News and Blog
Cybercrime is the greatest threat to every company in the world, with cyber criminals now doubling down on ransomware attacks, deploying more sophisticated campaigns at a time when remote working is already creating additional security challenges for businesses and its impact is reflected in the numbers.
CRN®, a brand of The Channel Company and top technology news and information source for solution providers, has named Asigra to its second annual Storage 100 list in the 20 Coolest Data Protection Companies. The Storage 100 list recognizes industry-leading storage vendors that provide transformative products and services.
Data Protection has a long and storied 70 years of history, with Asigra entering the backup & recovery arms race in April of 1986. Asigra’s pioneering agentless technology and innovative products have changed the way a generation of IT professionals manage modern data recovery.
How RMM Has Become the Latest Ransomware Attack Vector That Compromises Backup Defenses – Part 2: The RMM Attack Vector
How RMM Has Become the Latest Ransomware Attack Vector That Compromises Backup Defenses – Part 1: Ransomware Goes After Your Backups
Ransomware is insidious. It is constantly evolving with new variants appearing literally every 18 seconds. That’s 4800 new ransomware code every single day or more than 1.75 million per year. This is a multi-billion USD business. It’s organized criminality and frequently state sponsored. The profits to cybercriminals are compelling.
The rapid rise and evolution of malware, especially ransomware has changed data protection forever. The conventional wisdom has been for years that the best way to defeat malware and ransomware is to have a good clean backup. The malicious actors behind malware in general and ransomware specifically know this and are now both attacking backups and using them as an attack vector. Multiple overlapping data protection systems provide more potential attack vectors that compromise security.
Compliance has moved from a secondary consideration to a primary one. The emergence of personally identifiable information (PII) regulations worldwide with harsh financial penalties has changed the data protection landscape. Multiple overlapping data protection make compliance much more difficult by duplicating processes that increase the probability of non-compliance.
Data is the crown jewels of every organization. Failure to protect it from loss, outages, theft, human error, malware, ransomware, and natural disasters is fiduciary irresponsibility. Just as threats to that data have ramped up increasing at an alarming rate, many IT pros have come to believe more is better. More backups, more data protection systems, and more frequency (shorter RPOs). The reality has proven to be a lot more problematic especially when it comes to recovery processes.
This is a multipart blog series that explores how multiple data protection systems frequently devastate backup, recovery, compliance, and security processes while blowing up the budget.