Hi. Welcome to Ingram Micro.

Please choose your role, so we can direct you to what you’re looking for.

If you’d like to learn more about Ingram Micro global initiatives and operations, visit ingrammicro.com.

Why backup and recovery is your first (and last) line of defense

April 30, 2020

Why backup and recovery is your first (and last) line of defense

Did you know in 2017 the average company confronted with ransomware paid an average of $67,000 to get their files and data back? And over half of all organizations facing a ransomware attack took around 26 hours trying to deal with the fallout from the ordeal—that’s an entire day of what could amount to precious downtime for a business.

Why are we talking about ransomware? Because it drives home the point of how important data backup and recovery is when it comes to a true defense-in-depth architecture. Defense in depth is a cybersecurity strategy that relies on several layers and redundancies to ensure data protection—and backing up and recovery should be one of those layers.

Currently, victims of ransomware can either pay up and give the hackers what they’re asking for, OR they can use their last data backup and start over from there. When it comes to cybersecurity strategy, data backup and storage management are usually considered to be ancillary. Yet, in many ways, storage and recovery are at the forefront of security, oftentimes acting as a last resort in situations like ransomware attacks.

Think about it: you should be backing up all your data, especially the most sensitive info, to ensure there are always protected copies available. It’s only after you’ve safeguarded these files and databases through backup that you can then add the next level of your security strategy and implement your active threat analysis and defense protocols.

A good defense-in-depth program should have numerous levels of architecture and security that go hand in hand—from the cloud all the way down to server storage. Firewalls should protect the exterior of your network while inside, intrusion detection keeps out unwanted visitors. Every server should have malware-scanning software installed, and your cloud architecture also needs the same treatment to keep it safe.

And even after all of this—security breaches will still happen. But the good news? With all of these layers, any breach that occurs should be manageable and not result in data loss or a ransomware situation. And the best news? By implementing data protection and recovery you’ll have peace of mind at all times. Why? Because you know that even if a devastating breach occurs and your critical data is lost … you have a backup. So even in the worst-case breach scenario, service interruptions should still be minimal, and the only person you’re at the mercy of is your IT director. Good luck.

For more information on defense in depth or backup and recovery and how they can help your customers, contact the security experts at Ingram Micro.