• About
  • Subscribe
  • Contact
Friday, May 9, 2025
    Login
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
No Result
View All Result
No Result
View All Result
Home Technology Security

Emerging ransomware forces a hard look at the last line of defence

Joseph Chan by Joseph Chan
September 16, 2022
Photo by Tima Miroshnichenko: https://www.pexels.com/photo/people-hacking-a-computer-system-5380649/

Photo by Tima Miroshnichenko: https://www.pexels.com/photo/people-hacking-a-computer-system-5380649/

As businesses become more distributed and the workforce permanently evolves to a more hybrid state, trends suggest that attacks and breaches will continue at a higher frequency.

According to the latest Veeam 2022 Data Protection Trends report, 76% of the 3,393 global organisations surveyed suffered at least one ransomware attack, with 24% either avoiding attacks or unaware that an attack occurred. With the majority falling victim to such attacks, it’s clear that businesses remain vulnerable and inadequately protected against malicious threats even after past incidents.

In Hong Kong, the monthly average of ransomware attacks on businesses was over 750,000 between April and June in 2021, according to cybersecurity firm Fortinet. The government’s Hong Kong Computer Emergency Response Team Coordination Centre noted that due to the pandemic and the shift in working practices, businesses were advised to be ready to respond to increasingly sophisticated and complex cyberattacks.

Its latest advisory in February this year noted that “Cyberattacks will become more targeted and organised with multiple ransomware and phishing attacks targeting individual industries emerging as a norm.”

Veeam’s recent ransomware research highlighted that in 2021, the surveyed organisations including 200 leading enterprises in Asia Pacific, acknowledged that they were only able to recover 69% of their data.

Further analysis showed that almost half of the impacted businesses paid the ransom and recovered their data but in the Asia-Pacific region, one in four (24%) organisations who paid the ransom did not recover their data.

Look beyond the ransom solution

However, a positive trend emerging is that 19% of organisations that did not pay the ransom were able to recover their data, highlighting that paying a ransom was not a guarantee of getting their data back. More focus must be on finding more ways to protect and recover critical business data.

Backup is now an increasingly critical component of any ransomware recovery strategy and plan. Data showed that 97% of ransomware attacks in Asia Pacific also attempted to infect backup repositories, and 73% of those attempts were successful, proving that even backups cannot fully protect and recover data.

Modern malware is known to attack the backup layer, so businesses must have a process in place to ensure resilience. At Veeam, we advocate the 3-2-1-1-0 Rule which states there should be at least three copies of important data on at least two different types of media, with at least one of these copies stored off-site.

As the threat of ransomware evolves, we recommend at least one copy of data is air-gapped, stored offline, or immutable. This is imperative for effectively defending against ransomware.

We’ve also added a zero, for zero backup errors, to the rule because automated backup verification ensures that the data is valid and usable for recovery. Data that has been captured incorrectly cannot be recovered, so following the 3-2-1-1-0 Rule can be the difference between data loss and recovery.

Put data where attackers can’t reach

Immutability is the key here. While only 5% of organisations have less than one immutable tier within their data protection framework, many use multiple immutable layers for added protection. This ensures that their backup data is immutable throughout its lifecycle:

  • 74% use cloud repositories that offer immutability
  • 67% use on-premises disk repositories with immutability or locking
  • 22% use tape that is air-gapped

After ensuring that their repositories are less likely to be disrupted, the next step is ensuring that clean data can be restored to the production environment. For nearly half of these surveyed organisations, this is accomplished by restoring data to a sandbox or an isolated area, to test the safety.

This practice of isolation and “staged restoring” occurs in only 46% of organisations worldwide, and 41% of organisations in Asia Pacific, a gap that should be addressed by IT decision-makers.

Modern ransomware protection requires an integrated security architecture that can stretch from endpoints to networks and the cloud to detect, correlate and remediate attacks. The only remediation options available are either paying a ransom or recovering from backups.

The challenge is, that just “restoring from backup” oversimplifies the process and causes many organisations to make assumptions about their backup and recovery capabilities, which often leads to data loss. To avoid worst-case scenarios, having a plan in place that includes verified, tested and secure backups that can be restored quickly is key to surviving modern attacks like ransomware.

Related:  PodChats for FutureCIO: Shifting digital document processes
Tags: backup and recoveryransomwareVeeam
Joseph Chan

Joseph Chan

Joseph Chan is the vice president for Hong Kong, Macau & Taiwan for Hong Kong. He is responsible for the Veeam business in these three markets including business operations, strategy development, sales and relationship management, with a mission to help enterprises in Hong Kong, Macau and Taiwan achieve Always-On business amid digital transformation. Chan has extensive experience in the IT sector. Prior to joining Veeam, he had held various account management roles at Jardine OneSolution and Insight Enterprises where he accumulated in-depth understanding of the industry and enterprises’ needs. Chan graduated with a bachelor’s degree in Engineering (BEng), Computer Science at The Hong Kong University of Science and Technology.

No Result
View All Result

Recent Posts

  • APAC CIOs rethink cybersecurity investments amid expanding threat landscape
  • Study finds almost half of businesses bank on AI-enabled cybersecurity for EDR and XDR
  • AI drives cloud market growth in Q1
  • ARTHALAND chooses OutSystems to advance real estate sustainability
  • Experts warn against AI-powered deepfake impersonation scams

Live Poll

Categories

  • Big Data, Analytics & Intelligence
  • Business Applications & Databases
  • Business-IT Alignment
  • Careers
  • Case Studies
  • CISO
  • CISO strategies
  • Cloud, Virtualization, Operating Environments and Middleware
  • Computer, Storage, Networks, Connectivity
  • Corporate Social Responsibility
  • Customer Experience / Engagement
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity operations
  • Education
  • Education
  • Finance
  • Finance & Insurance
  • FutureCISO
  • General
  • Governance, Risk and Compliance
  • Government and Public Services
  • Growth Strategies
  • Hospitality & Tourism
  • HR, education and Training
  • Industry Verticals
  • Infrastructure & Platforms
  • Insider threats
  • Latest Stories
  • Logistics & Transportation
  • Management Leadership
  • Manufacturing
  • Media and Telecommunications
  • News Stories
  • Operations
  • Opinion
  • Opinions
  • People
  • Process
  • Remote work
  • Retail & Wholesale
  • Sales & Marketing
  • Security
  • Tactics and Strategies
  • Technology
  • Utilities
  • Videos
  • Vulnerabilities and threats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.

Quick Links

  • Videos
  • Resources
  • Subscribe
  • Contact

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Management Leadership
    • Growth Strategies
    • Finance
    • Operations
    • Sales and Marketing
    • Careers
  • Technology
    • Infrastructure and Platforms
    • Business Applications and Databases
    • Big Data, Analytics and Intelligence
    • Security
  • Industry Verticals
    • Finance and Insurance
    • Manufacturing
    • Logistics and Transportation
    • Retail and Wholesale
    • Hospitality and Tourism
    • Government and Public Services
    • Utilities
    • Media and Telecommunications
  • Resources
    • Whitepapers
    • PodChats
    • Videos
  • Events
Login

Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl

Subscribe