Robust data backup is a vital ransomware defence

Issue 1 2022 Infrastructure

It’s common knowledge that ransomware attacks are on the rise and organisations need to be realistic about what this means for their security. The number of entry points into IT systems that attackers can exploit has skyrocketed in recent years. According to the FBI, there has been a 300% rise in cybercrimes during the pandemic as more people log in to their work systems from home networks and personal devices.

Ransomware isn’t going anywhere. Rising global connectivity, the recent rapid adoption of digital communication technologies and remote working all create potential new ‘doors’ into IT systems. Growing technologies such as the cloud, 5G and the IoT means our connectivity will continue to multiply, meaning more doors and more opportunity for ransomware success.

Ideally, you’ll stop all attacks in their tracks, but that’s not always possible. Having a robust backup strategy is essential if you’re going to be able to take back control and recover your data in the event of an attack.

So, what are the three key areas you should be focusing on when it comes to data protection?

1, Create robust backups and immutable storage

You can never know when an attack may mean you have to restore your entire estate. So where do you start?

Recognise that your biggest challenge is probably that your data is getting increasingly harder to manage and control, due to spiralling levels of data volumes and types. It might also be spread across multiple locations or saved on a hybrid network which uses cloud storage, in itself increasing vulnerability. This can complicate your data backup processes and your IT teams can quickly find themselves relying on multiple different backup tools which are costly, confusing to manage and a drain on resources.

It’s important to ensure that you have clean, non-infected backup copies that you can rely on as your last line of defence. Prioritise finding a backup solution that’s flexible enough to handle complex data requirements, including cloud storage and that will simplify management so that you can back up everything at the click of a button, or even automatically.

2. Factor in security

Take a realistic look at your legacy tools because they tend to become outdated quickly and are unable to match the wide range of assets and threat types. In my experience, they can’t provide robust data protection because they rely on how a system used to work, rather than on how it currently works.

Moving to a modern tool with high specification security is vital in your battle against the effects of ransomware. The best solutions will provide WORM storage (write once, read many), with the option to turn on object lock, meaning that once data has been written it can’t be erased, not even by the administrator. And more importantly, this feature needs to be available across multiple hosting points, whether it be public clouds, on premises or hosted private clouds.

Data protection and network security are interdependent, so your storage and backup solution choices should also consider network security and the anti-malware functionality of your current set up, including any networks that remote workers may be using. Consider using a separate network for your backup data, with just one link between the production data and the storage data.

3. Build in consistent monitoring

Your security team needs to have constant visibility of any attacks in order to thwart them at the right time, so continuous 24/7 threat monitoring is important. Look for a single solution that can span all your sites and multiple storage locations, or it’ll be impossible to get a complete overview of your whole estate. This will also make reporting easier and simpler and a system that incorporates automation can provide round-the-clock monitoring without draining your resources.

Updating your data backup system can also simplify your security processes, offering single-click orchestration capabilities, so your policy-driven backup and replication is always available. It’s important for the solution you choose to have capabilities to proactively track unusual usage behaviour and raise alerts for deep dive diagnosis.

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Navigating the evolving tech landscape in 2024 and beyond
Residential Estate (Industry) Infrastructure
Progress in the fields of AI, VR and social media is to be expected, but what is not, is our fundamental relationship with how we deploy solutions in our business and how it integrates with greater organisational strategies and goals.

iOCO collaboration protection secures Office 365
Information Security Infrastructure
The cloud, in general, and Office 365, in particular, have played a significant role in enabling collaboration, but it has also created a security headache as organisations store valuable information on the platform.

Smart mining operations management
Mining (Industry) Infrastructure IoT & Automation
In his presentation at the recent MESA Africa conference, Neels van der Walt, Business Development Manager at Iritron, revealed the all-encompassing concept of SMOM (Smart Mining Operations Management) and why it is inextricably linked to the future of worldwide mining operations.

Do you need a virtual CIO?
Editor's Choice News & Events Infrastructure
If you have a CIO, rest assured that your competitors have noticed and will come knocking on their door sooner or later. A Virtual CIO service is a compelling solution for businesses navigating tough economic conditions.

The TCO of cloud surveillance
DeepAlert Verifier Technews Publishing Surveillance Infrastructure
SMART Security Solutions asked two successful, home-grown cloud surveillance operators for their take on the benefits of cloud surveillance to the local market. Does cloud do everything, or are there areas where onsite solutions are preferable?

Cyber resilience – protect, defend, recover
The challenge with AI is that threats are getting harder to detect. As a result, plans in 2024 are not just about detection and prevention, but about recovery.

Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Top bets for backup and business continuity
Become your organisation’s data pioneer and spearhead data governance and protection of critical data. Challenge why best practices are not adopted or in place, while highlighting the inherent risks this poses.

Next-gen solar-powered switches
Duxbury Networking has introduced its range of solar unmanaged switches, which are ideal for any environment requiring reliable Power-over-Ethernet (PoE) capabilities, such as IP phones, cameras, and access points.

Navigating South Africa's cybersecurity regulations
Sophos Information Security Infrastructure
[Sponsored] Data privacy and compliance are not just buzzwords; they are essential components of a robust cybersecurity strategy that cannot be ignored. Understanding and adhering to local data protection laws and regulations becomes paramount.