Do you have a question? Want to learn more about our products and solutions, the latest career opportunities, or our events? We're here to help. Get in touch with us.
Do you have a question? Want to learn more about our products and solutions, the latest career opportunities, or our events? We're here to help. Get in touch with us.
We've received your message. One of our experts will be in touch with you soon.
Cybercrime is a crime of opportunity. When cybercrime happens, it’s most often because a door or window has been inadvertently left unlocked.
The last three years are a prime example of that. It’s been reported that the COVID-19 pandemic increased the rate of data breaches by 400%*, with hackers all over the world creating waves of chaos that exploited the opportunities created by the mass shift to working from home.
Karl Wright, Datacom’s Chief Information Security Officer, says that organisations have gone from a ‘castle and moat’ perimeter security defence to throwing the doors wide open – sometimes without hiring enough guards to secure every entrance.
“It’s not that organisations are less secure than they were two years ago, but the opportunity to exploit people is that much higher now.”
The cyber-hacking community is increasingly sophisticated, using cutting-edge technology to attack and even offering ransomware-as-a-service, giving non-coders the ability to buy an advanced ransomware programme. The speed at which you can be compromised has also increased many-fold – attacks that previously took days or even months to execute, can now happen in a matter of minutes.
Whether you run your workloads in the public cloud, a private cloud or any combination of IT environments, ensuring the protection of that data comes with its own set of challenges and best practices.
“Most organisations underestimate consolidating their risk within the cloud. What people are not necessarily factoring in is the economy of having all your systems and data together versus the additional risk that you’re taking on, and that’s because the risk of having it hacked is not a bill you get at the end of every month,” says Karl.
Our best advice? Don’t waste time living in fear of the ‘bogeyman’. Instead, prioritise
the processes and practices that protect your vulnerabilities and dedicate time to run regular response scenarios.
Pay attention to both your perimeter security and your in-depth defences in the cloud, because if you’ve concatenated your business systems in the cloud, your business risk is likely concentrated too.
And, remember, practice makes perfect – make sure you have regular, scheduled dry runs on your response activities.
In our most recent cloud survey, 99% of respondents said they plan on moving to a multi-cloud environment. What does that mean for data protection? In a multi-cloud environment, you’ll be creating data that needs backing up from a range of applications and workloads across different cloud environments. Things can quickly get complicated.
Visibility is critical as your data sprawls.
The challenge with multi-cloud is getting the visibility you need to keep on top of costs and make good decisions about your storage and data protection approach. Our recommendation is to choose a data protection platform that allows you to back up data created on any cloud into a single system that spans all your environments. This increases visibility, improves cost management, simplifies compliance, enhances your ability to mine value from your entire dataset and can help with your security posture.
This article was created in partnership with Veritas.