According to a survey done by Fortune Magazine, the number one threat to a business cited by CEOs is cyberattacks.
With ransomware attacks increasing over the past few years, cybersecurity is a top priority for all segments, all industries, and even the government.
speaks with Eric Herzog
, VP of Business Development and Evangelism for IBM
- Why data security is so important
- The move from traditional resilience to cyber resilience
- The architecture approach to data resilience
- Why administrative security is important
Cybersecurity has been an issue for a while. However, the digital transformation has intensified it.
“People are working remotely, the customers are remote, people are doing webinars to get information, not just in IT, but in every segment, business is being transacted over the internet,” Eric says. “The environment is ripe for ransomware and malware.”
IBM Security Division
To combat the cyberthreats, IBM has been imbuing their storage products with security technologies.
The company has built up a broad portfolio of storage solutions that include embedded cyber and data resilience which spans primary storage as well as secondary storage.
Traditional resilience refers to business continuity. Do you have a plan in place to keep your business running, if say, a hurricane or an earthquake hits?
Cyber resilience extends that philosophy to include cybercrime. With that comes a whole new set of questions.
“Are you doing air gapping, which allows you to separate to a different network or a different physical location as an example,” Eric says.
IBM takes an architectural approach to data resilience.
Here’s what that looks like:
- Profiling your data so you know what data is important, what is semi-important and what can just be archived
- Looking at your budgets and determining what you want to spend
- Evaluating your storage estate—IBM offers a free cyber resilience assessment covering all storage solutions
- Architecting solutions that help you avoid malware and ransomware
- Devising and practicing recovery processes for when a cyberattack does happen
It’s important to think of security in two ways:
- Keeping the bad guys out
- Protecting yourself against internal threats
That’s why it’s absolutely essential to include storage as part of your overall cybersecurity strategy.
IBM offers the Safeguarded Copy feature, which ensures that your storage is cyber and data resilient.
Another way to protect your company from internal threats is focusing on administrative security.
“Multiple administration is considered a good practice,” Eric says. “Some of our products have dual authentication, and in the case of Safeguarded Copy, we have three different admin levels.”
Additionally, Safeguarded Copy is immutable meaning it can’t be deleted or changed by any of the end users.
To learn more, contact Michel Mendez (email@example.com
) or read Boost cyber resilience and more with IBM Storage