NYC area cyber security expert shares best practices to help organizations defend backups from ransomware vulnerabilities—in a new article from eMazzanti Technologies
HOBOKEN, N.J., Aug. 21, 2024 /PRNewswire-PRWeb/ -- NYC-area cyber security provider eMazzanti Technologies published a new article outlining seven important steps to help companies keep valuable backups safe from ransomware attacks.
The informative article recognizes that business leaders too often hold onto a false sense of security, assuming their backups will always save them. But ransomware gangs have begun targeting the backups themselves.
To ensure that companies have the security they need, the author outlines several best practices for safeguarding backups. These include tips such as creating an immutable backup, maintaining versioned backups, and using strong encryption.
"Backups form a critical element of ransomware defense, but what happens when the backup fails or when ransomware hits the backup?" warned Jennifer Mazzanti, CEO, eMazzanti Technologies.
Below are a few excerpts from the article, "7 Vital Steps to Defend Backups from Ransomware Vulnerabilities."
Follow a 3-2-1 Backup Strategy
"The 3-2-1 rule for backups means that you keep three copies of your data on two different media, with one copy offsite. Three copies of the data typically include the original data, a local backup stored close by, and an off-site backup. This diversifies the risk."
Implement Effective Access Controls
"Strengthen access controls to ensure that only a few authorized personnel have permission to modify or delete backups. This includes using robust authentication methods such as MFA to verify user identity. And it may involve using role-based access controls that tie permissions to the user's role within the organization rather than to the individual."
Maintained Versioned Backups
"In the case of a ransomware attack, particularly when some time lapses before the ransomware is discovered, versioned backups allow you to revert back to an uninfected state. When implementing versioning, determine how many versions to keep and for how long. This will depend on both the nature of the data and your storage capacity."
Monitor for Unusual Activity
"Network monitoring plays an essential role in any ransomware defense strategy. Make sure that monitoring covers the backup systems, as well, alerting appropriate personnel when any unusual behavior or unauthorized access occurs."
Defend Backups from Ransomware Vulnerabilities to Safeguard Critical Business Data
According to the latest Sophos State of Ransomware Report, nearly 60 percent of organizations suffered ransomware hits last year. And recovery costs are soaring. In addition to strengthening other cyber security measures, take the time to review and update your backup strategy. With proven solutions such as eCare Cloud Backup, eMazzanti will help ensure backup success.
Have you read?
Deter Cybercriminals with a Tabletop Exercise - eMazzanti Technologies
Impact of AI on Threat Detection Critical in Cyber Landscape - eMazzanti Technologies
About eMazzanti Technologies
eMazzanti's team of trained, certified IT experts rapidly deliver increased revenue growth, data security and productivity for clients ranging from law firms to high-end global retailers, expertly providing advanced business cyber security, retail and payment technology, digital marketing services, AI, cloud and mobile solutions, multi-site implementations, 24×7 outsourced network management, remote monitoring, and support.
eMazzanti's consistent growth landed them on the Inc. 5000 list 9X. Recognized as a 4X Microsoft Partner of the Year, the #1 ranked NYC area MSP, NJ Business of the Year, and 5X WatchGuard Partner of the Year, the company excels as a trusted outsourced IT partner! Contact: 1-866-362-9926, [email protected] or http://www.emazzanti.net Twitter: @emazzanti Facebook: Facebook.com/emazzantitechnologies.
Media Contact
Juliana Wallace, eMazzanti Technologies, 2178999111, [email protected], https://www.emazzanti.net/
SOURCE eMazzanti Technologies

Share this article