Up to 90%! Cyberattacks against backup repositories!

Ransomware attacks are a growing threat to organizations According to the latest Veeam’s Ransomware Trends Report 2023, more and more organizations are falling victim to ransomware attacks, showing that existing protections are still inadequate.

Backups are targeted?!

Ensuring data immutability is of utmost importance, as highlighted by the report indicating that over 93% of cyber attacks focus on backup data, with 75% of these attacks rendering data restoration impossible for the victims. This further underscores the significance of safeguarding data integrity and employing physical isolation measures to protect backup repositories.

Paying the ransom does not guarantee successful data recovery!

The report underscores the criticality of maintaining data immutability, given that more than 93% of cyber attacks target backup data, with 75% of these attacks resulting in victims being unable to restore their data. This highlights the paramount importance of safeguarding data integrity and implementing physical isolation measures to secure backup repositories effectively.

Protect backups and keep data safe during recovery

After a ransomware attack, businesses have two options: pay the ransom or restore data from backups. The study recommends implementing high-level safeguards to ensure that the backup vault is not deleted or destroyed. Enterprises should focus on the immutability of data, such as using immutable cloud services and hard drives. In addition, ensure that the data is clean during the recovery process to avoid reintroducing malicious programs into the production environment.

 

The report also provides other key findings, including the high cost of cyber insurance, the degree of reliance on incident response strategies, and the challenges of enterprise coordination. The report collects data and observations from 1,200 affected businesses and nearly 3,000 cyberattacks, making it one of the largest of its kind. It provides guidance on cyber preparedness and mitigation and is intended for security professionals, CISOs or similar roles, IT operations specialists, and backup administrators.