Intelligent CIO APAC Issue 13 | Page 34

EDITOR ’ S QUESTION
NATHAN STEINER , HEAD OF SYSTEMS ENGINEERING AT
VEEAM SOFTWARE

Ransomware attacks are like bed bugs . We know that they will never cease to exist , are opportune and make the lives of their victims a living hell . Just one bug is all it takes for a full-blown infestation . Yet if you inspect your furniture regularly , vacuum often and cut back on clutter , bed bugs are easily avoided . In the same vein , preventative precautions such as offsite and offline backups and the right security measures will mitigate the risk of a ransomware attack .

However , when it comes to security and data backups , the reality between what should be done and what is happening is startling . Veeam ’ s Data Protection Report 2021 uncovered that 16 % of all data in ANZ organizations is not backed up , which is 2 % higher than the global average . So , to better protect their most valued asset , organizations must implement and maintain localized , preventative precautions , which include :
• Focusing on prevention : As with any pest , for everyone you find , there ’ s always one you miss . In this day and age , cyberattacks are inevitable – it ’ s how you mitigate them that counts . The 3-2-1 Rule offers an excellent framework for a data management strategy , recommending that there should be at least three copies of important data , on at least two different types of media , with at least one of these copies being off-site . No matter which attack vector the malicious actor bypasses , your data will not be compromised if you follow the 3-2-1 Rule .
When it comes to security and data backups , the reality between what should be done and what is happening is startling .
• Establishing a solid line of defense : Just as the four walls of your house are an insufficient method of pest prevention , more than one layer of fortification is required to protect your data . Endpoint protection and encrypted backups offer an additional layer of ransomware resiliency . Endpoint protection examines files as they enter the network , authenticates log-in attempts and quickly detects malware , preventing data loss . Even if a malicious actor infiltrates your system , encrypted backups act as the trap inside the door , safeguarding your data .
• Sustaining efforts : To protect your home from bugs , you have to monitor for signs of their presence continuously . When it comes to data protection , an on-going effort built upon a consistent best-practice approach is required . While responding correctly to phishing emails and software updates might seem like common sense , these are some of the most common ways hackers reach their prey . Ensuring you have sturdy educational protocols in place for your staff will help keep employees up-to-date with evolving threats and empower your workforce to mitigate them correctly .
When it comes to fighting back against any unwanted infiltrators , the most robust precautions are preventative measures . As ransomware attacks continue to escalate in frequency and sophistication , organizations must take the necessary precautions to banish the threat before it becomes an infestation .
34 INTELLIGENTCIO APAC www . intelligentcio . com