Backup Blog Bites #4: How To Validate The Configuration Of Your Immutable Backups

Backup Blog Bites #4: How To Validate The Configuration Of Your Immutable Backups

| | Uncategorized
The integration between backup software and a disk array is crucial for implementing immutable backups. To achieve backup immutability, the backup software needs to leverage the The post Backup Blog Bites #4: How To Validate The Configuration Of Your Immutable Backups appeared first on Continuityâ„¢ ... Read More
Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist 

Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist 

| | Uncategorized
Since backups are becoming lucrative targets for cybercriminals, vendors like Cohesity, Commvault, Dell, Rubrik, Veeam and Veritas have responded with new ransomware protection features – including immutability.  The post Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist  appeared first on Continuity™ ... Read More
Storage & Backups Under Attack. This Is What To Do About It

Storage & Backups Under Attack. This Is What To Do About It

| | Uncategorized
Over the past few months there has been a significant increase in publicized attacks on storage & backup systems, e.g. You can read more about these The post Storage & Backups Under Attack. This Is What To Do About It appeared first on Continuityâ„¢ ... Read More
Backup Blog Bites #2: To AD Or Not To AD Your Backup System? That Is The Question 

Backup Blog Bites #2: To AD Or Not To AD Your Backup System? That Is The Question 

| | Uncategorized
When it comes to backups, there’s an interesting debate as to whether you should connect your backup systems to Active Directory (AD) or not, and for The post Backup Blog Bites #2: To AD Or Not To AD Your Backup System? That Is The Question  appeared first on Continuity™ ... Read More
After The Johnson Controls Ransomware Attack, Here’s An 8-Point Security Checklist For Your Backups

After The Johnson Controls Ransomware Attack, Here’s An 8-Point Security Checklist For Your Backups

| | Uncategorized
On September 27th, Johnson Controls International announced a massive ransomware attack, that encrypted many of the company devices, including VMware ESXi servers. This impacted the company’s The post After The Johnson Controls Ransomware Attack, Here’s An 8-Point Security Checklist For Your Backups appeared first on Continuity™ ... Read More
Don’t Rely On Immutable Backup For Protection Against Ransomware

Don’t Rely On Immutable Backup For Protection Against Ransomware

| | Uncategorized
StorageGuard plays a critical role in your cyber resiliency strategy, by helping you increase usage & adoption of your existing data protection tools – and subsequently get more out of your current investment. The post Don’t Rely On Immutable Backup For Protection Against Ransomware appeared first on Continuity™ ... Read More
To Fight Ransomware, We Need to Fill The Cultural Gap

To Fight Ransomware, We Need to Fill The Cultural Gap

In the past two years, cybercriminals have become increasingly skillful at destroying the organizational backup first, only then locking the data – leaving victims no choice but to pay the ransom. Given how long this trend has been around, and the devastating impact of a successful attack, one would expect ... Read More
Continuity Joins Dell Technologies ETC Program to Help Protect Customers’ Storage and Data Protection Systems

Continuity Joins Dell Technologies ETC Program to Help Protect Customers’ Storage and Data Protection Systems

| | Uncategorized
The ETC Program underscores Dell’s commitment to offer customers flexibility and choice with complimentary solutions such as StorageGuard for protecting their critical systems from cyberattacks and insider threats. The post Continuity Joins Dell Technologies ETC Program to Help Protect Customers’ Storage and Data Protection Systems appeared first on Continuity™ ... Read More
Best Practice Guide: Meeting Backup Requirements for Cyber Insurance Coverage

Best Practice Guide: Meeting Backup Requirements for Cyber Insurance Coverage

| | Uncategorized
Cyber insurance provides a cushion to fall back on in a successful cyber-attack, providing coverage for damages caused by data loss. The post Best Practice Guide: Meeting Backup Requirements for Cyber Insurance Coverage appeared first on Continuityâ„¢ ... Read More
Top 4 Predictions for Storage and Backup Security in 2023

Top 4 Predictions for Storage and Backup Security in 2023

| | Uncategorized
2022 clearly demonstrated that attacks on data represent the greatest cyber-threat organizations face. The attack pace not only continued, it accelerated. The post <strong>Top 4 Predictions for Storage and Backup Security in 2023</strong> appeared first on Continuityâ„¢ ... Read More
Loading...

Secure Guardrails