Cyberattacks the #1 cause of business outages

January 2024 Editor's Choice, Information Security, Infrastructure

Veeam Software has released insights from the company’s fifth annual Veeam Data Protection Trends Report. While companies say they will spend more trying to fend off cyberattacks, the survey found IT leaders are feeling even less protected and more concerned about their ability to recover and restore mission-critical data. Respondents shared that cyberattacks remain the top cause of outages and that while organisations are putting more emphasis on using the cloud for major recoveries, only a small percentage believe they would be able to recover from even a small crisis in under a week.

Highlights of the Veeam Data Protection Trends Report 2024:

• Cyberattacks are the #1 cause of outages: For the fourth year, cyberattacks were listed as the most common and impactful causes of business outages across organisations. The fact that other types of outages followed closely behind – infrastructure/networking, storage hardware, application software, public cloud resources, and server hardware – illustrates the growing need for modernised backup strategies.

• Ransomware continues to be a ‘when’ not an ‘if’: 76% of organisations were attacked at least once in the past 12 months. While this number is down from 85% in 2023, 26% reported being attacked at least four times this past year. So, according to the report, more organisations were hit quarterly than those who believe they were not attacked at all. Recovery is still a major concern, as only 13% said they can successfully orchestrate recovery during a DR situation.

• Digital transformation is being hampered by cyberattacks: The survey ranked protecting against cyber threats and addressing environmental, social, and governmental goals as the biggest inhibitors to IT modernisation and digital transformation initiatives. These factors scored higher than usual struggles related to skills, economic concerns and organisational issues, due to the amount of effort and resources that were being diverted from digital transformation or IT modernisation investments.

• Only 32% of organisations believe they can recover from a small attack, crisis or outage within a week: While most organisations consider cyber resiliency a foundational aspect of their broader business continuity or disaster recovery (BC/DR) strategy, BC/DR preparedness is not yet passing most SLA expectations. When asked how long IT would need to recover 50 servers, only 32% believed their IT staff could recover the servers within five business days. Other supporting statistics reflect that the growing gap between what data protection business units expect and what IT services can deliver is increasing. When asked about their latest large-scale cyber/disaster test, less than three out of five (58%) servers were recoverable within expectations.

• Data protection budget increases are accelerating: Data protection budgets are expected to grow by 6,6% in 2024. This is the second straight year that the survey revealed that data protection spending growth will outpace IT spending growth[1]. Overall, 92% of organisations expect to spend more on data protection in 2024 to continue to prepare against cyberattacks, as well as the changing production landscape that requires different approaches to data protection.

• Data protection and IT security are becoming more integrated: For the second straight year, survey respondents consider the most common and most important aspect of a modern data protection solution to be one that integrates with cyber security tools. Two out of five (41%) consider some aspect of mobility in cloud scenarios as the most important characteristic of a modern solution, including the ability to move a workload from one cloud to another and the standardisation of protection between on-premises workloads and IaaS/SaaS.

“Ransomware continues to be the biggest threat to business continuity,” said Dave Russell, VP of Enterprise Strategy at Veeam. “It is the number one cause of outages today, and protecting against it is hampering digital transformation efforts. Furthermore, although companies are increasing their spend on protection, less than a third of companies believe they can recover quickly from a small attack. The findings in this year’s Veeam Data Protection Trends Report highlight the need for continued cyber vigilance, and the importance of every organisation to ensure they have the right protection and recovery capabilities.”

Other notable insights from the report include:

• Most organisations are using containers but not backing them all up: Container usage continues to rise, with 59% of enterprises running them in production, and another 37% either rolling them out or planning to. Unfortunately, only 25% of organisations use a backup solution that is purpose-built for containers, while the rest of organisations back up only some of the underlying components, e.g., storage repositories or database contents. Neither tactic ensures that the applications and services will be resumable after a crisis, or even a simple import/configuration error that needs to be undone.

• 2024 will see significant job changes outside the organisation: The fact that 47% of respondents expressed an intent to seek a new job outside their current organisation within the next twelve months represents both a challenge and an opportunity for data protection initiatives. While losing valuable data protection talent puts organisations at a significant disadvantage when crises inevitably strike, the market shift presents an opportunity to add knowledge to protect modern production workloads that reside in clouds, such as Microsoft 365, Kubernetes containers, or other IaaS/PaaS deployments.

• Hybrid production architectures are forcing a reconsideration of ‘backup’: For the second straight year, the two most important considerations for ‘enterprise backup’ solutions are reliability and the protection of cloud-hosted workloads (IaaS and SaaS). This is problematic for organisations relying on older data centre-centric data protection solutions. As organisations move workloads from one platform or cloud to another, IT teams relying on legacy backup solutions that do not offer equitable protection of cloud-hosted workloads will struggle to maintain SLAs, particularly those that embrace cloud-native offerings like Microsoft 365/Salesforce (SaaS) or containers.

Download the complete Veeam Data Protection Trends Report 2024 at https://vee.am/DPR24.

Resource

[1] Gartner Forecast Alert: IT Spending, Worldwide, 2Q23 Update; Published: 06 September 2023 ID: G00795167; Analyst(s): John-David Lovelock, Linglan Wang




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.