June 3-5 | Join us at VeeamON >>

Posts by Hubert Brychczynski

Hubert Brychczynski
Hubert’s mind is as unstructured as data in object storage. He has a soft spot for alliteration but enough discernment in dispensing the words at his disposal to keep it in check—at least most of the time. Object First inspired Hubert with its mission to end ransomware, so he joined to spread the message. In the words of Roy Peter Clark, he aspires to “tell stories in the public interest” and “make complicated things interesting enough so that readers will pay attention.” Hubert spends time / researching cybercrime / but is partial to rhyme. His favorite poet is Ogden Nash, who said: “In chaos sublunary, what remains but constant buffoonery.” He loves comic books, and “Calvin and Hobbes” holds a special place in his heart. PS. You can pronounce his last name like this: “brick-chin-ski”.
link
March 27, 2024

What is Data Protection? Principles & Trends for 2024

Data protection is becoming more critical than ever as hackers continue to discover new and surprising attack vectors. For example, they can now guess with 95% accuracy what is being typed on a smartphone by analyzing vibrations on the screen.

Once criminals get hold of sensitive data, they encrypt it for ransom, leak it, sell it on the black market, or all of the above. Data protection remains the single most important guardrail against data-related incidents. This article discusses it in depth.

March 08, 2024

Continuous data protection: The time machine for your data

Say you lost something. Now, imagine a time machine that lets you go back and lift that thing from the last place you still had it in. Continuous data protection (CDP) is a process that allows businesses to do the same with data.

Organizations can immensely benefit from continuous data protection because it enables instantaneous recovery of any data from any point in time without the limitations of backup windows or recovery point objectives. This article explains continuous data protection, how it works, its pros and cons, and how it compares to traditional backups.

March 08, 2024

Data Backup Strategy: A 9-step Path to Safety

Things inevitably break. It is true for every system, but especially for the complex ones. Today’s data infrastructures are notoriously complex in and of themselves and often connected to the World Wide Web. As such, they are incredibly vulnerable to compromise. Although the vulnerability is inherent in their design, a robust data backup strategy successfully mitigates it.

January 17, 2024

Air gap backups: What are they, and how do they work?

Air gapping does for software what social distancing does for people—wards off infections. It’s a backup and recovery strategy that stops malicious agents from infiltrating, buttresses the security posture in hyper-converged infrastructure (HCI), and plays a crucial role in recovery procedures such as disaster recovery plans (DR). What is air gapping? Air gapping is a…

November 30, 2023

Write-Once-Read-Many (WORM) Storage: Your Data Set in Stone

To see write-once-read-many in action, visit the Museum of Palermo. It houses the Palermo Stone–a sturdy, black piece of basalt rock with engravings about the events of its time. Four thousand four hundred forty years old, it survived unscathed to our times. Contemporary businesses seek similar information security but face more significant threats than just…

October 27, 2023

S3 Object Lock for Ransomware Protection

Ransomware attacks show no signs of abating. If anything, they are getting worse. According to Black Kite, ransomware incidence nearly doubled in early 2023 compared to last year. With the integrity of their businesses on the line, prudent entrepreneurs must take every action to resist ransomware. For example, they might consider using S3 Object Lock,…

October 12, 2023

Zero-Trust Security: Assume Nothing, Verify Everything

Zero Trust is a military-grade security model officially endorsed by the US Department of Defense. It is a trust-no-one, air-tight security paradigm that grants no ultimate clearance and constantly screens against potential threats at every organizational level. Companies are finding Zero Trust security essential to their operation because unfettered connectivity, remote work, and cross-border collaboration…