Search
Close this search box.
Let's Talk Data UK

Let’s talk… Keeping cybercriminals away from your backups (on-demand)

On-demand (English)

If the worst happens and your systems are disabled by a cyberattack, your backup is the critical component in recovering your data and avoiding extortionate ransomware pay-offs.

But many don’t know that their backup is susceptible to ransomware attacks too. In many cases, your backups can be encrypted along with your live systems, forcing your organisation into a terrible decision of paying the ransom, employing a specialist to attempt decryption, or losing your data.

There are now both technologies and best practices that ensure an ‘air-gap’ between your live systems and your backup. Join our backup experts to discover:

  • A real-world example of a ransomware attack that disabled both a live system and backups, and how the business dealt with the aftermath
  • What an air-gap is and why it’s important
  • Best practices and technologies available to ensure an air-gap and credential protection
  • How disaster recovery (DR) planning, testing and technologies have evolved to focus on cyber attacks
  • How the combination of backup, DR and security technologies can provide the strongest assurances to your business

 

Delen

Gerelateerde content

Neem contact op

We horen graag van je. Stuur ons een e-mail via onderstaande contactformulieren.

Neem contact op

We horen graag van je. Bel ons, word lid van onze social media community of stuur ons een e-mail via onderstaande contactformulieren.

Door op Verzenden te klikken, ga ik akkoord met de voorwaarden die zijn vermeld in het privacybeleid van Proact.