Cyberattacks the #1 cause of business outages

January 2024 Editor's Choice, Information Security, Infrastructure

Veeam Software has released insights from the company’s fifth annual Veeam Data Protection Trends Report. While companies say they will spend more trying to fend off cyberattacks, the survey found IT leaders are feeling even less protected and more concerned about their ability to recover and restore mission-critical data. Respondents shared that cyberattacks remain the top cause of outages and that while organisations are putting more emphasis on using the cloud for major recoveries, only a small percentage believe they would be able to recover from even a small crisis in under a week.

Highlights of the Veeam Data Protection Trends Report 2024:

• Cyberattacks are the #1 cause of outages: For the fourth year, cyberattacks were listed as the most common and impactful causes of business outages across organisations. The fact that other types of outages followed closely behind – infrastructure/networking, storage hardware, application software, public cloud resources, and server hardware – illustrates the growing need for modernised backup strategies.

• Ransomware continues to be a ‘when’ not an ‘if’: 76% of organisations were attacked at least once in the past 12 months. While this number is down from 85% in 2023, 26% reported being attacked at least four times this past year. So, according to the report, more organisations were hit quarterly than those who believe they were not attacked at all. Recovery is still a major concern, as only 13% said they can successfully orchestrate recovery during a DR situation.

• Digital transformation is being hampered by cyberattacks: The survey ranked protecting against cyber threats and addressing environmental, social, and governmental goals as the biggest inhibitors to IT modernisation and digital transformation initiatives. These factors scored higher than usual struggles related to skills, economic concerns and organisational issues, due to the amount of effort and resources that were being diverted from digital transformation or IT modernisation investments.

• Only 32% of organisations believe they can recover from a small attack, crisis or outage within a week: While most organisations consider cyber resiliency a foundational aspect of their broader business continuity or disaster recovery (BC/DR) strategy, BC/DR preparedness is not yet passing most SLA expectations. When asked how long IT would need to recover 50 servers, only 32% believed their IT staff could recover the servers within five business days. Other supporting statistics reflect that the growing gap between what data protection business units expect and what IT services can deliver is increasing. When asked about their latest large-scale cyber/disaster test, less than three out of five (58%) servers were recoverable within expectations.

• Data protection budget increases are accelerating: Data protection budgets are expected to grow by 6,6% in 2024. This is the second straight year that the survey revealed that data protection spending growth will outpace IT spending growth[1]. Overall, 92% of organisations expect to spend more on data protection in 2024 to continue to prepare against cyberattacks, as well as the changing production landscape that requires different approaches to data protection.

• Data protection and IT security are becoming more integrated: For the second straight year, survey respondents consider the most common and most important aspect of a modern data protection solution to be one that integrates with cyber security tools. Two out of five (41%) consider some aspect of mobility in cloud scenarios as the most important characteristic of a modern solution, including the ability to move a workload from one cloud to another and the standardisation of protection between on-premises workloads and IaaS/SaaS.

“Ransomware continues to be the biggest threat to business continuity,” said Dave Russell, VP of Enterprise Strategy at Veeam. “It is the number one cause of outages today, and protecting against it is hampering digital transformation efforts. Furthermore, although companies are increasing their spend on protection, less than a third of companies believe they can recover quickly from a small attack. The findings in this year’s Veeam Data Protection Trends Report highlight the need for continued cyber vigilance, and the importance of every organisation to ensure they have the right protection and recovery capabilities.”

Other notable insights from the report include:

• Most organisations are using containers but not backing them all up: Container usage continues to rise, with 59% of enterprises running them in production, and another 37% either rolling them out or planning to. Unfortunately, only 25% of organisations use a backup solution that is purpose-built for containers, while the rest of organisations back up only some of the underlying components, e.g., storage repositories or database contents. Neither tactic ensures that the applications and services will be resumable after a crisis, or even a simple import/configuration error that needs to be undone.

• 2024 will see significant job changes outside the organisation: The fact that 47% of respondents expressed an intent to seek a new job outside their current organisation within the next twelve months represents both a challenge and an opportunity for data protection initiatives. While losing valuable data protection talent puts organisations at a significant disadvantage when crises inevitably strike, the market shift presents an opportunity to add knowledge to protect modern production workloads that reside in clouds, such as Microsoft 365, Kubernetes containers, or other IaaS/PaaS deployments.

• Hybrid production architectures are forcing a reconsideration of ‘backup’: For the second straight year, the two most important considerations for ‘enterprise backup’ solutions are reliability and the protection of cloud-hosted workloads (IaaS and SaaS). This is problematic for organisations relying on older data centre-centric data protection solutions. As organisations move workloads from one platform or cloud to another, IT teams relying on legacy backup solutions that do not offer equitable protection of cloud-hosted workloads will struggle to maintain SLAs, particularly those that embrace cloud-native offerings like Microsoft 365/Salesforce (SaaS) or containers.

Download the complete Veeam Data Protection Trends Report 2024 at https://vee.am/DPR24.

Resource

[1] Gartner Forecast Alert: IT Spending, Worldwide, 2Q23 Update; Published: 06 September 2023 ID: G00795167; Analyst(s): John-David Lovelock, Linglan Wang




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Deepfakes and digital trust
Editor's Choice
By securing the video right from the specific camera that captured it, there is no need to prove the chain of custody for the video, you can verify the authenticity at every step.

Read more...
A new generational framework
Editor's Choice Training & Education
Beyond Generation X, and Millennials, Dr Chris Blair discusses the seven decades of technological evolution and the generations they defined, from the 1960’s Mainframe Cohort, to the 2020’s AI Navigators.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Key design considerations for a control room
Leaderware Editor's Choice Surveillance Training & Education
If you are designing or upgrading a control room, or even reviewing or auditing an existing control room, there are a number of design factors that one would need to consider.

Read more...
CCTV control room operator job description
Leaderware Editor's Choice Surveillance Training & Education
Control room operators are still critical components of security operations and will remain so for the foreseeable future, despite the advances of AI, which serves as a vital enhancement to the human operator.

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
A passport to offline backups
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure Smart Home Automation
SMART Security Solutions tested a 6 TB WD My Passport and found it is much more than simply another portable hard drive when considering the free security software the company includes with the device.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...