Historically we were continually educated on the notion that regular back-ups were the key to a fast recovery. However, the Australian Cyber Security Centre has observed that increasingly sophisticated cybercriminals will locate and target backups that have not been isolated from the network – maximizing the impact of their ransomware and increasing the likelihood of targeted businesses paying ransom demands.
When implementing processes and systems to guarantee your essential data is recoverable, focus on ensuring back-ups are up to date and, most importantly, isolated.
Dell Technologies can provide secure data isolation via policy-driven automated workflows to securely move business-critical data into an isolated environment. An intuitive dashboard gives you the power to create protection policies in less than 5 steps while monitoring potential threats in real-time.