The Reality of Hybrid Cloud Data Protection
It isn't always ideal, or even possible, for organizations to move all their data to the cloud. While cost concerns and performance issues may be blockers to cloud adoption, organizations like Ciox Health found that the flexibility and resiliency of the hybrid cloud model is the best fit for their business’s needs. However, even though the cloud is highly available, it is not always resilient.
Hackers are Targeting Your Backups
As more organizations continue to shift over to hybrid environments, companies will need adaptable security techniques that can keep up. Otherwise, businesses run the risk of leaving their environment open to malware attacks, like ransomware. And — as more and more threat actors target backups — maintaining the integrity of backup data is of paramount importance to recovery post-attack.
Prevention and Protection
At the VeeamON Resiliency Summit, Veeam’s own Samuel Nicholls and Julia F. outlined five steps you can take to ensure your environment is secure, protected, and recoverable in the event of a malware attack or data loss:
- 3-2-1 rule: Three copies of data, two backup copies on two different types of media, and keep one copy off-site.
- Utilize logical air gap: Logical separation of backup data from production subscriptions.
- Implement PoLP: Principle of least privilege to keep your data secure.
- Immutability and encryption: Data integrity for data resiliency across your infrastructure.
- Validate recovery: Validate the integrity and reliability of the data on your backups.
You can dive deeper into this topic or check out our keynote featuring cyber security experts by registering for free to view sessions on-demand.
Have you experienced an attack on your hybrid cloud? Share your own hybrid cloud story with #embracethebreach!