According to Gartner, “Increasingly sophisticated ransomware attacks are specifically targeting backup data and administrator functions.”
In today’s environment Gartner suggests that, “you can never be 100% certain that backup data isn’t infected with malware and must proceed from the assumption that backups have been affected.”
Gartner provides 4 key recommendations that data protection leaders must implement to protect their data and organizations from ransomware.
Gartner finds that “ransomware is one of the most dangerous threats to organizations, but the nature and scope of ransomware attacks are often misunderstood, leading to inadequate precautions against ransomware and flawed responses to successful attacks.”
Does your organization have a cyber recovery plan?
Dell Technologies agrees with the Gartner recommendations and addresses each of these and more with Dell EMC PowerProtect Cyber Recovery:
- Creating a dedicated Cyber Recovery environment Isolated from backup and production environments to protect critical data
- Using Immutable protected storage to help ensure critical data cannot be deleted, modified or encrypted by ransomware
- Leverage Intelligence (AI/ML) to improve early detection and identify last-known good backups for recovery post-attack
How to Make Your Organization More Cyber Resilient
Tune in to hear our cyber resilience experts discuss why U.S. Federal Reserve Chairman, Jerome Powell called cyber attacks, “the #1 threat to the global financial system”. Plus, get practical tips on how to protect, isolate and recover critical data from ransomware across edge, core and cloud with PowerProtect Cyber Recovery.
Protect critical data from ransomware across on-premises and Multi-Clouds
With Multi-Cloud Data Services for Dell EMC PowerProtect, you get a data vaulting service that offers an air-gapped vault built upon secure, multi-cloud-enabled infrastructure to safeguard your critical data from cyber attacks.
A PowerProtect Cyber Recovery vault environment is hosted in Faction with multiple levels of physical and logical protection and flexible recovery options to ensure you can recover your data and your business with confidence.