Never waste a good crisis: How to handle a ransomware attack

At VNOG, we provide essential fire-fighting services and assistance in the event of accidents, disasters and crises to the 870,000 citizens of North and East Gelderland in the Netherlands. In this blog post, I’ll tell the story of my most memorable day as VNOG’s Chief Information Security Officer (CISO). Read more
Edwin Moraal
Edwin Moraal

Chief Information Security Officer, Veiligheidsregio Noord- en Oost-Gelderland

Veeam & Infinidat: Enterprise Ransomware Protection Solution

Remember the days when your data protection strategy was designed around system failures or loss of a data center due to a catastrophe, whether manmade or natural? While preparing for these types of disasters is still very much a priority, in the past decade a new menace has surfaced, demanding the attention of organizations everywhere. Read more
Steve Firmes
Steve Firmes

Solutions Architect

Protecting your critical enterprise applications

Enterprises routinely face challenges when it comes to protecting their critical workloads. Meeting demanding Service Level Agreements (SLAs), unsought multi-team workflows, and convoluted or sprawling toolsets are just a few of the common constraints that organizations routinely face. When these challenges start to compound, you quickly wind up in situations where simple tasks can grind your applications to a halt.  Read more
Matt Crape
Matt Crape

Senior Technical Product Marketer

How to Recover Quickly from a Ransomware Attack

Ransomware attacks need to be viewed under the same category as power outages and natural disasters. The requirement to recover quickly is a necessity. Recently, I'm seeing many vendors in the data protection industry advertise immutability and ransomware detection features. Both of which should absolutely be part of a company's ransomware strategy, but an immutable copy coming from spinning disk or tape can result in too much downtime for the business. It's an easy decision for a CEO or CFO if an attacker's ransom is $100,000 and the cost of downtime for a day is $500,000. The only question at that point becomes how do we make a Coinbase account to transfer Bitcoin? Read more
Brad Linch
Brad Linch

Enterprise Systems Engineering Manager

How to Scan Backups for Ransomware

Protect, Detect and Recover! The three key pillars a backup vendor is expected to offer when it comes to the NIST Cybersecurity Framework. The top priority on that list is protecting your data. A secure backup both on premises and in a private or public cloud offers immense protection. This can protect data from both a hacker accessing the backup server as well as the backup repository. Secondly, the ability to recovery quickly is crucial. Read more
Brad Linch
Brad Linch

Enterprise Systems Engineering Manager

Cyber Chat: Use strong passwords and keep them secure

Similar to most families in the Northern Hemisphere, besides being Cybersecurity Awareness Month, October is also a time of year where scary movies and pumpkin patches take centerstage. For us, we recently took our kids to pick pumpkins still on the vine, suffer through a very bumpy hayride and line up against the eight foot ruler to see “How Tall this Fall” our kids were. All of these activities were free (besides paying for the pumpkins themselves).   Read more

Why Ransomware Attacks Work and What You Can Do Besides Pay the Ransom

Television and movies would have us believe cybercriminals have to execute complex plans that involve rappelling from rooftops and avoiding lasers to break into our networks. In reality, it only takes a well-crafted email and a distracted person to start a chain of events that can cost millions of dollars to repair. While that seems like a simple problem to solve, multiple layers of security controls needed to fail for the ransomware attack to succeed.  Read more
Chris Hoff
Chris Hoff

Security & Data Protection Marketing Manager

Defend your company against phishing attacks

Phishing scams are attempts by cybercriminals to trick users into performing some type of action like clicking on a link, entering credentials, opening an attachment or even making changes to a company’s process. These scams are most commonly delivered as malicious emails but can also take other forms. They can result in ransomware, installation of malicious software (viruses, Trojans, worms), stolen credentials, theft of money, data loss or even identity theft. Phishers exploit common human traits, like trusting people you know, to trick you into doing something that you normally wouldn’t. Read more
Gil Vega
Gil Vega

Chief Information Security Officer