close
close

TECH INTELLIGENCE: Protect yourself from

TECH INTELLIGENCE: Protect yourself from

Listen to this article

As attacks by criminals become more frequent, an experienced cybersecurity provider recommends that clients protect their data on multiple fronts. For example, your first line of defense should consist of multiple layered digital defenses and extensive employee training. But these “front-end” security measures may not be enough. Smart companies protect themselves by backing up their data as a precaution.

Carl Mazzanti
Mazanti

New technologies such as artificial intelligence have helped cybercriminals improve their attacks. They not only target your data, but are increasingly attacking data backups, making their threats even more serious.

Ransomware is a popular strategy used by criminals. In a smash-and-grab attack, a cybercriminal steals your important data and locks it so you cannot use your important information, then demands a ransom for the data.

Backups are a good defense against ransomware. Instead of paying to restore their important data, victims can restore their information from backups and carry on without any problems.

But what happens if your backup fails or the ransomware affects the backup itself? According to a recent report, 94% of organizations attacked by ransomware last year said their backups were also targeted by cybercriminals.

Businesses can protect their backups with the help of their cybersecurity partner using a 3-2-1 backup strategy. With a 3-2-1 strategy, you have three copies of your data on two types of storage and one copy is stored offsite. Typically, this means the original data, a local backup stored nearby, and an offsite backup. This approach reduces your risk by duplicating and separating your sensitive data.

The local backup offers the convenience of accessibility because it is connected to your primary environment, but this also makes it more vulnerable to an attack. This is why two additional backups that are “air gapped” or separate are essential. Since they are offline – isolated from the main networks – malicious actors have no way of accessing them.

However, performing regular backups is not guaranteed protection. Even without an attack, backups can fail due to software bugs or media errors. Data can be corrupted by storage issues or human error during backup setup.

More Technical intelligence

Cybersecurity
SUBMIT PHOTOS

Your cybersecurity partner can help you test your backups regularly to ensure you can restore your data. This way, you can restore all files to a clean system with the same data as before.

Your testing should confirm that your backup supports “immutability” – a state that ensures no one can change or delete anything. This plays an important role in protecting backups from ransomware. Once someone has created a solid backup, they cannot change it. It cannot be deleted until its retention period has expired.

Another important security consideration is access control. Only authorized people should access backups to modify or delete them when necessary. Use strong methods such as multi-factor authentication to confirm a user's identity. Also, implement access controls that tie permissions to a user's role in the organization rather than to the individual.

To make backups more secure, use “versioned backups,” which are multiple snapshots of the data at different points in time. Unlike a traditional backup that simply overwrites the previous copy, versioned backups preserve multiple previous states of your data. This way, if someone changes or deletes a file, you can restore it to a specific version before the change.

Versioned backups are important because they allow you to restore your data to a safe state after a ransomware attack. When implementing versioning, it's worth considering how many versions to keep and for how long. The combination depends on both the type of data and your storage capacity.

Using strong encryption such as AES-265 for your backup data helps protect it from unauthorized access. This scheme helps protect your data even if someone tries to hack into your backup. You should manage the encryption keys securely and avoid storing them with the backups.

Network monitoring also plays an important role in any ransomware defense strategy. This process alerts appropriate personnel when unusual behavior or unauthorized access occurs.

Companies that take digital defenses, develop and implement a robust backup strategy, and utilize regular updates are less vulnerable to disruptions. They also benefit from solid cyber protection strategies. These initiatives help them defend against attackers who target companies and other entities.

Carl Mazzanti is president of eMazzanti Technologies in Hoboken, providing IT consulting and cybersecurity services to companies ranging from home offices to multinational corporations.

Related Post