fbpx

Doron Youngerwood

Backup Blog Bites #4: How To Validate The Configuration Of Your Immutable Backups

The integration between backup software and a disk array is crucial for implementing immutable backups. To achieve backup immutability, the backup software needs to leverage the

Read more

Backup Blog Bites #3: The Backup Immutability Do’s & Don’ts Checklist 

Since backups are becoming lucrative targets for cybercriminals, vendors like Cohesity, Commvault, Dell, Rubrik, Veeam and Veritas have responded with new ransomware protection features – including immutability. 

Read more

Storage & Backups Under Attack. This Is What To Do About It

Over the past few months there has been a significant increase in publicized attacks on storage & backup systems, e.g. You can read more about these

Read more

Backup Blog Bites #2: To AD Or Not To AD Your Backup System? That Is The Question 

When it comes to backups, there’s an interesting debate as to whether you should connect your backup systems to Active Directory (AD) or not, and for

Read more

Backup Blog Bites #1: Is Your Immutable Backup Vulnerable to Time Spoofing Attacks?

What this is about?  This time-based attack happens when an attacker manipulates insufficiently-secure time sync configuration to trick the backup systems into thinking that “X” number

Read more

After The Johnson Controls Ransomware Attack, Here’s An 8-Point Security Checklist For Your Backups

On September 27th, Johnson Controls International announced a massive ransomware attack, that encrypted many of the company devices, including VMware ESXi servers. This impacted the company’s

Read more

Don’t Rely On Immutable Backup For Protection Against Ransomware

StorageGuard plays a critical role in your cyber resiliency strategy, by helping you increase usage & adoption of your existing data protection tools – and subsequently get more out of your current investment.

Read more

To Fight Ransomware, We Need to Fill The Cultural Gap

In the past two years, cybercriminals have become increasingly skillful at destroying the organizational backup first, only then locking the data – leaving victims no choice but to pay the ransom. Given how long this trend has been around, and the devastating impact of a successful attack, one would expect organizations would get things under control by now. If anything, the situation is worsening.

Read more

Continuity Joins Dell Technologies ETC Program to Help Protect Customers’ Storage and Data Protection Systems

The ETC Program underscores Dell’s commitment to offer customers flexibility and choice with complimentary solutions such as StorageGuard for protecting their critical systems from cyberattacks and insider threats.

Read more

Best Practice Guide: Meeting Backup Requirements for Cyber Insurance Coverage

Cyber insurance provides a cushion to fall back on in a successful cyber-attack, providing coverage for damages caused by data loss.

Read more

Talk To An Expert

It’s time to automate the secure configuration of your storage & backup systems.

We use cookies to enable website functionality, understand the performance of our site, provide social media features, and serve more relevant content to you.
We may also place cookies on our and our partners’ behalf to help us deliver more targeted ads and assess the performance of these campaigns. You may review our
Privacy Policy I Agree