Four Technologies Combine To Protect You From Ransomware Attacks


Published March 2020


Ransomware continues to paralyze public and private enterprises globally.

As the ones responsible for recovering from outages, infrastructure and operations pros have successfully managed recoveries from all failures but one: ransomware. Ransomware attacks do not result in the familiar type of outage; they often put the backup infrastructure itself under siege. And it’s not about just recovering from a backup; I&O professionals need to work closely with their security and risk peers to ensure that they are recovering from an uninfected copy.

This paper explores the technologies and proactive strategies that Infrastructure & Operations professionals must employ to improve their confidence and recoverability in the face of a ransomware attack including: write once, read many (WORM) storage, data resiliency solutions, immutable file systems, and multi-factor authentication.

Don't forget to Sign In or Sign Up to Download


Sign up

You can update your preferences, unsubscribe or delete your account at any time by logging into the site, or via the links at the bottom of any of our emails.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Biting the hand that feeds IT © 1998–2021