Why Ransomware Attacks Work and What You Can Do Besides Pay the Ransom

Television and movies would have us believe cybercriminals have to execute complex plans that involve rappelling from rooftops and avoiding lasers to break into our networks. In reality, it only takes a well-crafted email and a distracted person to start a chain of events that can cost millions of dollars to repair. While that seems like a simple problem to solve, multiple layers of security controls needed to fail for the ransomware attack to succeed.  Read more
Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Defend your company against phishing attacks

Phishing scams are attempts by cybercriminals to trick users into performing some type of action like clicking on a link, entering credentials, opening an attachment or even making changes to a company’s process. These scams are most commonly delivered as malicious emails but can also take other forms. They can result in ransomware, installation of malicious software (viruses, Trojans, worms), stolen credentials, theft of money, data loss or even identity theft. Phishers exploit common human traits, like trusting people you know, to trick you into doing something that you normally wouldn’t. Read more
Gil Vega
Gil Vega

Chief Information Security Officer

Is all of your critical data really protected?

Veeam is known for having the best protection for VMware, Hyper-V, Windows and Linux. By creating solutions that effectively protect virtual environments and adding additional features for physical protection, Veeam has grown to be the industry leader in data protection. With four years of the top ranking in the Gartner Magic Quadrant, ongoing industry-leading Net Promoter Scores (NPS) at 82 and, most recently, the acknowledgement that Veeam is in a statistical tie for #1 in market share. This is all because of YOUR support and trust in Veeam.   Read more
Kaleigh Bovey
Kaleigh Bovey

Senior Product Marketing Manager

Chris Spencer
Chris Spencer

Senior Director, Product Marketing

Service Providers: Simplify hybrid and multi-cloud backup

As a service provider that delivers managed backup services, many of the customers you serve are rapidly adopting hyper-scale public cloud platforms such as AWS, Microsoft Azure and Google Cloud as part of a hybrid or multi-cloud strategy — and relying on you to help them protect this data along the way. In fact, over 50% of respondents surveyed said their organization is considering a hybrid-cloud strategy by 2024. Although competing against these large public cloud providers to deliver Infrastructure and Platform as a Service solutions may not be advantageous, managing and protecting this data is still a critical need and a profitable opportunity. Read more
Michael Loos
Michael Loos

VCSP Manager, Product Marketing

Remediation Lessons from Ransomware in 2022

Veeam recently published the largest independent ransomware research project of its kind, the 2022 Ransomware Trends Report. Last week, we explored the first question that has to be asked when ransomware is first discovered, “How pervasive was the attack(s)?” But after that, the organization has to decide how it will move forward by remediating the intrusion and its effects. Read more
Jason Buffington
Jason Buffington

Vice President, Solutions Strategy

Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Pervasiveness and Causes of Ransomware in 2022

Veeam recently published the largest independent ransomware research project of its kind, the 2022 Ransomware Trends Report. For the next few weeks, we’ll be unpacking some of the key findings of that research, starting with “How pervasive are these attacks?” Read more
Jason Buffington
Jason Buffington

Vice President, Solutions Strategy

Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Ransomware: Secure Backup Is Your Last Line of Defense

People have asked what we mean when we say, “secure backup is your last line of defense.” Over the last ten years, the security industry has realized modern ransomware protection requires an integrated security architecture from endpoints to network and cloud to detect, correlate and remediate attacks completely. Read more
Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Alignment of Backup within Cyber Preparedness

People, process and technology are the triad for cybersecurity strategy. Too often we focus on the technology portion and struggle to respond when failures occur or attacks are successful. Too often there’s confusion and delay because processes aren’t documented, teams are siloed and possibly in conflict or, worse, assumptions are made regarding responsibility. In a world of modern attacks like ransomware, this turns into real dollars due to downtime and data loss. Read more
Jason Buffington
Jason Buffington

Vice President, Solutions Strategy

Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Announcing the Data Protection Trends Report for 2022

Veeam is very excited to announce the latest and largest research report on data protection, as surveyed by an independent research firm. We say “largest” due to nearly 3,400 responses. When most research includes between 200-400 responses, Veeam sponsored 10X that in order to then cut the data and better understand not just the global market and trends, but the nuances across countries, regions, vertical industries, etc. Check out last year’s blog to understand how we cut 3,000+ responses. Read more
Jason Buffington
Jason Buffington

Vice President, Solutions Strategy

Dave Russell
Dave Russell

Vice President, Enterprise Strategy

Ransomware Recovery: What You Need to Know

Did you know that only 65% of data is recovered during a ransomware attack according to Sophos’ State of Ransomware study? Today, we’re going to take a deep dive into some of the most commonly asked questions about recovering from ransomware and things that everyone should know before they are hit by it. Read more
Melissa Palmer
Melissa Palmer

Team Lead/Senior Technologist, Product Strategy