Robust data backup is a vital ransomware defence

Issue 1 2022 Infrastructure

It’s common knowledge that ransomware attacks are on the rise and organisations need to be realistic about what this means for their security. The number of entry points into IT systems that attackers can exploit has skyrocketed in recent years. According to the FBI, there has been a 300% rise in cybercrimes during the pandemic as more people log in to their work systems from home networks and personal devices.

Ransomware isn’t going anywhere. Rising global connectivity, the recent rapid adoption of digital communication technologies and remote working all create potential new ‘doors’ into IT systems. Growing technologies such as the cloud, 5G and the IoT means our connectivity will continue to multiply, meaning more doors and more opportunity for ransomware success.

Ideally, you’ll stop all attacks in their tracks, but that’s not always possible. Having a robust backup strategy is essential if you’re going to be able to take back control and recover your data in the event of an attack.

So, what are the three key areas you should be focusing on when it comes to data protection?

1, Create robust backups and immutable storage

You can never know when an attack may mean you have to restore your entire estate. So where do you start?

Recognise that your biggest challenge is probably that your data is getting increasingly harder to manage and control, due to spiralling levels of data volumes and types. It might also be spread across multiple locations or saved on a hybrid network which uses cloud storage, in itself increasing vulnerability. This can complicate your data backup processes and your IT teams can quickly find themselves relying on multiple different backup tools which are costly, confusing to manage and a drain on resources.

It’s important to ensure that you have clean, non-infected backup copies that you can rely on as your last line of defence. Prioritise finding a backup solution that’s flexible enough to handle complex data requirements, including cloud storage and that will simplify management so that you can back up everything at the click of a button, or even automatically.

2. Factor in security

Take a realistic look at your legacy tools because they tend to become outdated quickly and are unable to match the wide range of assets and threat types. In my experience, they can’t provide robust data protection because they rely on how a system used to work, rather than on how it currently works.

Moving to a modern tool with high specification security is vital in your battle against the effects of ransomware. The best solutions will provide WORM storage (write once, read many), with the option to turn on object lock, meaning that once data has been written it can’t be erased, not even by the administrator. And more importantly, this feature needs to be available across multiple hosting points, whether it be public clouds, on premises or hosted private clouds.

Data protection and network security are interdependent, so your storage and backup solution choices should also consider network security and the anti-malware functionality of your current set up, including any networks that remote workers may be using. Consider using a separate network for your backup data, with just one link between the production data and the storage data.

3. Build in consistent monitoring

Your security team needs to have constant visibility of any attacks in order to thwart them at the right time, so continuous 24/7 threat monitoring is important. Look for a single solution that can span all your sites and multiple storage locations, or it’ll be impossible to get a complete overview of your whole estate. This will also make reporting easier and simpler and a system that incorporates automation can provide round-the-clock monitoring without draining your resources.

Updating your data backup system can also simplify your security processes, offering single-click orchestration capabilities, so your policy-driven backup and replication is always available. It’s important for the solution you choose to have capabilities to proactively track unusual usage behaviour and raise alerts for deep dive diagnosis.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Five tech trends shaping business in 2025
Information Security Infrastructure
From runaway IT costs to the urgent need for comprehensive AI strategies that drive sustainable business impact, executives must be prepared to navigate a complex and evolving technology environment to extract maximum value from their investments.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Navigating today’s cloud security challenges
Information Security Infrastructure
While the cloud certainly enables enterprises to quickly adapt to today’s evolving demands, it also introduces unique challenges that security teams must recognise and manage. Vincent Hwang offers insights from the 2025 State of Cloud Security Report.

Read more...
The rise of autonomous data recovery
Information Security Infrastructure
Escalating cyberthreats and attacks constantly put businesses under pressure, increasingly prompting organisations to shift their mindsets towards ensuring continuous operations and thus avoiding downtime and revenue loss.

Read more...
Can we really fight AI cybersecurity threats with more AI?
Information Security Infrastructure
In a world where artificial intelligence (AI) is increasingly being weaponised by cybercriminals, the question of whether we can effectively combat AI threats with more AI is not just a technical inquiry but a pressing global concern

Read more...
Partnership delivers 40% storage savings for surveillance
Surveillance Infrastructure
Large-scale video surveillance users and applications demanding extended storage periods will benefit from up to 40% savings on video storage hardware stacks thanks to a new partnership between IDIS and Secure Logiq.

Read more...
How smart video is transforming storage at the edge
Infrastructure Surveillance
As these technologies come together, they are impacting the architecture of the edge and what we require from data storage. More specifically, they are driving a demand for specialised storage.

Read more...
VPS hosting set to dominate in 2025
Infrastructure
SME market growth and the increasing need for a digital footprint are pushing VPS growth in South Africa, especially since it is now perceived as a viable business tool, scalable by nature, with improved performance.

Read more...
Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Highest capacity ePMR HDDs
Infrastructure Products & Solutions
Western Digital has announced that it is now shipping the world’s highest capacity UltraSMR HDD with up to 32TB leveraging the time-tested, reliable energy-assisted PMR (ePMR) recording technology for hyperscalers, CSPs and enterprises.

Read more...