01.03.2024 Views

The Cyber Defense eMagazine March Edition for 2024

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine March Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 225 page March Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Access architecture is immutable. An automation engine manages the entire backup infrastructure,<br />

ensuring the components carry out their tasks according to policy.<br />

What happens if I need to restore my data?<br />

No business seems to be immune from cyber attacks. In a worst-case scenario, a ransomware attack<br />

could get into Active Directory, gain all usernames and passwords, and wipe out all production data. And<br />

yet the data in the backup environment would still be safe because it lives in a Zero Access infrastructure.<br />

<strong>The</strong>re is no bridge from the compromised credentials into the Zero Access environment because there<br />

are no logins. <strong>The</strong> only access to that infrastructure comes from the backup provider’s automation engine,<br />

which manages components and executes tasks according to the policies you’ve set.<br />

If hackers were to attack your business operations, you’d be able to restore a copy of your backup data<br />

thanks to Zero Access. Once you’ve started to rebuild the production system so that there's somewhere<br />

to restore to, you can start to install restore tools onto those systems that will be able to recover the data.<br />

<strong>The</strong>n you’d simply log in to the backup GUI and follow the recovery procedure. And remember: You’re<br />

only restoring a copy of the data; there’s no way to compromise or destroy the original backup data,<br />

which remains safely locked away.<br />

While the zero-trust approach sounds great, and it plays an important role in protecting the business<br />

environment, it is not the pinnacle of security that some backup vendors make it out to be ... especially<br />

when it comes to precious backup data. You must protect your backup environment at all costs. <strong>The</strong> best<br />

way to keep bad actors out of your backup environment is to make sure there’s no access at all. And <strong>for</strong><br />

that, Zero Access offers much higher security than zero trust. <strong>The</strong> best part is that Zero Access security<br />

protection <strong>for</strong> backup is available today.<br />

About the Author<br />

Greg Tevis, Vice President of Strategy at Cobalt Iron, has worked <strong>for</strong> 42 years<br />

in the storage and data protection market helping companies develop data<br />

protection and cybersecurity solutions. Tevis is recognized as an industry<br />

expert in storage technologies, particularly storage management. He has 42<br />

U.S. patents, with several more pending. He can be reached at<br />

gjtevis@cobaltiron.com (linkedin.com/in/greg-tevis-10a5042). More<br />

in<strong>for</strong>mation about Cobalt Iron is available at cobaltiron.com.<br />

Zero Access® is a registered trademark of Cobalt Iron, Inc.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>March</strong> <strong>2024</strong> <strong>Edition</strong> 82<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!