Doron Youngerwood

Backup Blog Bites #2: To AD Or Not To AD Your Backup System? That Is The Question 

When it comes to backups, there’s an interesting debate as to whether you should connect your backup systems to Active Directory (AD) or not, and for

Read more

Backup Blog Bites #1: Is Your Immutable Backup Vulnerable to Time Spoofing Attacks?

What this is about?  This time-based attack happens when an attacker manipulates insufficiently-secure time sync configuration to trick the backup systems into thinking that “X” number

Read more

After The Johnson Controls Ransomware Attack, Here’s An 8-Point Security Checklist For Your Backups

On September 27th, Johnson Controls International announced a massive ransomware attack, that encrypted many of the company devices, including VMware ESXi servers. This impacted the company’s

Read more

Don’t Rely On Immutable Backup For Protection Against Ransomware

StorageGuard plays a critical role in your cyber resiliency strategy, by helping you increase usage & adoption of your existing data protection tools – and subsequently get more out of your current investment.

Read more

To Fight Ransomware, We Need to Fill The Cultural Gap

In the past two years, cybercriminals have become increasingly skillful at destroying the organizational backup first, only then locking the data – leaving victims no choice but to pay the ransom. Given how long this trend has been around, and the devastating impact of a successful attack, one would expect organizations would get things under control by now. If anything, the situation is worsening.

Read more

Continuity Joins Dell Technologies ETC Program to Help Protect Customers’ Storage and Data Protection Systems

The ETC Program underscores Dell’s commitment to offer customers flexibility and choice with complimentary solutions such as StorageGuard for protecting their critical systems from cyberattacks and insider threats.

Read more

Best Practice Guide: Meeting Backup Requirements for Cyber Insurance Coverage

Cyber insurance provides a cushion to fall back on in a successful cyber-attack, providing coverage for damages caused by data loss.

Read more

Top 4 Predictions for Storage and Backup Security in 2023

2022 clearly demonstrated that attacks on data represent the greatest cyber-threat organizations face. The attack pace not only continued, it accelerated.

Read more

Top 8 Most Common Storage Misconfigurations And Vulnerabilities

Introduction We analyzed data from a large number of storage risk assessments, to provide a unique insight into the state of storage security. The analyzed data

Read more

5 Takeaways From The New Gartner Hype Cycle For Storage & Data Protection 2022

Background to the Gartner Hype Cycle For Storage & Data Protection The latest 2022 Gartner Hype Cycle report for Storage and Data Protection has just been published and

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree