As companies bolster their security strategies, attackers are finding new ways of spotting and exploiting vulnerabilities within corporate IT stacks to turn a profit. Many companies have turned to air-gapped and immutable backups as a way of avoiding having to pay ransom payments, yet, this strategy is becoming increasingly weak. As Ransomware 2.0 is often intentionally delayed, laying dormant in order to infect backup infrastructure, and providing attackers valuable time to use stolen login credentials and re-configure settings within backup applications.
In Episode 2 of Asigra’s Original Series, ‘Ransomware 2.0: Shield your data from Attack Loops,’ we’ll be discussing why immutable backups are no longer sufficient to protect company data from ransomware attacks and exploring strategies you can implement to bolster backup security.
Topics for discussion include:
- Understanding how Ransomware 2.0 works and the risk it poses to corporate data
- The fall of traditional ransomware mitigation strategies such as immutable and air-gapped backups
- How attackers are breaking into corporate backups to improve their chances of getting ransom
- Why it is important not to be overconfident in the integrity of your backups.
- And more…