Lately, the news has been riddled with stories of companies, utilities and even entire towns victimized by ransomware. Quite simply, hackers use ransomware malware to encrypt a victim’s own data and then hold the information for ransom, often demanding millions and even billions for the data’s safe return. In the interim, the victim is unable to access files, databases or applications. For all intents and purposes, their operations are stopped cold.
If ransomware isn’t on your radar right now, it should be. Unless you’re taking the proper precautions, your company could be vulnerable. Globally, ransomware costs are expected to hit $20 billion dollars this year. That’s up from $325 million just six years ago.
In fact, Steve Kenniston, IBM Global Spectrum Software Business Development Executive, recently reported that in the past 24 months, the IBM support team have received at least one “cyber incident response” every week.
Additionally, statistics show that due to the increase in remote workers since the beginning of the pandemic, ransomware attacks are up 148%.
What TECA Can Do to Help Protect You
Over the last couple of decades organizations have trended toward moving their backups from tape media to disk media. Backing up to disk does not provide the immutability that tape offers and thus, the more recent trend is a hybrid of disk and tape media. Disk media for speed and convenience and tape media as a way to insulate backups from malicious cyber-attacks.
TECA Data Safe’s Rapid Rebound Virtual Tape Library (VTL) offers a backup that cannot be corrupted. With a VTL, you not only have a local copy that is air gapped, but you also have an off-site copy with TECA that is air gapped as well. (A computer or network that is physically segregated and unable to connect wirelessly to other computers or networks is considered air gapped. This ensures a high level of security for backups.)
The 3-2-1-1-0 Methodology
Utilizing TECA’s Rapid Rebound for backup and recovery, you’ll achieve the highest level of security because you’ll be adhering to the 3-2-1-1-0 methodology, considered the industry’s gold standard for backup strategy.
The 3-2-1-1-0 methodology simply means:
- Keeping three copies of your data
- Stored on two different media
- With at least one copy stored offsite
- And one copy stored offline
- And ensuring backups have been verified with zero errors
IBM’s Kenniston reports that recovery times for customers who have prepared for an incident are within a day to a week at the most. Conversely, those who have not prepared will not see systems restored for two to three months.
Can your business afford to take that kind of risk?
Questions about Rapid Rebound or the 3-2-1-1-0 methodology? The expert TECA technology team are happy to help. Contact us today.
TECA Data Safe is honored to have been named one of the 27 Top Minnesota Companies by Best Startup. Best Startup recognized TECA for their innovation, growth, management and societal impact. Read more …
Questions? Contact us today to find out how TECA Data Safe can help you.
True or False?
Believe it or not, there have been dozens of movies made about computers and cybersecurity. What do you know about these? True or False:
1983’s “War Games” stars Matthew Broderick as a high school student who hacks into his school’s computer system to change his grades.
False. He hacks into a military supercomputer & activates the U.S. nuclear arsenal. Seemed far-fetched back in the day, but with tech-savvy kids nowadays? It seems frighteningly possible.
1995’s “Golden Eye” has James Bond stopping a Russian crime syndicate from using stolen space-based weapons that fall into the hands of an evil genius who plans to rule earth from cyberspace.
True. You couldn’t make this silliness up if you tried.
2016’s “Jason Bourne” features Matt Damon as a former CIA agent who comes out of hiding to fight cyberterrorism.
True. And he does it again. And again. And again. And again. And yet again.