Ransomware actors almost always attempt to compromise their victims’ backups to increase the pressure to pay. When they succeed, the outcomes are significantly worse: ransom demands double and overall recovery costs are 8X higher. Threat actors almost always attempt to compromise backup repositories, recognizing that holding data hostage is the best way to ensure a significant payout. Having your backups compromised results in significantly worse outcomes.
Safeguarding your valuable backup data is a key objective in the face of the escalating sophistication of ransomware attacks. Coordinating your cybersecurity and cyber recovery strategies gives you the best chance of defending against, and recovering from, a ransomware attack.
Hear Dave Mareels, Senior Director, Product Management at Sophos and Ray Heffer, Field CISO at Veeam, as they share real-world insights and tactics employed by today’s adversaries, along with key warning signs of attempted backup environment compromise. In this session, they outline best practices and recommendations for building a holistic cyber risk reduction strategy to detect and stop malicious actors before they infiltrate your backups—providing peace of mind that your data is always available and easily recoverable.