Protect backups easily and effectively against ransomware

Protect backups easily and effectively against ransomware

Share post

Backups serve to protect against data loss. If an original is lost, you still have a copy to be on the safe side, as a “backup”. Backing up data could be that easy in a world free of ransomware and natural disasters. But nowadays IT managers have to think a lot more. FAST LTA shows you what a secure, reliable and affordable backup strategy looks like.

Ransomware changes the focus of data protection from backup to recovery. Ransomware encrypts user data so that access is no longer possible. The result: IT stands still, which leads to high costs due to failure, recovery and the actual ransom payment. In addition to protection against infection, the most important measure is therefore a functioning backup strategy. But: More than 90 percent of the attacks are aimed at the backups before data encryption. And almost three quarters are successful.

The complexity increases with the requirements

This is why backups also need special protection. In addition to fast flash backups in order to be ready for use again promptly, disk backups must be secured by snapshots and geo-redundancy. The physical outsourcing of backups (air gap), but also unchangeable storage S3 compatible object stores ensure the final security. However, most companies cannot completely replace their entire storage infrastructure at once. Long-term maintenance contracts and depreciation ensure gradual replacement and increasing complexity in installation, operation and maintenance.

"Start Anywhere” with Silent Bricks

Silent Bricks are individually configurable storage units that can be used as Network Attached Storage (NAS) via SMB/NFS, Virtual Tape Library (VTL) or as S3-compatible object storage. There is a choice of flash and disk configurations as well as conventional and mobile storage containers. Each area scales independently and at any time. If the replacement of a standard RAID with hard disk-based Silent Bricks is planned for the beginning, other areas - flash memory, air gap as VTL or use as S3-compatible object storage - can be retrofitted at any time. A simple expansion of the storage capacity is usually sufficient, which significantly reduces the incremental costs.

The reward is one at the end Storage system that meets all the requirements of modern backup strategies, which minimizes complexity and leads to significant cost reductions in the long term. Completely without tape. Our free white paper tells you how you can easily and effectively design a ransomware-proof backup.

To the white paper at FAST-LTA.de

 


About FAST LTA the

FAST LTA is the specialist for secure secondary and long-term storage systems. The combination of durable and low-maintenance hardware, integrated software for data backup and on-site maintenance contracts with a term of up to 10 years ensure long-term, cost-effective storage of data from archive and backup applications. In-house developments such as local erasure coding, sealing using hardware WORM and efficient energy management help medium-sized customers to protect themselves against data loss through ransomware attacks and misconfiguration and to meet regulatory and legal requirements (GDPR). The Munich provider's solutions have proven themselves in thousands of installations in healthcare, public administration, film/TV/video and industry.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more