Organizations have always generally cared about their ability to recover backup data. However, the advent of ransomware has cast a new spotlight on it. Organizations must now prioritize recovering their workloads and data in the time and to the point their business requires. To do that, they may need to implement up to three (3) different rapid recovery offerings.
Ransomware has put an increased emphasis on organizations putting together a viable cyber resiliency strategy. This entails organizations appropriately identifying and classifying which software they use falls under the cyber resiliency umbrella. However, they must do more than simply identify software as cyber resilient. They must also validate it satisfies established goals that make it cyber resilient.
The threat of ransomware has put a heightened focus on the value and integrity of organizations backups. To maintain their value, more organizations embrace air-gapped technologies to protect their backups from a ransomware attack. However, when introduced, air-gapped technologies present five specific management challenges. Prior to using these technologies, organizations should verify their backup software effectively addresses the management challenges they present.
Bringing together backup and cybersecurity software and delivering them as a single solution used to strike me an improbable combination. After all, what was the business driver to bring them together? Then ransomware changed everything. Suddenly, the idea that an organization had good but compromised backups did not seem so far-fetched. This created the need for singular data and threat protection solutions that Acronis Cyber Protect helps exemplify.
Ransomware attacks are escalating in terms of frequency, variety, and impact. Based on reliable information sources, it is reasonable for every organization to expect it will experience multiple attempted ransomware attacks in the next twelve months. Given this threat environment, it is time to demand more from infrastructure providers.
All organizations need to face an unpleasant truth: It is not a question of “If” they will experience a ransomware attack; it is a matter of “When.” While cybersecurity software serves as a first-line defense against ransomware, IT leaders recognize cybersecurity software alone does not thwart all ransomware attacks. And as an assumption an attack may succeed, these leaders also recognize they must protect their production and backup data. Immutable storage can help.
Many organizations likely breathed out a small sigh of relief when REvil suddenly disappeared from the world’s ransomware stage. Allegedly responsible for attacks on Apple, meatpacker JBS SA and, most recently, Kaseya, few shed any tears over its disappearance.
As many are aware, Kaseya’s Virtual System Administrator (VSA) was the target of a ransomware attack over the Independence Day weekend. Two days ago, on July 6, 2021, Kaseya’s CEO, Fred Voccola, posted a video on YouTube that summarized Kaseya’s response to this attack. This blog entry contains a summary of his comments from that video. You may access the full video available through this link.