FUTURE TECHNOLOGY criminals at this final stage will encrypt their victim ’ s data and wipe all records and backups . This entire process might unfold over the course of a year or even multiple .
Bulletproof backup
The discovery that malicious actors can inhabit your systems unseen for a year or more while you are none the wiser can be daunting for businesses . But it is crucial knowledge and never fails to create a sense of urgency when implementing a robust data security strategy .
Every minute your business passes without this in place is another minute that cybercriminals can carry out the groundwork that will later cause a lot of pain . So , armed with this knowledge , what steps do businesses need to take ?
The biggest concern is the usability of backups for recovery after an attack . Suppose your system was breached a year ago without your knowledge . In that case , there is a very high likelihood that your backups are impacted , meaning you will try to restore your data using a compromised backup . Fortunately , this can be avoided with the proper preparation and the right backup strategy in place .
Suppose your system was breached a year ago without your knowledge , in that case , there is a very high likelihood that your backups are impacted .
Getting hit by a ransomware attack is almost inevitable for the modern enterprise , with 85 % of organisations experiencing at least one cyber-attack in 2022 , nearly 10 % more than the previous year . Moreover , as cybercriminals increasingly target backups , the road to recovery can be longer than ever . Thinking of ransomware attacks as a case of when , not if , means recognising that you will need to use your backup to restore your critical data when the time comes . Acknowledging this should spur businesses
to invest serious time and resources to ensure their backups are ironclad .
This is possible by following the golden rule of backup : 3-2-1-1-0 . This requires three copies of data stored on two different media , one stored off-site and one air-gapped and immutable . Across these copies , there needs to be zero errors .
Working under the assumption that cybercriminals will target your backup means taking precautions so you retain at least one untouched copy to use for your recovery . It is like keeping your money in a bank and making copies of essential documents in case your house gets burgled – thieves will target your safe , so storing valuables offsite and making copies provides peace of mind .
Implementing a 3-2-1-1-0 backup strategy is not a one-time thing . You must constantly monitor and test your backups , checking for errors and cleaning your data as needed . Cybercriminals rely on businesses not doing this , you can stay one step ahead by remaining strict on your data strategy .
Managing chaos
Ransomware is a disaster , and disaster recovery takes time . According to the latest
INTELLIGENT TECH CHANNELS 35