Overcoming Human Vulnerabilities that Open the Door to Ransomware

Ransomware attacks dominated the cybersecurity landscape in 2020 and will remain a top threat in 2021, posing major challenges for both public and private institutions. The UK’s National Cyber Security Centre recently reported that it handled more than three times as many ransomware incidents as in the previous year. New variations of attacks are always testing security defenses, including more sophisticated “phishing” schemes — taking advantage of human error or vulnerabilities by duping individuals into clicking a malicious link and thereby enabling ransomware to infect an organization.

Why Cloudian Object Storage is the Ideal Target for IBM Spectrum Protect Plus

Today, enterprises have multiple choices when it comes to deploying data protection solutions for their mission-critical data and applications in data centers and the public cloud. IBM Spectrum Protect Plus in combination with Cloudian’s fully S3-compatible HyperStore object storage offers a simple, scalable, reliable and cost-effective solution to protect such workloads. IBM Spectrum Protect Plus is a modern data protection solution that provides recovery, replication, retention, and reuse for VMs, databases, applications, file systems, SaaS workloads, containers and cloud applications such as Office 365.

5 Must-Haves in Enterprise Data Storage for Security and Compliance Needs

Data security is complicated. Compliance with security regulations has never been more important than it is today. It takes a lot of work to ensure your organization has a solid security program in place. How can you ensure you’re doing everything you can to protect your organization’s data? Here are the 5 things to keep in mind when picking a bulletproof enterprise data storage solution that not only satisfies the compliance requirements but also allows self-governance.

Reducing Cybersecurity Insurance Risk while Protecting Data with Cloudian Secure Storage

Most organizations’ cybersecurity defense strategies cover just their network and firewall.  But it’s your data that is the hacker’s ultimate prize. Have you focused your defenses mostly on keeping hackers from getting in the door only to leave the very thing he is trying to steal under-protected?  Read on for a checklist of security features you should look for to be sure you have a hardened data storage and protection solution.

Ransomware Protection: Immutable Data Storage

Attacks can strike even the best-prepared, making it essential to mitigate the effects of a successful breach. In this webinar, we discuss how the cyber-attacks work and what are the key needs that are crucial to combat these challenges.

3 Questions all CIOs Should Ask About Data Storage Security

In this blog, we take a look at an organization’s security considerations, specifically from a CIO’s perspective. Here are three questions every CIO should ask about data storage security.

Introducing our New Ransomware Protection Solution for Commvault Environments

Did you know that cyberattacks are one of the Top 10 most-likely global risks according to The World Economic Forum*?  This includes ransomware attacks which are accelerating in frequency.  Cyberhackers are increasingly targeting an organization’s backup data and holding this data hostage in exchange for a ransom payment.  Ransomware attacks work by encrypting the user’s data, rendering it useless with an aim to harm the business.  Organizations that are attacked and lose access to both primary and backup data stores have had to shut down, unable to operate. News of ransomware attacks also adversely impact organizations’ brand and reputation.

MythBusters: Ransomware Protection Edition

This blog addresses the topic of the year and, frankly, one that will be with us for the foreseeable future: ransomware protection. Specifically, we will look at some of the misconceptions and myths regarding ransomware protection solutions and how IT departments around the world are implementing such solutions.

Security: Cloudian Achieves FIPS 140-2 Validation

Glenn Haley, Director of Product Management, Cloudian The Need for FIPS Validation In today’s insecure IT landscape and the network-connected world, it is essential to understand how secure your storage system may be, and even more important, to have assurance on the degree of security implemented as the right choice to meet your needs.  Ransomware ... Read More