Organizations should follow several best practices to address backup vulnerability.
The Verizon 2020 Data Breach Investigations Report, which you can find here, reveals that when it comes to breaches and cyberattacks, there are differences between SMBs (less than 1,000 employees) and larger enterprises (greater than 1,000 employees). The most notable difference is that malware attacks are twice as likely for SMBs.
Managed service providers should be concerned about this statistic because, in many cases, MSPs are small businesses serving other small businesses. MSPs must communicate the value of backup and continuity while ensuring the right practices to protect their backups are in place.
Backups are often a company’s last line of defense. If ransomware infects a server, a backup solution holds the key to restoring critical data. However, not all backups are created equally. For example, restore times can vary widely depending on the solution you have in place. Even worse, hackers often target backups themselves. In this article, we’ll explore four ways hackers might try to infiltrate your backups and proven methods to help ensure your backups are safe and readily available for fast restores.
The Verizon 2020 DBIR report uses the VERIS Framework to categorize threats into a variety of buckets. For this article, we will focus on hacking, which, according to the report, occurred in 45% of incidents. Let’s dive into this specific risk, its associated backup vulnerability and how you can mitigate risk to your backups.
The Risk
With regards to backup, hackers are increasingly looking at vulnerabilities in the following places:
Methods to Protect Backup Solutions from Cyberattacks
Given the importance of a solid backup and business continuity strategy, you should follow several best practices to ensure your backups are secure.
When it comes to cyberattacks and security risks, the most common ways of compromising primary data also apply to backup data. Cunning attackers want to make sure companies cannot recover PC, servers or virtual machines, which is why backup solutions are now under attack.
Your backup files may be your absolute last line of defense, so how can you protect them? Datto Unified Continuity is a business continuity solution that spans the server to the desktop with the flexibility to backup locally, direct to the cloud or both. Learn about more ways your backup solution may be under attack and how Datto can protect your business and your clients in our eBook, Backup Under Attack: Protecting Your Last Line Of Defense.
Christopher Henderson is Director of Information Security, Datto.
This guest blog is part of a Channel Futures sponsorship.
Session expired
Please log in again. The login page will open in a new tab. After logging in you can close it and return to this page.