Adapting to the Threat: How Data Protection Software Has Evolved in the Fight Against Ransomware
In last month’s story about UnitedHealth Group’s painstakingly slow recovery from a ransomware attack , we established that data protection (backup & recovery) and cybersecurity are increasingly intertwined in the context of ransomware resilience.
Here’s a quick summary of that strategic insight:
Strong cybersecurity systems and policies are often a first line of defense against ransomware, making it difficult for criminals to get into private networks, systems, and devices. However, because criminals can still “steal the keys” to the castle through vectors such as phishing and social engineering, ransomware will always remain a threat, even to organizations with excellent security postures and outsized IT expenditures.
?Once ransomware sneaks through and has compromised critical systems, backup & recovery teams must take up the baton (from cybersecurity teams). If the victimized organization has its backup operations in good order, the organization can recover quickly and completely. Hence, modern ransomware resilience is a function of strong coordination between the cybersecurity and data protection functions.
Let’s explore how this modern reality is reflected in today’s landscape of commercial backup and backup monitoring software.
?
Built-in Threat/Anomaly Detection in Backup Products
Many modern backup products now provide built-in threat detection capabilities that enable data protection teams to spot malware, anomalies / ransomware encryption activity, and IoCs (indicators of compromise) in data that is being backed up.
This functionality can provide IT teams with early warnings about ransomware activity that could otherwise remain undetected (until applications and systems are already down).
Here are a few examples of such capabilities in modern backup software today:
?
Backup Immutability
When ransomware gets into an organization’s IT infrastructure and begins encrypting files, it can also target backups and render them useless for recovery.
Modern backup solutions provide organizations with options to make backups immutable, or impossible to alter or delete.
Having at least one immutable backup for every protected system, for instance as part of what Veeam calls a “3-2-1-1-0” backup rule (see graphic below), can help organizations ensure successful recovery from ransomware attacks.
Immutable backups come in many different forms, including:
Important: Ensuring your organization has an immutable backup copy for every system within mandated RPOs can be the difference between recovering quickly from ransomware and suffering terminal data loss.
领英推荐
Make sure your backup monitoring tool is capable of reporting on immutability; if it’s not, get in touch with Bocada .
?
Integrated solutions
While many modern backup tools have started providing the aforementioned capabilities to help data protection teams spot threats and mitigate damage from ransomware attacks, many organizations desire even more integration between their backup and security tools.
Here are a few recent market developments, for example:
?
Reliable backup monitoring is non-negotiable
Just as security teams rely on SIEM tools like Splunk to synthesize data across an organization’s infrastructure into security insights and reports, backup teams use backup monitoring tools like Bocada to help manage their backup environments.
Bocada provides data protection teams with single-pane backup monitoring that centralizes and automates an organization’s backup data collection, dashboards, alerting, and incident management (in ITSM tools such as ServiceNow).
With support for more than 40 popular backup, storage, and ITSM tools, Bocada allows orgs to quickly spot backup failures (on-prem or in the cloud) and automate alerting and ticket management to cut time to remediation. 70+ schedulable/on-demand reports enable backup admins using Bocada to easily support any audit or SLA reporting requirement.
?
Integrating backup monitoring with security monitoring (SIEM)
To better align data protection and cybersecurity, some organizations may wish to consolidate their backup monitoring and security monitoring for a more comprehensive view of their incident readiness.
With Bocada, this is supported in two ways:
?
Stepping up to the challenge
As we have seen in the aftermath of the UnitedHealth Group ransomware attack in 2024 , cybersecurity and data protection are both critically important for ransomware resilience.
Growing awareness of this modern reality has shaped the development trajectories of both modern backup products and leading cybersecurity products, enabling better integrated solutions, purpose-built new technologies (e.g., immutable backups), and even intentional overlap in some capabilities (e.g., anomaly/threat detection) – to ensure no stone is left unturned.
As we go forward, backup operators must learn to modernize their mindsets and their systems to embrace this new reality: that they are just as important to their organizations’ cyber resilience as their security counterparts.
B2B Marketing Leader | Demand Gen | Tech | SaaS | Cybersecurity | Ecommerce | Startups
6 个月Another example... providers such as Rubrik are advertising large "ransomware recovery warranties" ($10M in Rubrik's case). While the case can certainly be made that these are marketing gimmicks (because of all the restrictions that apply in the fine print), they demonstrate organizations' desire to have "peace of mind" and confidence that their backup tools will enable them to recover from ransomware.