Data Backups
When Ransomware Attacks Seem Inevitable, What Can IT Teams Do?
The possibility of their business falling victim to a cyberattack has always kept IT teams up at night, but today’s threat landscape is reaching new levels of sophistication. For example, new acoustic-based ...
Cloud-Based File Systems as a Ransomware Defense
Ransomware is an unfortunate and unavoidable fact of life for businesses today. Attackers are escalating their attacks on organizations of all types and sizes across the globe. In 2021, there were three ...
Which Data Do Ransomware Attackers Target for Double Extortion?
Double extortion is one of the most prevalent ransomware tactics today. The attackers first exfiltrate sensitive information from their target before launching the ransomware encryption routine. The threat actor then demands a ...
Staying Ahead of Ransomware With the Cloud
According to a report from Check Point Software, there were 93% more ransomware attacks in the first half of 2021 than during the same period last year. Palo Alto Networks’ Unit 42 ...
Protecting Active Directory With Viable Backups
The primary recovery concern after a ransomware attack is the health of the core infrastructure. Before recovering any environment, it is crucial to confirm the viability of backups and whether there is ...
Cyberresilience: Your Data Insurance Policy
In the wake of the Colonial Pipeline hack, businesses all over the world are getting a very loud reminder that they could be next to be compromised by a ransomware intrusion. For ...
Can Your Data Protection Software Recover from Modern Ransomware?
Your nightmare has come true. Your organization was just attacked by ransomware. They have crippled your networks, corrupted your Active Directory, encrypted business critical documents, and disabled production databases. Now the recovery ...
Ransomware Attacks are Evolving: What You Need to Know
One look at all the ransomware attacks from the past few years, and it’s clear that crypto-malware actors are attempting to maximize their financial gain. We’ve observed these threat groups using multiple ...