Apple, Kanye Kest, and Barack Obama, were hacked. Each account tweeted about the bitcoin scam, calling it a charitable act. The tweet sent from Bill Gates’s account said, “I am giving back to the community. All the bitcoin sent to the address below will be sent back doubled! If you send $1,000, I will send back $2,000. Only doing this for 30 minutes.” 

Twitter blocked several tweets as they became aware of them, but in some cases, the hacker group was able to publish more tweets with the same message because they remained in control of the accounts. To regain control, Twitter eventually had to disable large amounts of its services, including the ability for verified accounts to tweet, for several hours following the breach. During those 3 hours that the hackers remained in control of the accounts, the bitcoin wallets from the tweets received 300 transactions totaling $118,000.

Anonymous sources told Vice’s Motherboard that the hacker paid off an inside source to obtain access to the twitter internal system. However, in a tweet thread on Twitter’s support account providing updates to Twitter’s investigation of the incident, it was reported that Twitter detected what seemed to be a “coordinated social engineering attack by people who successfully targeted some of our employees with access to internal systems and tools.”

In a later tweet, they stated that they didn’t believe any passwords had been compromised and that resetting passwords was unnecessary. 

While this is the first reported incident that hackers were able to get access to Twitter’s internal accounts and accounts of verified users, this is one of many incidents of social engineering attacks that were successful. 

So how can you prevent this from happening to you? 

As your business’ weakest link, your employees should be able to recognize a social engineering attack and know how to react. This bitcoin scam is especially interesting because of the social engineering that happened on two levels; On one level, the 300 people who fell for the bitcoin scam could have prevented the loss of their savings by educating themselves about basic social engineering tactics. On another level, Twitter’s employees (if it was truly a phishing incident) may have been able to prevent this whole debacle if they had been better equipped to identify phishing attacks.

Honda Battles Ransomware

Honda, one of the largest vehicle manufacturers in the world, was hit by a ransomware attack on Monday, June 8th. News of the attack came after Honda tweeted a message informing the public that Honda Customer and Financial Services were experiencing technical difficulties and were currently unavailable. This ransomware attack disrupted Honda’s global operations, including factory operations. In a statement to The Verge, Honda said “There is no current evidence of loss of personally identifiable information… we have resumed production in most plants and are currently working toward the return to production of our auto and engine plants in Ohio.” 

The virus that attacked Honda is known as “Snake” ransomware. An article by Zach Whittaker from TechCrunch explained that this kind of ransomware “scrambles files and documents and holds them hostage for a ransom, expected to be paid in cryptocurrency.” Although Honda worked to contain the attack and continue business as usual, many business processes that relied on those systems were impacted. 

In a statement provided to Popular Mechanics, Honda denies that any of its data was successfully exfiltrated and that the attack had not presented any evidence of loss of personally identifiable information.

A cybersecurity firm, Sophos, released a survey in May 2020 stating that “51% of organizations have suffered at the whims of a ransomware attack over the past twelve months, with cybercriminals managing to encrypt company data in 73% of these cases.” As a result of COVID-19, the remote workforce has increased significantly which leaves companies, like Honda, uniquely vulnerable to attacks. Oz Alashe, chief executive for CybSafe, said, “The coronavirus pandemic has created a sizable remote workforce which has increased businesses’ attack surfaces and heightened existing vulnerabilities. Organizations of all sizes should prioritize and adapt their cybersecurity strategies to reflect how their employees now work.”

Although Honda has put its best foot forward trying to minimize the effect of this attack, it is likely that Honda will have trouble making a swift recovery. With the attack happening during this challenging time, there is already financial pressure from coronavirus and reduced demand for its goods.

Chris Kennedy, CISO at AttackIQ suggests that as the ransomware threat continues to increase, companies should ensure they are prepared for a possible attack. “Ransomware is a tremendously growing threat. More powerful variants and strains are constantly emerging, and there are more capabilities for it to be remotely (and confidentially) managed the best way to defend against ransomware is readiness and timely response.”

Trinsio will help you develop a plan to ensure your data is protected. As a Rubrik strategic partner, Trinsio offers great protection for your company. All applications and data ingested by Rubrik technology are stored in an immutable manner. Once ingested, no external or internal operation can modify the data. With more than 30+ years of experience in the cloud, data center colocation, and communications, Trinsio can provide you with a solution you can trust. 

This ransomware attack on Honda was not the first and definitely will not be the last, so make sure you are prepared.

T-Mobile DDoS Attack Was Just a Network Issue

A tweet meant to spread misinformation sent much of the U.S. into a panic on Monday. A countrywide T-Mobile network outage was mistaken for a Distributed-Denial-of-Service attack when the Twitter account @YourAnonCentral claiming to be Anonymous affiliated tweeted Monday about a major DDoS attack on the U.S. Included in the tweet was a world map claiming to show proof of the large DDoS attack on the U.S.

Marcus Hutchins, a former black hat hacker turned white hat and cyber researcher responsible for stopping the WannaCry ransomware attacks in 2017, along with other cyber researchers, proved these tweets false that same day. About the map, Hutchins said it “show[s] a random sample of global DDoS traffic badly plotted on a world map. It does not indicate an attack against the US, it lacks context to make any inferences at all (other than DDoS attacks are happening all day every day).”

https://twitter.com/MalwareTechBlog/status/1272647109833940992

Other false reports of major outages with other services added to the confusion. The popular site for detecting outages Downdectector did detect outages for other major cellular carriers (Verizon, AT&T, Metro, Sprint, Consumer Cellular, US Cellular). However, Verizon assured DCD that its network was performing well: “We’re aware that another carrier is having network issues. Calls to and from that carrier may receive an error message. We understand Downdetector is falsely reporting Verizon network issues.”

AT&T also reported that its network was working properly.

https://twitter.com/ATTNEWS/status/1272642265056522242

Additional popular services were reported to be under attack, but researchers believe that this may be in consequence of T-Mobile users not being able to reach those services. Among those reported to be having problems were internet providers (Spectrum, Comcast, CenturyLink, Cox), social media platforms (Facebook, Instagram, Twitter, Snapchat, Twitter), gaming services (Fortnite, Roblox, Call of Duty, Steam, Xbox Live, Playstation Network), streaming services (Netflix, Hulu, HBO Now, Twitch), Banks (Chase Bank, Bank of America), and other major services (Doordash, Google, Zoom).

https://twitter.com/MalwareTechBlog/status/1272656800400044032

T-Mobile was able to fix what turned out to be a routing issue by 11 pm Monday evening. T-Mobile’s President of Technology Neville Ray tweeted an apology, with a promise that improvements were made to prevent future events like this.

Even though the panic of Twitter users turned out to be for nothing, this false alarm seems to beg the question, what would have happened if such a large scale DDoS attack had been real?

Many of the reported issues were with services that have become staples to businesses and individuals during this pandemic. Without telecommunication and technology services available, would people know how to survive? Events like this should be a wakeup call to organizations, to review and update their disaster recovery plans, or to create one if they don’t have an existing plan. On this blog, we have focused mainly on ransomware and how to recover from a ransomware attack, but a disaster recovery plan should cover all types of cyber threats, including DDoS attacks.

If your company does not have a disaster recovery plan for DDoS attacks (whether pointed at your organization or the services you use), try asking yourselves questions similar to these: Does your organization have a plan in place if you were to lose cell or internet service? What are your organization’s next steps in the event of a DDoS attack to get your services back up? Have you talked to your service providers about services or tools that can help? Do you have locally backed-up copies of mission-critical data? While creating a disaster recovery plan is time consuming, it will always be worth it.

Rubrik Announces Expansions to Service Polaris During Digital Forward Summit

On Monday Rubrik held the Rubrik Forward Digital Summit. More than 7,500 registered attendees from 81 different countries joined CEO and Co-founder Bipul Sinha, President of Rubrik, Dan Rogers, comedian Hasan Minhaj, and others to celebrate the innovations in data management technology. 

Dan Rogers said about Rubrik’s new innovations: “With the innovations we announced at Forward, Rubrik has taken another leap in maximizing value for our customers. We changed the game in backup and recovery with our automated SLA engine, near-instant recovery, and converged software fabric. Now, we’re extending that to dramatically, simplify management of popular workloads on Amazon Web Services, Google Cloud Platform, and Microsoft Azure.”

Most notable among the announced innovations were the above-mentioned expansions to Rubrik Polaris. Launched a little over two years ago, Polaris provides a way to centralize, organize, and manage all data across cloud platforms and data centers. Since the launch, Rubrik continues to expand services available under the Polaris umbrella, with expansions to its public cloud coverage.

Protection for Google Cloud Platform (GCP) Virtual Machines

Similar to Rubrik’s solution for Azure and Amazon Web Services, GCP Virtual Machine Protection brings enterprise-level data protection to Google Cloud Platform Virtual Machines. Polaris GCP Protection provides added protection to cloud services without added complexities from infrastructure and maintenance. Now organizations can recover even the most complex data in minutes.

Frederic Lhoest, Senior Technology Architect at PCCW Global shared his experience with Rubrik’s new GCP protection, “Rubrik’s native protection for Google Cloud Platform (GCP) will modernize the protection of our cloud-native applications, extending the same simplicity of our on-prem environment into the cloud. By employing the same SLA policies to automate data protection across our hybrid cloud, we will no longer have to dedicate time to manage our backups. Rubrik’s solution will increase our operational efficiency and allow us to focus on what matters the most – our customers.” 

Protection for Amazon Relational Database Service (RDS)

Rubrik is expanding its protection to AWS Relational Database Services, increasing the availability of RDS users’ applications, across all availability zones and for all instance types. Additionally, Rubrik has simplified the setup, with only a 2-step process between the user and auto-discovery of instances across the service. 

Protection for Microsoft 365 OneDrive

Rubrik is also expanding its existing protection to Microsoft 365 OneDrive by offering more granular restore options–file- and folder-level recoveries–on OneDrive with Polaris. This will give organizations further control over their data and minimize data loss. About this James Cuneo, Senior Systems Engineer at BMD Group, said, “As a leader in the construction industry, our field employees rely on portable tablets to stay connected and manage projects. Those tablets can be lost, stolen, and are subject to wear and tear, so it’s critical that data is easily recoverable. Rubrik’s protection for Microsoft OneDrive will offer us peace of mind; we’ll know that our data is safe, secure, and easily accessible in the event of data loss. Rubrik’s approach to Microsoft OneDrive will be a game-changer; it will amplify our data leverage and safeguard our data so that it never leaves our cloud account. This will be critical to uphold compliance and will make file-level search and recovery a breeze.”

Metadata is the New Data

Also prevalent during the presentations at Rubrik’s Forward Digital Summit was the discussion about the importance of metadata. During one of the keynote talks, Bipul Sinha said, “Data is eating the world. Data is how businesses are thinking about how to create an advantage in the market. People are predicting within 10 years we will have 50 billion devices generating 175 zettabytes of data…Rubrik helps organizations leverage their backup data to address some of today’s biggest business challenges, such as responding to cyberattacks and staying ahead of data privacy regulations. These organizations will outpace the competition in the World of the Data-Forward Enterprise.”

Research from International Data Corporation (IDC) confirms what Sinha was arguing. Today 45.7% of organizations are not extracting all the possible metadata from their data due to data management defects. IDC also has found that organizations with formal plans to leverage the data as a competitive advantage had eight times the growth rate and doubled their profitability compared to those that did not. 

Rubrik’s focus on leveraging the metadata to help customers make informed decisions about their organization’s data has set them apart from its competitors and is just one of the reasons that they’ve experienced such rapid growth since their beginnings. 

For more information about Rubrik Polaris, click here.

Increases in Ransomware since COVID-19

“The coronavirus pandemic has sparked a massive increase in the number of cybercrime complaints flowing into the FBI these days” -Tony Ugortez, Bureau Official, FBI.

Critical Infrastructure Security Agency (CISA) has re-emphasized the need for effective cyber security and cyber resilience planning and testing during these times. At the same time, FBI Bureau officials have stated that IC3, the Bureau’s Internet Crime Complaint Center, is receiving 3,000 to 4,000 complaints per day, far above the typical 1,000 per day prior to the pandemic, according to a deputy assistant director of the FBI’s Cyber Division. “Not all of those are COVID-related,” she said during an Aspen Institute webinar, “but a good number of those are.”

Join us along with the Department of Homeland Security’s CISA to learn how to create, implement, and test an effective cyber strategy. You’ll hear from CISA and learn about their free and confidential cybersecurity assessments. You also hear from Lane Livingston, CTO of Trinsio, on end-to-end data management. and effective ways to protect, manage, and recover your data. The Webinar will be held Wednesday, June 4 2020 at 11:00 AM EST. RSVP will be available soon.

As a result of this rise in ransomware attacks, it is important to be sure your business is protected. Trinsio provides data management solutions, including data backup and recovery, all powered by Rubrik. With more than 30+ years of experience in cloud, data center colocation, and communications, Trinsio can provide customers with custom-tailored solutions covering all aspects of data management. With Rubrik, we provide enterprise-level complete data management to customers of any size. Our solutions address premise, cloud, and long term data storage.

Link to event: https://trins.io/events/webinar-with-cisa-create-implement-and-test-an-effective-cyber-strategy/