Three Key Principles of Cyber Resiliency

Cyber Resiliency & Ransomware February 15, 2024

Cybersecurity requires much more than prevention. Data lives everywhere — in the cloud, on premises, and at the network edge. As data sprawl continues, the attack surface for cybercriminals grows with it. More data vulnerabilities bring more risk. 

Bad actors are savvy and highly organized, finding more opportunities and methods to attack data than ever before. They have found the perfect environment to gain access, do harm, and cause maximum disruption. Cybercriminals breach even the best prevention solutions on the market on a regular basis. And the numbers prove it. According to the recent Veritas global report on Data Risk Management, two-thirds of organizations have experienced a successful ransomware attack in the last two years. 

Learn more about 2023 Global Report - Data Risk Management

Tried and true social engineering techniques like phishing are still prominent. But new sophisticated methods are gaining popularity, including attempting to gain credentials or information through a variety of forms of social engineering. These include voice phishing — or vishing — or using video and voice deep fakes to gain access. Add to the mix multifactor authentication fatigue (MFA fatigue), also called prompt spamming, push spam, and authentication bombing. This tactic overwhelms employees with MFA notifications until they click on the notice. We are also seeing a spike in attacks that are targeting Internet of Things devices, and exploiting infrastructure or software vulnerabilities.  
Mitigating cyberattacks requires addressing three principles of cyber resilience: data survival, integrity, and rapid recovery.

Data Survival: Will All Your Data Survive?

Supporting data survivability requires the ability to understand and protect complex hybrid environments. Fueled by comprehensive intelligence about data and assets, survivability relies on extensive zero-trust principles and data isolation. Veritas ensures data availability across the cloud, software-as-a-service (SaaS), and on-premises environments by preventing deletion of backup data or malicious changes to data protection settings that would affect your recovery point objectives (RPOs). 


Proactive Cyber Protection: The Role of Heterogeneous Asset Inventory

Data Integrity: Can You Ensure Data is Clean and Recoverable?

How do you verify that someone hasn’t changed your backup data? Or that restoration won’t introduce malware or vulnerabilities? Immutability supplies the foundation for data integrity. Once written, no one can change immutable data in any manner, even an admin. Our platform verifies data immutability with layers of data-integrity tests, using artificial intelligence and machine learning to support accurate recovery. Our solutions will locate ransomware and alert you to when and where it started to affect production data. To prevent recontamination of production data, it’s easy to provision isolated recovery environments (IREs) to ensure that malware or vulnerabilities are not restored.


Building a Bulletproof Isolated Recovery Plan

Rapid Recovery: Can You Minimize Downtime and Data Loss? 

We understand the impact that downtime and data loss can have on your organization. As such, we flexibly orchestrate complete cross-zone, site, or cloud restoration. We simplify the complexities of cyber recovery. And we do it at scale. 

Rapid detection is the first step to rapid recovery. Intelligent solutions monitor data changes and user activity for anomalies. These deviations can indicate the presence of a ransomware attack. We automate attack response with tight integration to security operations via SIEM, SOAR, and XDR solutions to spawn or contribute to incident response and remediation workflows. 

Once you’ve contained an attack, initiate forensics and verify that your data is malware-free within an IRE. You may need to stand up an entire data center in the cloud quickly to keep your operations going. In other cases, you may need to do more granular recovery at the object level. You might need to bring a specific set of VMs, containers, or apps back into an existing data center environment. The flexibility to recover anything — from data to application to an entire data center — is critical. Veritas can support recovery of any size, for any type of disaster, from anywhere to anywhere. That’s our sweet spot: Trusted, flexible, and rapid recovery solutions for both data and applications.

Having a well-tested plan is a major element of successful rapid recovery. To complement the tabletop exercises we strongly recommend, Veritas supplies the tools to conduct both orchestrated and automated recovery rehearsals without disrupting your production environment. Rehearsals help you discover and address protection and governance gaps, so you can act quickly with a road-tested plan in case of an attack. 


Why You Should Proactively Orchestrate Your Recovery 

Cyber Resilience Principles and Preparation

Data survival, data integrity, and rapid recovery are three key principals of cyber resilience. It’s important to take a proactive approach to prepare for threats. There are many things you can do now to get ready, including:  

  • Assess the current state of your security posture.
  • Remediate the areas that need improvement.
  • Implement a 3-2-1 backup strategy.
  • Identify critical assets including data, workloads, applications, code and devices.
  • Conduct regular risk assessments, recovery exercises and tabletop exercises.
  • Implement tools to monitor constantly for unusual behaviors.  

Veritas offers proactive solutions to help you build cyber resilience. Watch this video to learn about steps you can take to prepare for an attack and recover rapidly.


Cyber Resilience: Mastering Recovery Before and After an Attack 

Learn more about how cybersecurity solutions from Veritas help you combat today’s cyberthreats.

Demetrius Malbrough
Cloud Advocate
Veritas Tech Channel