Register for our upcoming webinar: Making Veeam Backups Secure >>>

Blog

April 18, 2024 | 7 min to read

Zero Trust and Enterprise Data Backup and Recovery

The Zero Trust model represents the current best practice for organizations seeking to protect and secure their data and business. However, this model has not been substantively applied to data backup and recovery. Zero Trust advisory firm Numberline Security and Veeam recently collaborated on research to fill this gap and reduce risk for organizations seeking to evolve beyond perimeter security. 
 

April 11, 2024 | 3 min to read

Implementing The Airport Security Model for Data Protection

In today's digital age, safeguarding critical data is paramount. We've all experienced the tightened security measures at airports, where protecting passengers and assets is non-negotiable. Likewise, the principles of secure data storage reflect the rigorous security protocols observed in airport terminals. The parallels between airport security and data security are abundant because we have realized that we must protect the things that keep us moving – air travel and data. 

April 04, 2024 | 7 min to read

Top Seven Cybersecurity Threats in 2024

As cybercrime is projected to take a toll of $9.22 trillion on global internet users in 2024, the urgency to understand and interact with diverse cyber threats has never been more critical. These looming dangers pose significant risks to business operations, financial stability, and reputation, underscoring the need for robust defensive strategies. Discover insights into navigating these challenges and implementing effective countermeasures to safeguard your enterprise. 

March 28, 2024 | 5 min to read

3 Ways to Improve Recovery Rates on World Backup Day

This year, I wanted to enhance some of the tips I shared last year and mix some spicy new ones to help all backup-minded individuals find the peace of mind they deserve. Consider this blog an amendment to the previous World Backup Day constitution.  

March 26, 2024 | 5 min to read

Unlocking the Secrets of Veeam Hardened Linux Repository

Veeam Hardened Repository (VHR) is an option for secure, immutable backup storage and is a popular choice among Veeam enterprise customers. However, IT security and Linux expertise are required to deploy and manage VHR properly over time, and as such, it is not a suitable option for environments lacking in-house IT security skills. This blog post series is intended to provide an overview of the pros and cons as well as technical and operational considerations while choosing VHR for your environment.

March 21, 2024 | 6 min to read

Why Object Storage Is Best for Backup and Recovery

2024 Cybereason's study reveals that 78% of organizations targeted by ransomware faced a second attack, often with higher ransom demands. For businesses, falling victim not only means financial loss but also significant disruptions to operations and a drop in customer trust. 
Object storage is a critical line of defense against escalating ransomware attacks, ready to redefine how you protect your most precious digital assets.

March 14, 2024 | 2 min to read

Pitching Simplicity, How Ootbi Makes Everything Easier

In the complex landscape of cybersecurity solutions, finding the right pitch can often feel like navigating a maze. With countless options vying for attention, the thought of adding yet another storage solution to your portfolio may seem daunting. However, what if there was a solution that could simplify your pitch process and address the specific storage needs of Veeam users with ease? Enter Ootbi.

March 07, 2024 | 7 min to read

Mastering the Ransomware Phases: From Infiltration to Extortion

The financial cost of cybercrime is predicted to reach USD 10.5 trillion annually by 2025, emphasizing the urgent need to strengthen your ransomware defenses. The key to turning the tide in this cyber battle lies in mastering the art of knowing your enemy.

Delve into the anatomy of a ransomware attack to arm yourself with the wisdom to craft an impenetrable shield for your business and be ready to outmaneuver those lurking in the shadows.

February 29, 2024 | 5 min to read

The Importance of Being Simple

Simplicity, on the other hand, can be a powerful tool in enhancing data center security. A simpler system is easier to understand, monitor, and secure. It reduces the number of potential attack vectors and makes it easier to spot anomalies.

Here are some ways simplicity can be incorporated into data center security.

February 22, 2024 | 4 min to read

Are Immutable Backups Your Best Bet Against Ransomware Attacks?

The financial impact of ransomware is projected to soar to an astounding $265 billion annually by 2031, with cybercriminals launching attacks every two seconds, escalating their tactics in sophistication and frequency.

Despite numerous ransomware defense strategies, the stark reality remains that no system is entirely invulnerable to these threats, transforming the question of 'if' into 'when' an organization will face such an attack.