Gartner Report Highlights Data Immutability as Key to Ransomware Protection

For anyone questioning the threat that ransomware poses, the recent attacks against Kaseya and Colonial Pipeline are a harsh reminder of why ransomware has become the top cybersecurity threat. Unfortunately, traditional defenses such as anti-malware software and anti-phishing training for employees have often proven ineffective, leading organizations to look for better solutions. In a new Gartner report titled “Innovation Insight for Leveraging Isolated Recovery Environments and Immutable Data Vaults to Protect and Recover From Ransomware,” the analyst firm highlights the critical role data immutability technology can play in ransomware protection.

5 Reasons Ransomware Protection Needs to Be a Board-Level Conversation

It is not just the responsibility of the IT/IS department to keep the business safe, but the obligation of every CXO and Board member to ask for and implement stringent cyber security measures starting with zero trust, perimeter security, and employee training.

LinkedIn Live: Protecting Your Data with VMware vSAN and Cloudian HyperStore

Our joint solution combines Cloudian Object Storage with VMware’s vSAN Data Persistence platform through VMware Cloud Foundation with Tanzu. Adding Cloudian object storage software to vSAN is simple and easy, and serves any cloud-native or traditional IT application requiring S3-compatible storage. 

Boards need to make ransomware protection a top priority

Ransomware attacks increased 150% last year according to Group-IB, a leading cybersecurity solutions provider, a trend that shows no signs of slowing. Given the financial, operational and reputational risk that ransomware poses, boards of directors need to make sure that safeguarding data from an attack is a top priority for the organizations they oversee. I recently made this case in an open letter to board members in Australia that was published in our only national daily newspaper, The Australian, and is reprinted below.

Overcoming Human Vulnerabilities that Open the Door to Ransomware

Ransomware attacks dominated the cybersecurity landscape in 2020 and will remain a top threat in 2021, posing major challenges for both public and private institutions. The UK’s National Cyber Security Centre recently reported that it handled more than three times as many ransomware incidents as in the previous year. New variations of attacks are always testing security defenses, including more sophisticated “phishing” schemes — taking advantage of human error or vulnerabilities by duping individuals into clicking a malicious link and thereby enabling ransomware to infect an organization.

Why Cloudian Object Storage is the Ideal Target for IBM Spectrum Protect Plus

Today, enterprises have multiple choices when it comes to deploying data protection solutions for their mission-critical data and applications in data centers and the public cloud. IBM Spectrum Protect Plus in combination with Cloudian’s fully S3-compatible HyperStore object storage offers a simple, scalable, reliable and cost-effective solution to protect such workloads. IBM Spectrum Protect Plus is a modern data protection solution that provides recovery, replication, retention, and reuse for VMs, databases, applications, file systems, SaaS workloads, containers and cloud applications such as Office 365.

5 Must-Haves in Enterprise Data Storage for Security and Compliance Needs

Data security is complicated. Compliance with security regulations has never been more important than it is today. It takes a lot of work to ensure your organization has a solid security program in place. How can you ensure you’re doing everything you can to protect your organization’s data? Here are the 5 things to keep in mind when picking a bulletproof enterprise data storage solution that not only satisfies the compliance requirements but also allows self-governance.

Reducing Cybersecurity Insurance Risk while Protecting Data with Cloudian Secure Storage

Most organizations’ cybersecurity defense strategies cover just their network and firewall.  But it’s your data that is the hacker’s ultimate prize. Have you focused your defenses mostly on keeping hackers from getting in the door only to leave the very thing he is trying to steal under-protected?  Read on for a checklist of security features you should look for to be sure you have a hardened data storage and protection solution.