editor ’ s question
round the world ,
A businesses , non-profits and government agencies are turning to the cloud , whether private , public or in a hybrid fashion , in order to reap benefits such as virtually unlimited scalability , increased efficiency , enhanced capabilities and reduced costs .
In fact , according to a recent report from Fior Markets , ‘ The global cloud computing market is expected to grow from US $ 270.15 billion in 2017 to US $ 712.83 billion by 2025 at a CAGR of 18.46 % during the forecast period from 2018 – 2025 ’.
With so much data – the virtual lifeblood of organisations – flowing into the cloud , it isn ’ t surprising that cloud security has risen to the top of most business and IT professionals ’ priority lists , alike . And with increasingly aggressive ransomware and other cybercrime consistently making headlines , it ’ s clear that cloud security won ’ t be knocked from its top priority position anytime soon .
The Verizon Business 2022 Data Breach Investigations Report voiced its concern regarding ‘ the alarming rise in ransomware breaches , which increased by 13 % in a single year – representing a jump greater than the past five years combined ’.
So how can organisations improve their cloud security ? The ideal answer can be found in a layered defence that includes protection and detection solutions , as well as Unbreakable Backup to ensure the ability to recover .
Today , it is common for backups to be a cybercriminal ’ s first target via ransomware and other malware .
However , an Unbreakable Backup solution provides organisations with
So how can organisations improve their cloud security ? The ideal answer can be found in a layered defence that includes protection and detection solutions , as well as Unbreakable Backup .
two of the most difficult hurdles for cybercriminals to overcome – immutable snapshots and object locking .
Immutable snapshots are by default , write-once read-many ( WORM ) but now some vendors have added features
SURYA VARANASI , CTO , STORCENTRIC
like encryption where the encryption keys are located in an entirely different location than the data backup copy ( ies ).
And then to further fortify the backup and thwart would-be internal and external criminals , with object locking layered on top of that , data cannot be deleted or overwritten for a fixed time period , or even indefinitely .
It is common for backups to be a cybercriminal ’ s first target via ransomware and other malware .
28 www . intelligentciso . com