Recently, I had the chance to visit with an IT pro who had experienced a ransomware encryption attack, and he told me about the scariest words he heard during those first several minutes. Upon receiving the ransom demand, the first thing they did was check their backups — only to discover that the backups were…
Let’s take this opportunity to learn from how organizations were affected by an IT outage that was not a cyberattack through five key lessons: IT Resiliency is a Competitive Advantage As of Tuesday, within the US, most of the airlines were returning to normal operations except one. There’s been discussion about their choice to cancel…
Happy #WorldBackupDay ! In COVID-times, we often hear about “the New Normal” to remind us that things won’t entirely go back to the way that they were. But for World Backup Day (WBD), I’d like to remind you of an “Old Normal” that has not changed – your data is still YOUR DATA. I’ve been in…
In 1943, Maslow’s Pyramid of Needs described a hierarchy within psychology, whereby until you addressed foundational elements such as Food/Water … you can’t feel safe, you can’t find love, you struggle with self-respect, etc. Data protection actually has a similar hierarchy (starting from the bottom): Reliable Restore-ability The most basic need of any data protection scenario…
One of the coolest projects that I have done so far at Veeam has been to write a small Dummies book on the three languages of Data Protection: Technical = RTO & RPO Operational = SLA’s based on BIA & RA Financial = TCO & ROI This (little) book was meant to be a Rosetta…
Not too long ago, the gold standard for protecting organizational data involved using a disk-to-disk-to-tape process. First, a copy of production data went to secondary disk to expedite rapid recovery if needed, and then the data went to tape for long-term retention. Previously, some organizations used only tape, and a few moved to using only…