SA enterprises have a resiliency gap

Issue 3 2021 Infrastructure

Covid-19 and the subsequent need for remote working has resulted in more companies pursuing multi-cloud strategies and moving more of their data, workloads and applications into the cloud quickly. However, many companies, particularly small businesses, weren’t ready for such a transition and the increasing IT complexity from multi-cloud environments, coupled with lagging resiliency and backup and disaster recovery measures that aren’t robust enough is making too many enterprises an inviting target for malicious actors.

Says Lee-Anne Williams, Veritas product manager at Axiz, “There is no doubt that cyberthreats are on the rise. In fact, just last week a well know health club experienced a sophisticated cyberattack and data breach and it is only a matter of time before other companies experience the same fate. We are seeing an increase in ransomware and with ransomware-as-a-service (RaaS) gaining momentum (which enables cybercriminals to use already-developed ransomware tools to execute attacks), we are likely going to see a spike in the coming months. In fact, even big US tech companies are pushing for ransomware to be designated as a national security threat.”

Today’s digital data deluge has heralded changes in enterprise workloads and as organisations shift away from legacy databases toward new open source and cloud-based platforms, the very nature of applications and data is constantly shifting, making data protection increasingly challenging.

“Organisations know that creating backups of their most important data assets keeping them safe from disasters and accidental deletion is critical,” says Williams. “However, given that today’s applications and data are highly fragmented across virtual and physical infrastructures and across multiple cloud providers and locations, they are cobbling together makeshift data protection solutions while the risks are getting higher.”

According to a recent Veritas Resiliency Report, 42% of respondents said their company had experienced a ransomware attack. What’s more, 54% of organisations have had flat or decreased funding levels for IT security during the pandemic, at a time when distributed workforces and increased demand for edge data protection has put additional strain on security resources.

“More frightening is that 57% of companies haven’t tested their disaster recovery plan within the past two months,” says Williams. “This means that many companies aren’t following best practice. Not only is it critical to have a comprehensive backup approach, but having a system recovery plan in place is imperative to minimise downtime and restore critical operations. After all, it’s not about being hit, it’s about how you recover.”

According to Williams, data protection should be simple, secure and unified. “The resiliency gap is real and widening. Forewarned is forearmed and with the integrity of data at stake through increased cyberattacks and an increasing push to regulate how enterprises meet data compliance, businesses, now more than ever, cannot ignore their backup and recovery strategies,” concludes Williams.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Smart mining operations management
Mining (Industry) Infrastructure IoT & Automation
In his presentation at the recent MESA Africa conference, Neels van der Walt, Business Development Manager at Iritron, revealed the all-encompassing concept of SMOM (Smart Mining Operations Management) and why it is inextricably linked to the future of worldwide mining operations.

Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Cyber resilience – protect, defend, recover
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Top bets for backup and business continuity
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Next-gen solar-powered switches
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.