News and Blog
How RMM Has Become the Latest Ransomware Attack Vector That Compromises Backup Defenses – Part 2: The RMM Attack Vector
How RMM Has Become the Latest Ransomware Attack Vector That Compromises Backup Defenses – Part 1: Ransomware Goes After Your Backups
Ransomware is insidious. It is constantly evolving with new variants appearing literally every 18 seconds. That’s 4800 new ransomware code every single day or more than 1.75 million per year. This is a multi-billion USD business. It’s organized criminality and frequently state sponsored. The profits to cybercriminals are compelling.
The rapid rise and evolution of malware, especially ransomware has changed data protection forever. The conventional wisdom has been for years that the best way to defeat malware and ransomware is to have a good clean backup. The malicious actors behind malware in general and ransomware specifically know this and are now both attacking backups and using them as an attack vector. Multiple overlapping data protection systems provide more potential attack vectors that compromise security.
Compliance has moved from a secondary consideration to a primary one. The emergence of personally identifiable information (PII) regulations worldwide with harsh financial penalties has changed the data protection landscape. Multiple overlapping data protection make compliance much more difficult by duplicating processes that increase the probability of non-compliance.
Data is the crown jewels of every organization. Failure to protect it from loss, outages, theft, human error, malware, ransomware, and natural disasters is fiduciary irresponsibility. Just as threats to that data have ramped up increasing at an alarming rate, many IT pros have come to believe more is better. More backups, more data protection systems, and more frequency (shorter RPOs). The reality has proven to be a lot more problematic especially when it comes to recovery processes.
This is a multipart blog series that explores how multiple data protection systems frequently devastate backup, recovery, compliance, and security processes while blowing up the budget.
The traditional 3-2-1 backup process has been ballyhooed as an effective defense against ransomware, but that is no longer the case.
Like other technology segments, data protection has not been sheltered from the evolution of technology which is evolving as cloud computing, new regulatory requirements and a rise in malware targeting primary and secondary data increases in prevalence. Based on input from hundreds of IT services companies as well as industry experts and analysts, Asigra is forecasting five predictions expected to drive the evolution of data protection infrastructure over the next 12 months.
This is part four of five in a series on Ransomware that will discuss the growth of ransomware, recent WannaCry attacks, tips to safeguard our data and also includes an interview with our VP of Marketing who shares what Asigra’s solutions can do to prevent attacks.