https://www.engineeringnews.co.za
Africa|Business|Defence|Financial|SECURITY|Service|Surface|Technology
Africa|Business|Defence|Financial|SECURITY|Service|Surface|Technology
africa|business|defence|financial|security|service|surface|technology

Data management is the core of ransomware readiness

5th October 2022

     

Font size: - +

This article has been supplied as a media statement and is not written by Creamer Media. It may be available only for a limited time on this website.

By Kate Mollett, Regional Director at Commvault Africa

Ransomware is one of the biggest threats and challenges facing organisations today. A simple online search will reveal hundreds of high-profile attacks and scary statistics around the acceleration of ransomware incidents and the costs involved. Mitigating this threat has become essential to survival in a digital world, but this is about more than just security. Data management plays a core role in minimising the risk of ransomware, protecting data, detecting threats, and recovering fast, as well as in delivering critical insight into data and tools to enable you to respond to threats and continuously improve security stature.  

The state of ransomware 

Ransomware is accelerating and showing no signs of slowing down. Every time new statistics are released, they show record highs in the number of attacks and the financial implications and collateral damage, including ransomware pay-outs, critical downtime, and costly reputational damage. Many businesses are simply not adequately prepared to handle a ransomware event because the attack types have become increasingly sophisticated, with purpose-built ransomware tools that are being leveraged at scale by organised groups. 

Added to this is the recent migration to a remote workforce which has driven more data to the edge, and growing cloud transformation and Software as a Service (SaaS) adoption, which has vastly increased the attack surface. It has never been more critical to shift mindsets and adopt a strategy that incorporates measures to not only prevent attacks but also give business the tools to properly recover when an attack does hit. 

Proactive data recovery strategy

One thing that all organisations need to do is adopt global best practice standards around cybersecurity, such as the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This framework offers guidelines to help today’s organisations become ransomware ready and deliver a repeatable structure to enable the effective response to a breach. This in turn helps businesses to better understand, manage and reduce cybersecurity risk. 

It is a broad guide that covers multiple aspects of cybersecurity. However, data protection and data management play a critical role in establishing this framework. Effectively, data protection forms an organisation’s last line of defence against a ransomware attack, enabling you to reduce downtime, fully recover and effectively minimise the impact of a data breach. 

A multi-layered approach to data protection

There are three key elements to address to ensure comprehensive ransomware protection: protect, detect and recover. The protect element involves insulating data from successful breaches, detection is the ability to spot and identify attacks before they can cause damage, and recover is the ability to perform fast and reliable data restoration. 

These three key pillars are supported by a number of different elements. These include data encryption both at rest and in flight, isolated data air gaps, early threat detection including anomaly detection, trend analysis and honeypots, multi-factor authentication, zero-trust access controls and immutable data backups. On top of this, organisations can benefit from advanced tools and insights to help them continuously evaluate and improve on their backup security stature, gain real-time visibility into critical events, anomalous activities and vulnerabilities, and make informed recovery decisions. 

Ultimately, the goal is to drive better security outcomes and minimise the growing threat of ransomware. This is achieved through effective tools and strategies that help keep data secure and compliant, allow it to be recoverable, protect it and isolate it from attack and ensure business can rapidly get back online.

Edited by Creamer Media Reporter

Comments

Showroom

Weir Minerals Africa and Middle East
Weir Minerals Africa and Middle East

Weir Minerals Europe, Middle East and Africa is a global supplier of excellent minerals solutions, including pumps, valves, hydrocyclones,...

VISIT SHOWROOM 
Booyco Electronics
Booyco Electronics

Booyco Electronics, South African pioneer of Proximity Detection Systems, offers safety solutions for underground and surface mining, quarrying,...

VISIT SHOWROOM 

Latest Multimedia

sponsored by

Option 1 (equivalent of R125 a month):

Receive a weekly copy of Creamer Media's Engineering News & Mining Weekly magazine
(print copy for those in South Africa and e-magazine for those outside of South Africa)
Receive daily email newsletters
Access to full search results
Access archive of magazine back copies
Access to Projects in Progress
Access to ONE Research Report of your choice in PDF format

Option 2 (equivalent of R375 a month):

All benefits from Option 1
PLUS
Access to Creamer Media's Research Channel Africa for ALL Research Reports, in PDF format, on various industrial and mining sectors including Electricity; Water; Energy Transition; Hydrogen; Roads, Rail and Ports; Coal; Gold; Platinum; Battery Metals; etc.

Already a subscriber?

Forgotten your password?

MAGAZINE & ONLINE

SUBSCRIBE

RESEARCH CHANNEL AFRICA

SUBSCRIBE

CORPORATE PACKAGES

CLICK FOR A QUOTATION







sq:0.302 0.354s - 160pq - 2rq
Subscribe Now