It has been reported that when attackers breach your network, they often first go after your backups in an attempt to corrupt them so that you have no option to get your data back but to pay the ransom. I recently saw some statistics that when they gain access to the backups, they are at least partially successful in disabling or corrupting them.
What would you do if only 40% or 50% of your data was recoverable? That would be a nightmare scenario.
Recently, we have had a dramatic uptick in "holiday weekend" cyberattacks against K-12 in the region. It has become clear to me that much of the success of these attacks is self-inflicted. Seemingly innocent errors that districts are making in foundational aspects of their security structure opening the door to attackers and needlessly exposing the district.
Regardless of what you are using for backups, it is most likely not enough, and improvements need to be made to sure up your last line of defense.
Our friends at Veeam have introduced some truly remarkable features into their backup offering. Veeam has always been great because "it just works" and the complete ease and remarkable speed of VM restorations.
However, now they are addressing the weak spots in many districts' backup strategies.
Scott Quimby, CISSP Watch it here
You must be logged in to post a comment.