Connect with us
Anglostratits

Business

How do we Build Powerful Defense with Data Storage (By Ning Yun)

Published

on

Data Storage

A Cybereason report shows that 49% of enterprises who pay the ransom either get only part of their data back, or none at all

JOHANNESBURG, South Africa, October 21, 2022/APO Group/ — 

By Ning Yun, Director of Data Storage Department of Huawei SAR (Huawei.com

Ransomware is striking at an alarming rate. Information technology research and consultancy company Gartner predicts, by 2025, at least 75% of IT organizations will face one or more attacks. Refined hacking tools and extortion strategies have made ransomware the biggest threat to individual, enterprise, and national data security.

Constant ransomware attacks cause huge damage

When ransomware strikes, it steals and encrypts valuable data. Encrypted data can be decrypted only by paying the hackers a ransom. Hackers, working through darknets, usually demand Bitcoin to make the payment as difficult as possible to trace. The damage ransomware creates is great, as are hackers’ profits.

According to leading investment consulting firm Cybersecurity Ventures, by 2031, ransomware is expected to attack a business, consumer, or device every 2 seconds. In 2021, this number was only 11 seconds. Even at that lower frequency, that same year, global ransomware damages reached US$20 billion — 61 times more than in 2015 (US$325 million). The largest ransom — so far — was US$70 million. But do ransoms solve the problem? No. A Cybereason report shows that 49% of enterprises who pay the ransom either get only part of their data back, or none at all. 80% of enterprises who pay the ransom are targeted a second time. Ransoms are also not the only problem: ransomware damages brands, causes long service interruptions, exposes enterprises to legal liability, and more. Such collateral damage can be enormous: as much as 23 times the ransom.

  • In March 2021, hackers encrypted 15,000 devices belonging to an insurance corporation. Vast numbers of customer data files were at risk of being leaked. The company paid US$40 million to retrieve the data.
  • In May 2021, ransomware halted all the operations of an oil pipeline giant for 11 days. Gasoline prices in the country rose to their highest level in seven years, leading to panic buying. The company paid a ransom of US$4.4 million.
  • In April 2022, a leading car manufacturer had to cut its annual production by 500,000 vehicles following an attack on its suppliers which resulted in a 1.4 TB data leak.
  • In May 2022, two attack waves caused a country to declare a cyber security emergency. They damaged basic services like healthcare, and even international trade.

There are many more examples. Hackers target large, high-value enterprises and industries. Government, energy, transportation, finance, manufacturing, and healthcare are their main objectives, but no one is safe.

Ransomware trends to know

Ransomware is extremely good at disguise. It has many ways to get into your system, for example storage, phishing emails, Trojans, social networks, and malicious insiders. It is difficult to detect and defend against. A typical attack encrypts or deletes all local data copies and can even target disaster recovery (DR) centers, making it impossible to quickly restore data. What follows, according to a ZDNet report, is an average of 16 business days system downtime. The average cost to recover from an attack, calculated by Sophos, is US$1.85 million.

There are four important ransomware trends:

Hackers focus on large enterprises and infrastructure

Instead of launching broad campaigns, ransomware attacks now increasingly focus on high-value targets. The research that hackers need to do for this approach to work is difficult, time-consuming — weeks or even months! — and expensive, but the potential profits make it worthwhile. Elaborate attacks make even previously well protected organizations potential victims, and also threaten government departments.

  • Ransomware as a Service (RaaS)

Rapid development of network and information technologies as well as encrypted digital currencies has created a hotbed for malicious actors. Ransomware operators now sell ransomware-related services to other attackers through customized solutions, memberships, or subscriptions. This lowers the barrier to entry for launching ransomware attacks, resulting in explosive ransomware growth.

Double extortion becoming the new normal

Ransomware is not limited to encrypting data and demanding ransoms. Attackers also steal data, and threaten to leak it. Even if an enterprise has a recent backup, it still cannot risk a leak of confidential information and subsequent public scrutiny and compliance proceedings.

A typical attack encrypts or deletes all local data copies and can even target disaster recovery (DR) centers, making it impossible to quickly restore data

APT-like attack capabilities

Advanced Persistent Threat (APT) refers to a complex continuous network attack customized by expert attackers to take full advantage of a victim’s vulnerabilities. Ransomware attacks, featuring greater and greater precision and planning, are beginning to show a strong resemblance to APT attacks.

Data security needs

Complex ransomware poses a great challenge for many current defense measures. Traditional data security protection focuses on the network (such as the firewall and security gateways) and on hosts to prevent ransomware intrusions and limit spread. This, however, neglects ransomware’s ability to disguise itself and lurk in the system for a long time in order to get access permissions to a large volume of key data. In other words, once the system is infected, traditional data security protection is useless. A better solution is needed.

The Defense-in-Depth framework developed by defense contractor Northrop Grumman provides good ideas on how to move forward and build stronger protection. This approach to cybersecurity features five defensive mechanism layers: perimeter, network, endpoint, application, and data security.

  • Perimeter and network security protection, established at the network layer, defends using firewalls, sandboxes, and situation awareness.
  • Endpoint and application security protection, established at the host layer, defends using access control, security patches and audits, and antivirus software.

The last layer, data security, is where data storage comes in. In the modern, digital age, data storage needs to do more than just store data. It needs to serve as the last line of defense: protect data with anti-tamper technologies, detect abnormal I/Os generated by ransomware, and prevent data leaks using encryption technologies. In addition to all this, it needs to ensure it is possible to recover clean, uninfected data by keeping data copies in backup storage and in a physically isolated zone.

Building powerful ransomware defense with professional storage

Providing dual protection with production and backup storage, Huawei ransomware protection storage solution uses four key technologies to build a complete solution which prevents viruses from hiding and stealing or tampering with data: ransomware detection, data anti-tampering, air gap replication, and end-to-end data encryption. Let’s take a look at why dual protection and the four key features are so effective:

  • Dual ransomware protection with both primary and backup storage

In this solution, both primary and backup (OceanProtect Backup Storage) storage provide all-round ransomware protection features, ensuring the system always has a clean data copy for quick service recovery. OceanProtect Backup Storage also provides an ultra-fast recovery speed: up to 172 TB/hour, five times faster than the benchmark in the industry. This helps enterprises slash service downtime and economic losses.

  • Four key technologies for comprehensive protection

Ransomware detection (ransomware has nowhere to hide): Huawei ransomware detection and analysis feature delivers 99.9% accuracy for production and backup storage before, during, and after attacks. Before an attack, the storage works to intercept ransomware before it has a chance to strike. If an attack does still occur, the storage acts quickly to secure the system, working with security devices such as firewalls to isolate hosts that send abnormal I/Os, preventing ransomware from spreading to other hosts. After the attack, the storage examines data copies to ensure they are clean.

Data tampering prevention (data cannot be modified): WORM file system and secure snapshot technology block file tampering. The WORM system supports setting a protection period, preventing modification or deletion of production or backup data for the duration of the period. Read-only secure snapshots provide similar protection: they do not allow deletion or modification of data during a configured protection period.

Physical isolation (clean data copies are physically isolated): Air-gap technology enables storing a clean copy of production and backup storage data in a physically isolated zone. Even if — unlikely though it may be — both production and backup storage are compromised, the isolation zone will have a clean copy that can be used to quickly restore services. Setting the replication Service Level Agreement (SLA) will automatically replicate periodic data copies from the production or backup storage to the isolation environment. Since the replication link is active only during replication, the possibility of ransomware accessing data in the isolation zone is relatively low. For added security, the isolation zone storage also features multi-layer data protection, supporting anti-tamper features such as secure snapshots.

End-to-end encryption (data will not be leaked): Huawei storage ensures zero data leaks on the storage transmission network and storage through encryption of: protocol, production and backup storage, air-gap replication link, and remote replication transmission of data and backup copies. Even if hackers break the storage or intrude the storage network, they have no access to the confidential data thanks to the encryption deployment.

End-to-end encryption (data will not be leaked): Huawei storage uses end-to-end encryption technology to ensure no data leaks either on storage devices or on the storage transmission network. The encryption covers protocol, production and backup data, the air-gap replication link, and remote data replication. Even if hackers manage to enter a system, they will not crack confidential data.

Defending against ransomware

Huawei’s ransomware protection storage solution is working 24/7 around the world for large customers in energy, finance, transportation, manufacturing, and government.

Better safe than sorry. Installing ransomware protection after the fact is too late. A comprehensive ransomware protection storage solution is the best way to stop or mitigate ransomware.

For more information about how you can build powerful defense for your data, visit our website (https://bit.ly/3RRI74g).

Distributed by APO Group on behalf of Huawei Enterprise.

Events

As global power structures shift, Invest Africa convenes The Africa Debate 2026 to redefine partnership in a changing world

Published

on

Debate

The Africa Debate 2026 will provide a platform for this essential, era-defining discussion, convening leaders to explore how Africa and its partners can build more balanced, resilient and sustainable models of cooperation

LONDON, United Kingdom, February 5, 2026/APO Group/ –As African economies assert greater agency in a rapidly evolving global order, Invest Africa (www.InvestAfrica.com) is delighted to announce The Africa Debate 2026, its flagship investment forum, taking place at the historic Guildhall in London on 3 June 2026.

Now in its 12th year, The Africa Debate has established itself as London’s premier platform for African investment dialogue since launching in 2014, convening over 800 global decision-makers annually to shape the future of trade, finance, investment, and development across the continent.

Under the theme “Redefining Partnership: Navigating a World in Transition”, this year’s forum will focus on Africa’s response to global economic realignment with greater agency, ambition and economic sovereignty.

The Africa Debate puts Africa’s priorities at the centre of the conversation, moving beyond traditional narratives to focus on ownership, resilience and long-term value creation.

“Volatility is not new to Africa. What is changing is the opportunity to respond with greater agency and ambition,” says Invest Africa CEO Chantelé Carrington.

“This year’s edition of The Africa Debate asks how we strengthen economic sovereignty — from access to capital and investment to financial and industrial policy — so African economies can take greater ownership of their growth. Success will be defined by how effectively we turn disruption into leverage and partnership into shared value.”

The Africa Debate 2026 will provide a platform for this essential, era-defining discussion, convening leaders to explore how Africa and its partners can build more balanced, resilient and sustainable models of cooperation.

Key challenges driving the debate

Core focus areas for this year’s edition of The Africa Debate include:

This year’s edition of The Africa Debate asks how we strengthen economic sovereignty — from access to capital and investment to financial and industrial policy

Global Realignment & New Partnerships

How shifting geopolitical and economic power structures are reshaping Africa’s global partnerships, trade dynamics and investment landscape.

Financing Africa’s Future

The growing need to reform the global financial architecture, new approaches to development finance, as well as the strengthening of market access and financial resilience of African economies in a changing global system.

Strategic Value Chains

Moving beyond primary exports to build local value chains in critical minerals for the green economy. Also addressing Africa’s energy access gap and mobilising investment in renewable and transitional energy systems.

Digital Transformation & Technology

Unlocking growth in fintech, AI and digital infrastructure to drive productivity, inclusion, and the next phase of Africa’s economic transformation.

The Africa Debate 2026 offers a unique platform for high-level dialogue, deal-making, and strategic engagement. Attendees will gain actionable insights from leading policymakers, investors and business leaders shaping Africa’s economic future, while building strategic partnerships that define the continent’s next growth phase.

Registration is now open (http://apo-opa.co/46b19gj).

Distributed by APO Group on behalf of Invest Africa.

Continue Reading

Business

Zion Adeoye terminated as Chief Executive Officer (CEO) of CLG due to serious personal and professional conduct violations

Published

on

CLG

After a thorough internal and external investigation, along with a disciplinary hearing chaired by Sbongiseni Dube, CLG (https://CLGglobal.com) has made the decision to terminate Zion Adeoye due to serious personal and professional conduct violations. This process adhered to the Code of Good Practice of the Labour Relations Act, ensuring fairness, transparency, and compliance with South African law.

Mr. Adeoye has been held accountable for several serious offenses, including:

  • Making malicious and defamatory statements against colleagues
  • Extortion
  • Intimidation
  • Fraud
  • Misuse of company funds
  • Theft and misappropriation of funds
  • Breach of fiduciary duty
  • Mismanagement

His actions are in direct contradiction to our firm’s core values. We do not approve of attorneys spending time in a Gentleman’s Club. CLG deeply regrets the impact this situation has had on our colleagues and continues to provide full support to those affected.

We want to express our gratitude to those who spoke up and to reassure everyone at the firm of our unwavering commitment to maintaining a respectful workplace. Misconduct of any kind is unacceptable and will be addressed decisively.

We recognize the seriousness of this matter and have referred it to the appropriate law enforcement, regulatory, and legal authorities in Nigeria, Mauritius, and South Africa. We kindly ask that the privacy of the third party involved be respected.

Distributed by APO Group on behalf of CLG.

 

Continue Reading

Business

The International Islamic Trade Finance Corporation (ITFC) Strengthens Partnership with the Republic of Djibouti through US$35 Million Financing Facility

Published

on

ITFC

This facility forms part of the US$600 million, three-year Framework Agreement signed in May 2023 between ITFC and the Republic of Djibouti, reflecting the strong and growing partnership between both parties

JEDDAH, Saudi Arabia, February 5, 2026/APO Group/ –The International Islamic Trade Finance Corporation (ITFC) (https://www.ITFC-IDB.org), a member of the Islamic Development Bank (IsDB) Group, has signed a US$35 million sovereign financing facility with the Republic of Djibouti to support the development of the country’s bunkering services sector and strengthen its position as a strategic regional maritime and trade hub.

The facility was signed at the ITFC Headquarters in Jeddah by Eng. Adeeb Yousuf Al-Aama, Chief Executive Officer of ITFC, and H.E. Ilyas Moussa Dawaleh, Minister of Economy and Finance in charge of Industry of the Republic of Djibouti.

The financing facility is expected to contribute to Djibouti’s economic growth and revenue diversification by reinforcing the competitiveness and attractiveness of the Djibouti Port as a “one-stop port” offering comprehensive vessel-related services. With Red Sea Bunkering (RSB) as the Executing Agency, the facility will support the procurement of refined petroleum products, thus boosting RSB’s bunkering operations, enhancing revenue diversification, and consolidating Djibouti’s role as a key logistics and trading hub in the Horn of Africa and the wider region.

We look forward to deepening this partnership, creating new opportunities, and leveraging collaborative programs to advance key sectors and drive sustainable economic growth

Commenting on the signing, Eng. Adeeb Yousuf Al-Aama, CEO of ITFC, stated:

“This financing reflects ITFC’s continued commitment to supporting Djibouti’s strategic development priorities, particularly in strengthening energy security, port competitiveness, and trade facilitation. We are proud to deepen our partnership with the Republic of Djibouti and contribute to sustainable economic growth and regional integration.”

H.E. Ilyas Moussa Dawaleh, Minister of Economy and Finance in charge of Industry of the Republic of Djibouti, commented: “Today’s signing marks an important milestone in the development of Djibouti’s bunkering services and reflects our strong and valued partnership with ITFC, particularly in the oil and gas sector. This collaboration supports our ambition to position Djibouti as a regional hub for integrated maritime and logistics services. We look forward to deepening this partnership, creating new opportunities, and leveraging collaborative programs to advance key sectors and drive sustainable economic growth.”

This facility forms part of the US$600 million, three-year Framework Agreement signed in May 2023 between ITFC and the Republic of Djibouti, reflecting the strong and growing partnership between both parties.

Since its inception in 2008, ITFC and the Republic of Djibouti have maintained a strong partnership, with a total of US$1.8 billion approved primarily supporting the country’s energy sector and trade development objectives.

Distributed by APO Group on behalf of International Islamic Trade Finance Corporation (ITFC).

Continue Reading

Trending