Search
Close this search box.

Cyberattacks and Ransomware Accentuate the Need for Rapid Recovery

What would it cost your business if it lost access to critical business data and applications for a few days?

What if that disruption lasted a few weeks, or months?

What would that disruption do to your customers?

This nightmare has become all too real for thousands of businesses that have fallen victim to ransomware. According to many reports[i], material business disruption averages about 21 days with full recovery from a ransomware incident taking more than six months.

Many Sources of Downtime

There was a time when most businesses ran on small data, printouts, and many manual business processes. Today, most business processes depend on IT. Therefore, an extended disruption will have a major impact on the business.

sources of downtime wordcloud revised

Common sources of data loss and downtime include:

  • accidental deletion or overwriting of files
  • computer viruses and malware
  • equipment theft
  • fires
  • floods
  • hardware/system failures
  • malicious acts
  • other human errors
  • power surges and outages
  • ransomware
  • software errors
  • spills

Prudent business leaders take action to reduce the likelihood of experiencing any of the common causes of data loss and downtime. Nevertheless, failures will occur. The key to achieving business resiliency is the ability to rapidly recover from any incident.

The key to achieving business resiliency is the ability to rapidly recover from any incident.

Cyberattacks and Ransomware are Now the Primary Causes of Downtime

While there are many sources of downtime, cyberattacks have become a major source of risk to businesses of all sizes and across all industries.

Cybercriminals have figured it out: Your data is valuable. Disrupting business operations by denying access to data or threatening to release sensitive data to others can unlock large ransom payments from the victims of these attacks.

Cyberattacks can also result in payments to customers whose data is stolen by criminals. For example, thieves stole more than 447,000 patients’ names, Social Security numbers, and sensitive medical information from a Florida healthcare organization. In response to a class-action lawsuit, it agreed to pay up to $7,500 per SSN that was stolen.

Cyber insurance is one tool organizations can use to protect themselves from financial losses. Ironically, some cybercriminals now seek information about their victims’ cyber insurance coverage so they can tune their ransom demands to that coverage.

Q: Why do cybercriminals target business data with ransomware attacks?

A: Because that’s where the money is.

Startling Statistics from Recent Ransomware and Cyberthreats Reports

Many enterprise technology providers and security experts have compiled data about the impacts they are seeing from recent ransomware attacks and other cyberthreats.

According to Acronis’ 2022 Year End Cyberthreats Report

“Ransomware continues to be the number-one cyberthreat for businesses, including government, healthcare and other critical organizations.”[ii]

“No one is safe — email-borne attacks are targeting virtually all industries.” [iii]

“More than 100 million accounts were breached in the third quarter of 2022, as found in a recent Surfshark survey.”[iv]

And these attacks are increasingly costly to their victims.

“The global average total cost of a data breach is now $4.35 million, having increased by another $110,000 this year. In the United States, the average total cost is nearly $9.5 million.” [v]

“No matter the size or industry, data breaches can absolutely devastate an organization. In addition to the immediate impact on business operations, companies must contend with severe reputational damage and potential regulatory fines.” [vi]

From Cisco’s Security Outcomes Report, Volume 3: Achieving Security Resilience

Nearly two-thirds of respondents reported suffering major security incidents that jeopardized business operations. The leading types of incidents were network or data breaches (51.5 percent),

network or system outages (51.1 percent), ransomware events (46.7 percent) and

distributed denial of service attacks (46.4 percent).”[vii]

These incidents cause wide-ranging costs to affected businesses. These include downed systems, response and recovery costs, brand damage, and legal costs or penalties.

chart of the types of resilience impacts caused by security incidents sourced from the Cisco Security Outcomes Report

From IBM’s Cost of a Data Breach 2022 Report

picture of the word cyberattack with a dollar sign superimposed over it in the center supporting the concept of the need for rapid recovery due to the cost of downtime

“For 83% of companies, it’s not if a data breach will happen, but when. Usually more than once. When detecting, responding to, and recovering from threats, faster is better. Organizations using AI and automation had a 74-day shorter breach lifecycle and saved an average of USD 3 million more than those without.”[viii]

From Entara

“Entara was deployed recover a 450-server environment that had about 50% of its LUNs backed up with snapshots. The customer was able to operate its most critical, revenue-driving business applications in a few days because they had partial snaps. We spent the next few weeks restoring the remaining high-priority systems used for functions like monthly batch reporting. The whole project took no more than one month, while the customer with traditional storage and no snapshot capabilities took 3-4 months.”[ix]

Every Business Needs a Rapid Recovery Strategy

The question is not if your business will experience a ransomware attack, but when. Therefore, every business must develop and implement a strategy for timely recovery from a successful cyberattack attack BEFORE DISASTER STRIKES.

Callout: Don’t let a message like this ruin your day, week, month, or quarter:

notepad ransomware notification

Unfortunately, for organizations relying on traditional backup and recovery approaches, recovering from a ransomware attack in a few days would be considered a success. Recoveries often extend to weeks or months. Disruptions of these durations can easily result in business failure.

To be truly useful, a cyber resiliency strategy must recover the business to an operational state within the timeframes necessary to meet business continuity objectives. Ultimately, the recovery strategy must enable business resiliency.

Create New Wins Through Proactive Data Management

Because this issue has executive-suite and board-level awareness, IT leaders should approach the creation or updating of their recovery strategy with a broader awareness of the needs of the business. IT leaders should look for opportunities to create new wins rather than addressing this risk by merely bolting on another layer of technology and expense.

Implementing an effective recovery strategy will probably entail significant costs. However, the right solution properly implemented provides opportunities to create new value from data, leverage AI/ML to cut or avoid costs, and address emerging edge data requirements.

A solution that enables proactive data management can benefit the business by enabling:

  • greater data visibility
  • optimal data placement
  • improved data availability
  • provable compliance
  • consistent data governance
  • data workflow automation
  • policy-driven data management
  • the extension of enterprise data management to the edge

A data management solution that enables end-user access and self-service tools will enable greater scalability and agility for the organization by freeing end-users from relying on IT interventions to complete their priority projects.

Arcitecta Enables Business Resilience at Scale

Arcitecta is an excellent example of a company that addresses both cyber resiliency and data management at scale, enhancing overall business resilience.

Arcitecta is a data management company, not a storage company. Its Mediaflux product virtualizes multiple underlying storage systems to create an integrated data environment that enables continuous inline data protection at scale. Its Point in Time solution solves the rapid recovery problem by enabling IT and end users to rewind any file or file system to a specific point in time without performing a restore operation. Intelligent search facilities help to reduce the RTO to near zero, even at scale.

Arcitecta’s Point in Time Ransomware Rapid Recovery Solution

Arcitecta’s Point in Time Ransomware Rapid Recovery Solution for media and entertainment studios enables studios to quickly restore their media assets after a ransomware attack, minimizing downtime and avoiding the risk of data loss. Point in Time works across existing production storage systems, such as Dell PowerScale, making it easy to implement and cost-effective since no additional storage systems are required.

Wins That Go Beyond Ransomware Recovery

Arcitecta goes beyond ransomware recovery, addressing the challenges of data resiliency and effective data management at scale. Arcitecta bases its Mediaflux product on an XML-encoded object database (XODB) developed by Arcitecta to meet the data management requirements of research computing organizations. XODB is hyperscale database technology that integrates and operates on rich, arbitrary metadata.

Arcitecta and Mediaflux are proven in demanding at-scale data environments. Jason Lohrey founded Arcitecta in 1998. Arcitecta serves more than 300,000 active users at organizations in the life sciences, research, clinical, geospatial, media and entertainment, and defense industries. Mediaflux users generate multiple petabytes of new data each month and move many petabytes for analysis each month… with no data loss or outages exceeding 3 minutes.

Guidance for Business and IT Leaders

Every business must develop and implement a strategy for timely recovery from a successful cyberattack attack before disaster strikes. Enterprising professionals will leverage this necessity to implement proactive data management that creates new opportunities for their organizations while mitigating the risks posed by ransomware.

About Arcitecta

Arcitecta is a creative and innovative data management software company. Founded in 1998, Arcitecta builds the world’s best data management platforms, enabling thousands of users worldwide in some of the most demanding data-driven environments. Arcitecta’s flagship Mediaflux platform began with the vision to provide organizations with extraordinary technology for handling all forms of data, from small to very large and complex. Today, it forms the foundation for managing the simplest and the most complex data for all sizes of organizations and global enterprises, empowering them to simplify data-intensive workflows and accelerate time to insight from their data to improve business and research outcomes.

Keep Up-To-Date With DCIG

To be notified of new DCIG articles, reports, and webinars, sign up for DCIG’s free weekly Newsletter.

To learn about DCIG’s future research and publications, see the DCIG Editorial Calendar.

Technology providers interested in licensing DCIG TOP 5 reports or having DCIG produce custom reports, please contact DCIG for more information.

THIS BLOG ARTICLE WAS DEVELOPED AS PART OF A PAID CUSTOM CONTENT ENGAGEMENT BETWEEN DCIG AND ARCITECTA.


[i] https://www.ktvu.com/news/oakland-ransomware-attack-nears-2-months

[ii] https://dl.acronis.com/u/rc/White-Paper-Acronis-Cyber-Protect-Cloud-Cyberthreats-Report-Year-End-2022-EN-US-221212.pdf

[iii] https://www.acronis.com/en-us/blog/posts/acronis-cyberthreats-report-year-end-2022-data-under-attack/

[iv] https://www.acronis.com/en-us/blog/posts/acronis-cyberthreats-report-year-end-2022-data-under-attack/

[v] https://www.acronis.com/en-us/blog/posts/acronis-cyberthreats-report-year-end-2022-data-under-attack/

[vi] https://www.acronis.com/en-us/blog/posts/acronis-cyberthreats-report-year-end-2022-data-under-attack/

[vii] https://www.cisco.com/c/en/us/products/security/security-outcomes-report.html

[viii] https://www.ibm.com/reports/data-breach

[ix] https://money.yahoo.com/preparing-inevitable-understanding-ransomware-mitigate-120000466.html

Share
Share

Click Here to Signup for the DCIG Newsletter!

Categories

DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.