News

Latest news on the subject of B2B cyber security >>> PR agencies: Add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Cloud storage: secure and easy data management
Cloud storage: secure and easy data management

A data protection provider is launching its new zero-trust cloud storage, which is integrated into its backup system and is based on Microsoft Azure. The cloud storage is preconfigured and can be customized to your needs as a subscription model. Veeam® Software is introducing Veeam Data Cloud Vault, a cloud-based storage service that enables users to securely store backup data not only off-site, but also in an always immutable and encrypted format. This provides additional layers of protection for important information. Presented live for the first time at VeeamON 2024, companies can test this new Storage-as-a-Service (STaaS) offering…

Read more

Faster and space-saving backup & recovery
Faster and space-saving backup & recovery - Image by Benjamin Wiens on Pixabay

With Fast Clone support under Veeam Backup & Recovery, the duration and storage requirements for backups can be dramatically reduced. As the first Linux-based storage system, Silent Bricks from FAST LTA now offers the possibility to use Fast Clone in conjunction with SMB shares. This was previously only available for Windows-based solutions. "Constantly increasing data volumes are becoming an increasing problem for many companies when it comes to data backup," says René Weber, Field Application Engineer at FAST LTA. "Many people find it difficult to adhere to the available backup windows because backups take longer and longer. The constant…

Read more

Ransomware stress: Not even 60 percent of data recoverable
Ransomware stress: Not even 60 percent of data can be recovered Image by Tumisu on Pixabay

According to the latest Veeam Ransomware Trends Report 2024, cyberattacks are not only harmful to companies, but also have a negative impact on people. 45 percent of respondents say their workload increases after an attack and 40 percent experience increased stress levels. Ransomware remains a constant threat to companies and is the leading cause of IT outages and downtime. According to the latest Veeam Ransomware Trends Report 2024, 41 percent of data is compromised in cyberattacks. The report shows that only 57 percent of this compromised data can be recovered afterwards, which…

Read more

SME: Backup and recovery including malware detection 
SME: Backup and recovery including malware detection MS - AI

More resilience against ransomware for SMBs: The latest version of the all-in-one data protection solution Veritas Backup Exec offers new malware detection, role-based access control and faster backup and recovery. Secure multi-cloud data management: Veritas has announced further developments for Veritas Backup Exec. More than 45.000 small and medium-sized companies (SMEs) worldwide rely on the uniform backup and recovery solution. The latest updates include malware detection capabilities, role-based access control, and other optimizations for quickly backing up and restoring business-critical data. Ransomware: More protection and data security With the increase in ransomware attacks, concerns about data security are growing in all companies. A study…

Read more

Why cybercriminals specifically target backups
Why cybercriminals specifically target backups AI - MS

There are two main ways to recover encrypted data after a ransomware attack: restoring from backups and paying the ransom. The attackers also know this and try to deprive companies of a solution by attacking backups. Two problems, same cause: Complete recovery of data after a ransom payment is highly uncertain, because in case of doubt you cannot rely on a promise from cybercriminals. And restoring the data from the backups doesn't work in many cases because the cybercriminals have often encrypted them in order to...

Read more

Tape storage as a valuable backup and cyber protection strategy
Tape storage as a valuable backup and cyber protection strategy AI - MS

When it comes to their backup recovery solution, many companies primarily focus on storage technologies that ensure high speed data recovery to maintain business continuity. That's why hard drives (including SSD) and the cloud play an important role. But the constant threat of a ransomware attack and technological developments also make tape essential. In the event of any kind of data loss - be it due to a technical failure, human error or an attack by cyber criminals - it is the backup recovery system that helps companies out of the unfortunate situation. To always have this lifeline...

Read more

Cyber ​​security insurance or better data protection?
Cyber ​​security insurance or better data protection? - Image by Steve Buissinne on Pixabay

The volume of data in organizations is constantly growing and many companies are grappling with the question of how to protect this amount of data from ransomware attacks or data breaches. Cybersecurity insurance only helps repair the financial damage. Cyber ​​security solutions provide critical protection for networks, systems and data. In order to protect themselves beyond successful cyber defense, more and more companies are taking out cybersecurity insurance so that they can compensate for financial losses in the worst-case scenario. However, many companies lack knowledge about how cyber insurance works, when it makes sense and what the total costs are...

Read more

The right strategy after a data loss
The right strategy after a data loss KI-MS

Companies around the world face numerous threats. International studies also show this. A study by Arcserve shows that 76 percent of companies have suffered a serious data loss. In this context, 83 percent described downtime of 12 hours or less as acceptable. 10 tips for a successful business continuity plan. As an Arcserve study shows, only 52 percent of affected companies were able to recover from their data loss in 12 hours or less. Although 95 percent of companies said they had a disaster recovery plan, only a small…

Read more

Data manipulation, the underestimated danger
Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of having a current and easily accessible copy of all important company data to protect against data manipulation. Reliable backups enable faster recovery from damage, interruption or data loss; and especially if files have been encrypted or deleted by a ransomware attack. However, these well-known backup scenarios remain rare. Immutable backups can also protect against the more underestimated threats of data manipulation or malicious insiders. Unforeseeable activities that can significantly damage the trust and reputation of a brand if not...

Read more

Immutable memory protects against attacks
Immutable memory protects against attacks

A survey of cybersecurity experts from companies with more than 1.000 employees confirms that 46 percent of respondents believe that generative AI increases their company's vulnerability to attacks. This trend appears to be already well underway, with 75 percent of respondents confirming that they are seeing an increase in attacks compared to last year - 85 percent attributing this increase to the use of generative AI by cybercriminals. With generative AI, cyber fraudsters have even more options to adapt flexibly, use complex tactics to circumvent traditional data protection solutions and...

Read more