Category: Ransomware

Acronis Cyber Protection

Acronis’ Rise to a Leading Cyber Protection Solution

Enterprise caliber cyber security and resilience products that meet the needs of managed service providers (MSPs) and/or small and midsized enterprises (SMEs) remain in short supply. They need centrally managed, integrated solutions that deliver these functions. In response, Acronis has developed its own in-house, integrated Cyber Protect solution to meet them.

Read More

3 Offerings that Make Rapid Recovery Attainable

Organizations have always generally cared about their ability to recover backup data. However, the advent of ransomware has cast a new spotlight on it. Organizations must now prioritize recovering their workloads and data in the time and to the point their business requires. To do that, they may need to implement up to three (3) different rapid recovery offerings.

Read More

The 4 Goals Cyber Resilient Offerings Should Ideally Meet

Ransomware has put an increased emphasis on organizations putting together a viable cyber resiliency strategy. This entails organizations appropriately identifying and classifying which software they use falls under the cyber resiliency umbrella. However, they must do more than simply identify software as cyber resilient. They must also validate it satisfies established goals that make it cyber resilient.

Read More

Five Challenges of Managing Air-gapped Technologies Using Backup Software

The threat of ransomware has put a heightened focus on the value and integrity of organizations backups. To maintain their value, more organizations embrace air-gapped technologies to protect their backups from a ransomware attack. However, when introduced, air-gapped technologies present five specific management challenges. Prior to using these technologies, organizations should verify their backup software effectively addresses the management challenges they present.

Read More

Taking a Singular Approach to Protecting from Ransomware Attacks

Bringing together backup and cybersecurity software and delivering them as a single solution used to strike me an improbable combination. After all, what was the business driver to bring them together? Then ransomware changed everything. Suddenly, the idea that an organization had good but compromised backups did not seem so far-fetched. This created the need for singular data and threat protection solutions that Acronis Cyber Protect helps exemplify.

Read More
chart of recent ransomware attack quotes

It is Time to Demand More from Infrastructure Providers

Ransomware attacks are escalating in terms of frequency, variety, and impact. Based on reliable information sources, it is reasonable for every organization to expect it will experience multiple attempted ransomware attacks in the next twelve months. Given this threat environment, it is time to demand more from infrastructure providers.

Read More

Immutable Storage for Ransomware Protection and Recovery

All organizations need to face an unpleasant truth: It is not a question of “If” they will experience a ransomware attack; it is a matter of “When.” While cybersecurity software serves as a first-line defense against ransomware, IT leaders recognize cybersecurity software alone does not thwart all ransomware attacks. And as an assumption an attack may succeed, these leaders also recognize they must protect their production and backup data. Immutable storage can help.

Read More

Immutable Storage Options in a Ransomware World

Many organizations likely breathed out a small sigh of relief when REvil suddenly disappeared from the world’s ransomware stage. Allegedly responsible for attacks on Apple, meatpacker JBS SA and, most recently, Kaseya, few shed any tears over its disappearance.

Read More

Kaseya’s CEO Response to Its Current Ransomware Attack

As many are aware, Kaseya’s Virtual System Administrator (VSA) was the target of a ransomware attack over the Independence Day weekend. Two days ago, on July 6, 2021, Kaseya’s CEO, Fred Voccola, posted a video on YouTube that summarized Kaseya’s response to this attack. This blog entry contains a summary of his comments from that video. You may access the full video available through this link.

Read More

Click Here to Signup for the DCIG Newsletter!

Categories

DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.