Veeam Blog
Filters (Results: 38)
Results: 38
Filters (Results: 38)
  • Capabilities (2)
  • Business Types (1)
Stay up to date on the latest tips and news
By subscribing, you are agreeing to have your personal information managed in accordance with the terms of Veeam’s Privacy Policy
You're all set!
Watch your inbox for our weekly blog updates.
OK

Top 5 TTPs Targeting Enterprise Cybersecurity

As enterprises continue to strengthen their security tactics, threat actors are continuously refining their methods to sidestep them. In 2024, advanced tactics, techniques, and procedures (TTPs) evolved significantly, shaping the threat landscape with greater efficiency and effectiveness. These advancements have intensified enterprise cybersecurity threats, making proactive defense strategies more critical than ever.

With the dust now settled, let’s look at the TTPs most frequently leveraged against enterprises, which proved most impactful, and how enterprises can detect these threats before it’s too late.

TTPs Targeting Enterprises Today

1. Exfiltration

The concept behind data extortion attacks is straightforward: steal sensitive data and use it as ransom leverage. Threat actors have evolved beyond traditional encryption-based attacks, finding new avenues ... Read more

Raymond.Umerley
Raymond.Umerley

Field CISO

Crafting an Effective Incident Response Plan

No organization is immune to cyberthreats. 75% of organizations experienced at least one ransomware attack in 2023, meaning having a robust Incident Response Plan (IRP) is no longer optional  — it’s a necessity. An incident response plan acts as your organization's defense playbook, ensuring a swift, coordinated response to mitigate damage, minimize downtime, and protect sensitive data. Read more

What is Enterprise Cybersecurity & Why it’s Important

At its core, enterprise cybersecurity is about safeguarding an organization’s data and systems from unauthorized access, data breaches, and other forms of cyberattacks. It involves a combination of technologies, processes, and policies designed to prevent, detect, and respond to potential threats. Read more
Megan Schillereff
Megan Schillereff

Senior Technical Writer