Ransomware resilience: Why air gapping is your best defense

First, why is ransomware protection such a critical need?

Put simply, ransomware protection is critical because:

  • Your data is vital to your business,
  • Maintaining control of and access to your data is legally mandated to be compliant with directives such as NIS2, GDPR, and others,
  • Ransomware attacks are prevalent, so much so that it’s really become a matter of when you’ll experience an attack rather than if you will.

From a risk assessment standpoint, looking at the importance of data as well as the chance of experiencing ransomware, it’s quite clear that it’s a high-risk scenario. Not only is ransomware (and subsequent data loss) very likely to happen, it’s also very likely to have very serious impacts to your business.

Considering the current levels of cyber resilience against ransomware and the many data protection gaps to be filled — especially in small- to mid-sized companies — ransomware protection should be top of the list.

According to a 2023 ransomware preparedness Enterprise Strategy Group (ESG) report, Lighting the Way to Readiness and Mitigation, only 16% of organizations struck by a ransomware attack were able to recover 100% of their data.

ESG also finds that data recovery post ransomware was lacking, saying, “Unfortunately, the current reality is bleak as only one in seven report they were able to fully restore their data after a successful ransomware attack. This highlights the need to reengineer recovery processes for ransomware attacks.”

This missing coverage found in most of the companies surveyed means recovery to a production-like state is impossible with their current data protection setup. Considering that data is the lifeblood of our digital economy, it’s fundamental to protect this data for business to carry on as usual.

When ransomware strikes and is effective, the main goal is to recover data and minimize losses. This is because data losses not only lead to non-compliance but also pose a risk of losing crucial business transactions.

2023 Ransomware Preparedness: Lighting the Way to Readiness and Mitigation

Access the full report

So, when disaster strikes, what’s the most effective way to protect your data so you can minimize losses and expedite the data recovery process? Air gapping.

What is air gapping and why is it the ultimate in data protection?

Air gapping is a security measure that physically or electronically isolates a computer, network, or backup storage system from external, untrusted networks. The term “air gap” signifies a complete separation between the secured environment and the outside world, making it virtually impossible for digital threats, like malware and ransomware, to infiltrate the protected system.

For backup, this air gap is the vital step of keeping data copies on a logically separate infrastructure from the primary dataset, which is more commonly known as a logical air gap, and from where we derive the definition of true backup. Learn more about true backup.

The significance of air gapping in data protection lies in its unmatched level of security:

  • Absolute protection: Air gapped systems are impervious to online threats, offering the highest level of data protection. Even the most sophisticated ransomware attacks cannot compromise a system that has been effectively air gapped.
  • Preservation of data integrity: It ensures data integrity, as data stored within the air-gapped environment remains unaltered and uncorrupted.

So, how do we understand air gapping most simply? According to Wikipedia, “It means a computer or network has no network interface controllers connected to other networks, with a physical or conceptual air gap, analogous to the air gap used in plumbing to maintain water quality.”

Just like how water from your sink can’t flow back into your faucet to contaminate your clean water, air-gapped networks don’t let malware, ransomware, or otherwise corrupted data flow into your backup data: It’s simply not possible.

Physical air gap for SaaS data

In the faucet example, there’s clearly a physical separation that preserves the health of your water since your tap isn’t submerged in your sink. And while you can have an equivalent physical separation of backup data, this approach is resource demanding, expensive to maintain, and typically not agile enough to meet today’s demands for IT efficiency and speed. Why is that?

In order to keep backups offline, disconnected from any networks, you’d need to transfer data manually every single time you wanted a snapshot. This is costly hardware-wise and resource-wise, especially if you need to keep up-to-date backups — which you probably do for many reasons, not least of all compliance.

As businesses utilize more and more SaaS applications (organizations use an average of 371 SaaS apps), the costs and complexity to protect all of the SaaS data generated grows, too. For the absolute most business-critical data, a physical air gap may be worth the high cost to maintain, but surely not for tens or hundreds of SaaS apps. Imagine if you had to manually move data to a physical air gap twice a day for every single application to have updated backup copies from all your applications.

So, the question is how can you get top-tier data protection in the cloud that’s as secure as a physical air gap but much more agile and cost efficient? Well, we mentioned it above, and that’s the logical air gap.

Understanding the logical air gap: Efficiently countering ransomware threats

At its core, the logical air gap involves the use of advanced digital measures to segregate and protect network-connected digital assets. Through a combination of encryption, hashing algorithms, and role-based access controls, it creates a secure barrier around sensitive data, much like a physical gap.

But unlike its physical counterpart, the logical air gap doesn’t rely on physical isolation, it leverages intricate digital processes to render data incomprehensible and virtually impervious to unauthorized access, theft, or modification. The result is data that’s kept just as securely but with the significant added benefits of agility and efficiency because it’s kept online in a logically separate cloud infrastructure.

It’s really the best of both worlds: Top-tier security paired with modern accessibility, efficiency, and speed.

What are some key features employed in air gapping?

 Encryption as a shield:

The heart of the logical air gap’s defense lies in encryption. By converting data into an unreadable format that requires a decryption key for access, even if ransomware manages to infiltrate the system, it’s met with a cryptographic barrier. This renders the encrypted data useless to unauthorized parties, thwarting the primary objective of ransomware attacks.

Hashing for data integrity:

Hashing functions add an extra layer of protection by generating unique identifiers (hashes) for each piece of data. Any alteration to the data results in a change in the hash, which allows for the verification of data integrity based on these changes. This then provides safeguarding against ransomware silently manipulating files without detection.

Detection is an important part of being ransomware resilient, and so you or your data protection vendor needs to have this ability. Read about Keepit’s data monitoring dashboard.

Role-Based Access Controls:

Through meticulous access management, the logical air gap ensures that only authorized personnel have the requisite permissions to interact with sensitive data. This minimizes the attack surface for ransomware, limiting its ability to propagate and encrypt critical information.

Highlighting the lack of air-gapping adoption:

Surprisingly, despite its effectiveness, air gapping is not as widely adopted as it ought to be given its effectiveness in protecting data. In the 2023 Ransomware Preparedness report by ESG, it can be seen that “slightly more than one in four (27%) organizations have deployed it at this point.”

Altogether, a staggering 67% of organizations do not currently implement air gapping as part of their data protection strategy. This leaves them potentially vulnerable to ransomware attacks and other cybersecurity threats as air gapping is a crucial data protection best practice. Not ignoring the importance of air gapping, more than one third of those surveyed were interested in investing in an air-gapped solution.

For those organizations utilizing air-gapping methodologies, here’s how they’re doing it, according to ESG:

And in the event of data loss due to a successful attack, here’s how companies plan to recover:

Looking at the data above, it’s a logical step to consider what you and your company would do if faced with recovering from a successful ransomware attack. How do you plan to recover data? How confident are you that your mission-critical data is well protected and can’t be corrupted by ransomware?

If you’re looking for inspiration on how to answer those questions, there’s a long-accepted data protection best practice we can turn to. Originating in the on-premises days (but is still very much relevant for cloud data protection) is a backup principle that puts air gapping at the forefront. Let’s look into it.

The 3-2-1 backup principle: A resilient strategy for data protection

The 3-2-1 backup principle stands as a cornerstone in data protection, offering a robust strategy for safeguarding critical data against many threats, including ransomware. This “321 rule” outlines a simple yet highly effective approach to data backup and recovery.

3 copies: The first part of the principle emphasizes the importance of keeping three copies of your data. This includes your primary data and two backup copies. This redundancy is crucial because it ensures that multiple copies of your data are available for recovery in case of data loss or corruption.

2 locations: The second part of the principle recommends that you store two of the backup copies on different devices within your local environment. This diversification, also called redundancy, protects against hardware failures, localized incidents, and even some software issues. The use of different devices/locations adds a layer of security and redundancy.

1 copy air gapped: The final part of the principle advocates for keeping one of the backup copies offsite or in a separate location. What’s that in cloud language though? That means your backup data resides outside of the administrative domain of your production data, such as a vendor-independent cloud, rather than within the same cloud. This would be the logically separate infrastructure.

However, most cloud backup solutions store your backed-up data on the same public cloud infrastructure that also hosts your production data, which potentially exposes your company to several risks. It’s akin to storing your spare car keys inside the car in case you lock yourself out.

 

It’s vital to find a backup solution that stores backed-up data on an independent cloud since the ‘one’ is your ultimate safety net. It ensures that in the event of a catastrophic failure, natural disaster, or even a ransomware attack that compromises your local environment, you have a separate and secure copy of your data to rely on for recovery. For an in-depth look, read our post about the 3-2-1 backup rule.

Embracing the logical air gap not only fortifies digital assets against ransomware but also positions organizations at the forefront of proactive cybersecurity measures.

Where we go from here

 

While air gapping presents the best defense against ransomware, its effectiveness is contingent on strategic implementation. Regularly updating encryption protocols, monitoring access logs, and conducting thorough security audits are integral components of maintaining the integrity of this defense mechanism.

If you’re interested in taking the next step toward protecting your SaaS data, get a demo on how Keepit can play a vital role in creating a robust, cyber resilience data protection system.

Learn more about air gapping and other protective measures you can employ to mitigate your ransomware risk with our on-demand webinar co-hosted with Enterprise Strategy Group.

Watch our webinar

This post is part two of a five-part series on ransomware resilience and the role backups play in the protection against ransomware — read part one: Why backups are key ransomware targets. Check back soon to catch the third installment, which will cover the importance of immutability in SaaS data protection.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Monitoring functionality for data management and insights

Why you need data monitoring for cyber resilience 

Knowing what’s happening with your backup data at all times is a vital piece of the data protection puzzle, because if you can’t see changes to your data, you’re at risk.

Understanding the ever-shifting landscape of cyberthreats, navigating increasing regulatory demands, and managing complex IT environments are the daily challenges faced by IT managers, CIOs, and CISOs. Having continuous visibility into your backup data is not just an advantage: it’s a necessity. Which is why, according to a recent Enterprise Strategy Group (ESG) report, 77% of organizations rely on backup scanning.

Staying ahead requires more than just periodic check-ins. Our monitoring dashboard isn’t just a tool; it’s a vital part of your frontline defense in an era where malicious activities are ever evolving.

Continuous data monitoring serves as a proactive measure that ensures your business is not only compliant with increasing regulatory requirements, but also resilient in the face of complex IT environments where security blind spots may lurk. Beyond external threats, it’s about mitigating insider risks and acknowledging that malicious deletions don’t only occur from the outside.

Visible data makes a business resilient, and this is exactly why Keepit has security and data insights functionality built into our data protection platform. Our monitoring dashboard makes it simple and fast for you to boost your cyber resilience posture, because visible data makes a business resilient.

With Keepit’s monitoring dashboard, you gain the ability to have full visibility into what’s happening with your data environments, so you’re always informed and in control. This way, you can avoid unpleasant surprises and prevent data loss.

Let’s take a look into the Keepit monitoring dashboard.

Product overview

SaaS data protection is a key concern for most businesses because staying compliant and operational means being resilient in the face of data loss. Insights into the health of your data are key for cyber readiness.

The Keepit platform monitoring dashboard gives you powerful insights with total simplicity. From the monitoring dashboard, you can:

  • Spot trends and patterns
  • Track changes over time
  • Identify outliers and abnormal changes in data growth before they affect your business operations
  • Remain data resilient no matter what

To “just” back up data isn’t enough in a security ecosystem. You need your data protection vendor to have the ability to assist in the detection of and recovery from data loss events, such as ransomware.

Let’s look into the key features of our monitoring dashboard.

Features and benefits

With the Keepit monitoring dashboard, you get one view into multiple workloads. Get an overview of snapshot growth and changes between snapshots, such as files added, files removed (deleted), files modified, and more — in an instant via one dashboard.

Let’s highlight three key benefits

1. One platform, multi-workload awareness:

With the Keepit platform, you get the convenience and power of one dashboard reporting on numerous applications and workloads. This means you’ll quickly get accurate insights into your entire dataset in one view, rather than having to monitor multiple monitors. One look and you get an up-to-date view of all your business-critical SaaS data.

  • Use case: You’re a large enterprise leveraging many SaaS applications for increased productivity. With this increase also comes increased complexity. Consulting multiple monitors within these many workloads and applications is daunting, impractical, and time consuming. With the Keepit platform, you get one monitor across multiple workloads, such as Microsoft 365, Entra ID (formerly Azure AD), Salesforce, and Google.

2. Incremental forever approach:

We create snapshots from day 0, and we look for changes in data multiple times each day with our unique identifier architecture (hash-based Merkle Tree). This large history of snapshots provides a rich opportunity to analyze and monitor the data changes between snapshots. We will be applying this approach to identify changes in any single file or document in our upcoming model for anomaly detection.

  • Use case for anomaly detection (coming soon): Let’s say that you have a file — perhaps an important budget spreadsheet — that was never modified since it was created two years ago, but now it’s suddenly changed. When something unusual like this happens, you’ll have full visibility into that change via our monitoring dashboard.

3. Simplicity and easy-to-use platform:

Simplify the complexity of data protection monitoring with a centralized logging tool. Our monitoring dashboard creates a holistic view of cloud data usage and change/threat detection, which means enterprises, both big and small, can get their data where and when they need it.

  • Use case: Your IT team is tasked with the challenge of navigating through multiple interfaces, monitoring various workloads, and ensuring the security of critical data spread across platforms. Your IT staff spends valuable time toggling between monitors trying to identify changes and address potential security blind spots. This not only consumes time but also increases the likelihood of oversight, leaving your organization vulnerable to evolving cyber threats.With the Keepit dashboard, your IT team gains a significant efficiency boost from the simplicity of the solution. They can quickly spot trends, track changes, and identify changes across multiple workloads. This efficiency not only streamlines day-to-day operations, but also enhances productivity.

Availability

The monitoring dashboard is a dedicated tab within the Keepit solution as a key part of our effortless, secure, and reliable data protection platform. So, you don’t need to do anything extra to start benefiting from our next level data protection — it’s all included.

Conclusion

In the world of data protection, visibility into your data is non-negotiable. Keepit’s monitoring dashboard provides a convenient, no-nonsense solution for IT managers, CIOs, and CISOs who understand the value of keeping a close eye on their data — all of their SaaS data across multiple workloads — in one simple dashboard.

Gain a sense of control and confidence in an era where the fear of ransomware looms large by knowing that every change in your data is under vigilant observation. It’s the peace of mind that comes from being proactive rather than reactive. Confidence in data protection transforms into confidence in decision making, strategic planning, and ultimately, the company’s resilience in the face of cyber threats.

Interested in learning more? Visit our use cases page, or if you’re ready to take the next step, book a demo to explore the functionalities and experience the impact Keepit can have on your data security. Be sure to stay tuned to learn about our upcoming data model for anomaly detection.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Keepit at Gartner IOCS 2023 in London: How AI capabilities take SaaS data protection to the next level

Keepit speaks in two sessions: With Porsche Informatik on how Europe’s largest car distributor works to ensure cyber resilience today; and a showcase on how to prepare for future data protection

COPENHAGEN, DENMARK, Nov. 16, 2023 – Keepit, the market leader in cloud data protection and management, announced today that it will be presenting and exhibiting at the Gartner IT Infrastructure, Operations & Cloud Strategies in London, UK, from November 20th to 21st.

On Monday, November 20th, Keepit’s Chief Technology Officer (CTO) Jakob Østergaard will co-present with Josef Perlinger, Lead Program Manager Resilience, Security & Cloud at Porsche Informatik GmbH, in the session: “Keepit: Real-World M365 Cyber Resilience – Insights from Porsche Informatik.” The two talk about how Porsche Holding Salzburg, Europe’s largest car dealership, deals with the increase in cybersecurity threats by strengthening the organization’s cyber resilience with Keepit’s independent backup and recovery for Microsoft 365.

Key takeaways from the session will include:

• How cloud backup is crucial to fortifying Microsoft 365 against cyber threats

• Why an independent cloud is pivotal in achieving operational resilience

• Case studies from Porsche Informatik highlighting challenges and solutions in implementing cloud backup

Session 2: Cyber resilience, AI and data protection

On Tuesday, November 21st, Keepit’s CTO Jakob Østergaard is on stage again – this time, with Keepit VP of Product Henrik Brusgaard, for an Exhibit Showcase session entitled: “Keepit: Accelerating Cyber Resilience with AI-Driven Data Protection Platforms.” In the session, they reflect on the challenges of applying AI to data protection and shed light on how Keepit works to assess and select which AI capabilities to adopt, in order to match future, next-level data protection needs while adhering to existing and coming regulatory controls.

“Harnessing the power of technological advancement while securing user activity and user data is a key charge for all SaaS platform providers, and we really look forward to discussing these questions with the audience in London. All businesses are becoming SaaS-powered. We’re seeing a continuous transition with companies typically using hundreds of SaaS apps – and IT’s biggest concern is how to secure those SaaS apps.” says Keepit CTO Jakob Østergaard.

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2023 in London brings the world’s technology leaders together to hear top trends, find objective answers and explore topic coverage in addition to best practices.

How’s the NIS2 readiness coming along?

One topic that will be central to the conversations for the Keepit team at IOCS is the upcoming Network and Information Security (NIS2) Directive being implemented across the EU from October 2024:

“NIS2 will be taking the urgency of adhering to regulatory standards on data and infrastructure protection to the next level: It effectively enables regulators to hold company executives personally liable if the company fails to comply with the regulation. As backup and disaster recovery capabilities are identified as critical for compliance with NIS2, I look forward to a lot of interesting discussions on how organizations are preparing themselves,” says Jakob Østergaard.

At the event, the Keepit team will also be sharing the latest insights on how to mitigate the impact of ransomware attacks by ensuring fast and complete recovery for enterprises. Research shows that a strong backup and recovery strategy can mean the difference between organizations being able to ignore extortionists and having to succumb to paying ransom again and again.

WHAT: Solution Provider Session, “Keepit: Real-World M365 Cyber Resilience – Insights from Porsche Informatik”

WHO: Jakob Østergaard, Keepit CTO, and Josef Perlinger, Lead Program Manager Resilience, Security & Cloud at Porsche Informatik GmbH

WHERE: Arcadia, Level 2, InterContinental London, The O2

WHEN: Monday, Nov 20, 1:15 – 2:15 pm.

WHAT: Theater Session, “Keepit: Accelerating Cyber Resilience with AI-Driven Data Protection Platforms.”

WHO: Jakob Østergaard, Keepit CTO, and Henrik Brusgaard, Keepit VP of Product

WHERE: Theater 1, Exhibit Showcase, Level 1, InterContinental London, The O2

WHEN: Tuesday, Nov 21, 10:00 – 10:20 am.

Keepit will be exhibiting for the duration of the conference at booth #301.

To arrange a product demonstration or meeting with a member of the Keepit team at the conference, book a meeting here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

What’s the business risk of not backing up Azure AD?

Keepit’s Paul Robichaux, Microsoft MVP and Keepit Sr. Director of Product, explains the math of not protecting Azure AD (Entra ID).


“It’s all about the probability of ‘x’ expected damage. The probability: 2/3 of Azure AD admins don’t use MFA. With 50 million password attacks daily targeting Azure AD, you can be pretty sure you’ll be on the receiving end of a successful attack one day. Or a system outage. Or human error.”


The damage: Protecting your identities and policies is critical to keeping your business up and running. Losing access to Azure AD means your business is dead in the water.


The solution: Back up Azure AD in a completely separate infrastructure.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

Why backups are key ransomware targets

And 10 best practices for being ransomware resilient

“Ransomware is the new normal.” We’ve all heard it, and we’re going to keep hearing it. Why’s that exactly? Cyberthreats such as ransomware are a constant concern, and now more than ever, safeguarding your data (and business) against ransomware attacks is a necessity as the frequency of ransomware attacks continues to increase and new regulatory standards for cybersecurity are introduced.

The frequency of attempted ransomware attacks
respondents experienced over the past 12 months​:

How often businesses experienced a ransomware attack during the past 12 months, according to ESG research

IT managers, CISOs, and CIOs are acutely aware of the pivotal role data protection plays in their organizations and are searching for a ransomware solution, but it’s not “just” the data at risk, it’s the entire business impact. And ransomware is increasingly targeting backup data.

So, what’s the level of concern across those tasked with cyber resilience?

According to ESG research, nearly 1 in 3 have serious concerns about the security of their backups

According to the Enterprise Strategy Group (ESG) report, “2023 Ransomware Preparedness: Lighting the Way to Readiness and Mitigation,” of the 600 IT and cybersecurity professionals surveyed, only 4% were not concerned at all about ransomware attacks affecting their data protection copies. So, that’s a whopping 96% that have at least some level of concern for their backup data — with nearly one in three voicing serious concerns.

Access the full report

Let’s look into the current ransomware landscape to understand why backups are being targeted by ransomware and the measures (both proactive and reactive) that companies should have in place to not fall victim to the ransomware threat. This will lead us into data protection best practices that ensure cyber readiness.

6 Reasons why backup is targeted by ransomware

  

  • Data recovery: Ransomware attackers understand that organizations rely on their backups to recover from data loss incidents. By encrypting or deleting backup data, cybercriminals significantly reduce the victim’s ability to restore their systems and data without paying the ransom. 
  • Business continuity: When backup data is compromised, an organization’s ability to continue its operations is severely hampered. Ransomware aims to disrupt business continuity and inflict financial damage. Targeting backups achieves this goal effectively. 
  • Data value: Backups often contain a comprehensive historical record of an organization’s data, which can be extremely valuable. This includes sensitive customer information, intellectual property, and financial records. Ransomware attackers can threaten to expose or sell this data to further pressure victims into paying the ransom, or leverage compliance-critical data that organizations need to avoid serious liabilities, substantial fines, and reputational damage. 
  • Access and control: Once ransomware infects a system, it often seeks to propagate to other devices on the network. By compromising backups, the attacker gains a strategic foothold in the organization’s infrastructure, making it easier to continue the attack, demand ransom, and potentially cause more damage. This is very much a valid concern for businesses utilizing Entra ID. Learn more about the control plane and why data cloud protection is a must for Entra ID (Azure AD).
  • Lack of separation: In many cases, cloud backups are stored on the same network or in the same cloud environment as the primary data. This is true with Microsoft backups and others using public cloud. If ransomware infiltrates one part of the network, it can easily spread to backups that lack adequate separation, rendering them vulnerable. 

    Put simply, one attack could reach all your production data and backup data. This brings to mind the adage of not putting all your eggs in one basket and is why true backup requires having backup data on a logically separate infrastructure. 
  • Minimal security measures: Historically, cloud backups have not received the same level of security scrutiny as production data. Many organizations focus their security efforts on their active systems and underestimate the need to secure backups adequately. If your backups aren’t stored safely and independently, how can you restore your data from them in the event of an attack? With new cybersecurity regulations being introduced, organizations need to put their attention on how to secure their backups in a way that is compliant with regulations.

The protection gap

The protection gap in data security refers to the potential vulnerability that exists between an organization’s primary data and its ability to recover or restore that data in case of data loss or a cyberattack.

This gap stems from the fact that while organizations invest in various security measures to protect their active data, they may overlook comprehensive backup and recovery strategies. This oversight can leave critical data exposed and susceptible to loss, damage, or theft.

We can see from the respondents’ answers in the report that backup infrastructure security is one of the most critical to protect, as well as one of the areas with the biggest gaps in ransomware preparedness.

Top four preventative security controls, as well as the top four gaps in ransomware preparedness:

Top security controls critical in protecting against ransomware, as well as the top four gaps in ransomware preparedness

What are the common vulnerabilities in data protection?

 

  • Inadequate access controls: Weak or improperly configured access controls can allow unauthorized users or malware to infiltrate backup systems, compromising the integrity of the data stored there.
  • Lack of air gapping: In cases where backup systems share a network with primary systems, ransomware can easily move between them. The absence of air gapping (network segmentation) increases the risk of cross-contamination.
  • Insufficient authentication: If backups lack robust authentication mechanisms, malicious actors can gain unauthorized access to backup data, manipulate it, or delete it without hindrance.
  • No data immutability: Without data immutability, backup data is vulnerable to tampering by ransomware. Attackers can alter or delete backup files, rendering them useless for recovery.
  • Single points of failure: Relying on a single backup solution or location can result in a single point of failure. If this point is compromised by ransomware, an organization may lose both primary and backup data.

Understanding the vulnerabilities and the tactics used by ransomware to attack backup systems is essential for developing a comprehensive defense strategy to protect valuable data assets and maintain business continuity.

Safeguarding your data: Data protection best practices

Organizations employ various strategies and technologies to protect their cloud-based backups and ensure data integrity, and there are well-established best practices proven effective at keeping data safe and companies compliant with all regulatory bodies, such as NIS2 and GDPR. These methods are essential for safeguarding cloud data against various threats, including ransomware.

Here’s 10 best practices that organizations typically follow to ensure their cloud-based backups are protected and that their businesses meet regulatory and compliance standards: 

   

  • Access control: Access to cloud backup systems is tightly controlled. Only authorized personnel are granted permission to modify or delete backup data stored in the cloud. Access control mechanisms may include role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security. It’s also important to limit the number of subprocessors to as few as possible: Some backup solutions even have zero subprocessors.

  • Encryption: Backup data stored in the cloud is encrypted both in transit and at rest. This ensures that even if an attacker gains access to the data, it remains unintelligible without the right decryption keys.

  • Data immutability: Immutability features are implemented to prevent the unauthorized modification or deletion of backup data. This safeguards the integrity of the cloud backups, making them resilient to ransomware attacks.

  • Regular cloud backups: Organizations perform regular backups of their cloud data to ensure that information is backed up frequently. This minimizes the amount of data that could be lost in an attack or data corruption.
  • Offline and air-gapped backups: Some organizations maintain offline or air-gapped cloud backups. These backups are physically disconnected from the network, making them immune to online attacks, including ransomware. Air-gapped cloud backups are especially effective in preventing data loss due to cyber threats.
  • Versioning/snapshot: Cloud-based backup systems often support versioning, allowing organizations to recover previous versions of files stored in the cloud. This feature is crucial for restoring data to a known-good state when ransomware has altered files.
  • Geographic redundancy/sovereignty: Large organizations may store cloud backups in multiple geographic locations within the cloud infrastructure to mitigate the risk of data loss due to regional incidents or localized cyberattacks. It’s vital that your data protection provider offers regional data centers and that they guarantee no data transmission outside of your selected region.
  • Regular testing: Cloud-based backup systems are regularly tested to ensure that they are functioning as expected. This involves not only verifying the backup process but also performing restoration tests to confirm that cloud data can be successfully recovered.
  • Monitoring and alerts: Continuous monitoring of cloud backup systems and alerts for suspicious activities are set up. Any unusual access or data modification triggers alerts that can be addressed promptly.
  • “Offsite storage” in the cloud: Backups are often stored offsite in cloud services. This protects cloud data in the event of on-premises disasters, such as fires or floods. But in cloud storage, having backup data outside of the production environment is key: Read more about this in the 3-2-1 backup rule blog.

By implementing these protective measures, organizations can maintain the security and availability of their cloud-based backup data, reducing the risk of data loss due to ransomware and other potential threats and thereby strengthening cyber resilience.

As organizations have become aware of the vulnerabilities in their data protection processes for backup and recovery, many are taking extra precautions to safeguard their backup copies, which are crucial for recovery in case of a crisis.

Let’s look at the percentage of organizations taking additional measures to protect their backup copies​:

According to ESG research, the percentage of organizations taking additional measure to protect their backup copies

As awareness grows of the vulnerabilities and data protection best practices, it’s unfortunately only 40% of organizations that are making extra efforts to protect all their backup copies. This gap in data protection is highlighted in the finding that after a ransomware attack, not all data can be recovered.

The amount of data organizations were able to recover after a ransomware attack:

Percentage of data able to be recovered by organizations after a ransomware attack, according to ESG research

The numbers show that there is still a lot to be done to prepare for the ransomware threat. To continue learning about what to do to improve your cyber resiliency and avoid being ransomed, join us for our expert-led webinar on November 28. Together with industry experts from Enterprise Strategy Group, we will be sharing even more insights and discussing best practices and data protection strategies that effectively combat the threat of ransomware.

Join our webinar!

This post is part one of a five-part series on the role backups play in the protection against ransomware, so check back soon to catch the next installment, which will cover the importance of air gapping in data protection.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.