Cohesity research reveals that reliance on legacy technology is undermining how organizations respond to ransomware

[*]

SAN JOSE, Calif.–(COMMERCIAL WIRE)–New global research commissioned by Cohesity, a leader in next-generation data management, reveals that nearly half of respondents say their business relies on legacy and outdated backup and recovery infrastructure to manage and protect their data. In some cases, this technology is more than 20 years old and was designed long before today’s multi-cloud era and the onslaught of sophisticated cyberattacks hitting businesses globally.

Challenges related to aging infrastructure could easily be compounded by the fact that many IT and security teams don’t seem to have a plan in place for mobilizing in the event of a cyber attack. Nearly 60% of respondents* expressed some level of concern that their IT and security teams could be efficiently mobilized to respond to an attack.

These are just some of the findings from an April 2022 survey, conducted by Censuswide, of more than 2,000 IT and SecOps professionals (split nearly 50/50 between the two groups) in the US, UK, Australia and New Zealand. All respondents play a role in the IT or security decision-making process within their organizations.

“IT and security teams need to sound the alarm if their organization continues to use outdated technology to manage and protect their most critical digital asset – their data,” said Brian Spanswick, director of information security at Cohesity. “Cybercriminals actively take advantage of this outdated infrastructure, knowing that it was not built for today’s sprawling, multi-cloud environments, or to help businesses protect and quickly recover from sophisticated cyberattacks.”

Backup and recovery infrastructure that could be considered archaic

Forty-six percent of respondents said their organization relies on a primary backup and recovery infrastructure that was designed in 2010 or earlier. Nearly 100 respondents (94 from 2011) revealed that their organization relies on a backup and recovery infrastructure that was built before the new millennium, in the 1990s.

Businesses are using this legacy technology even though managing and protecting data environments has become much more complex, not only because of the exponential growth of structured and unstructured data, but because of the wide variety of locations where that data is stored. data. Forty-one percent of respondents said they store data on-premises, 43% trust public cloud storage, 53% use a private cloud, and 44% have adopted a hybrid model (some respondents use more of an option).

“In 2022, the fact that any organization is using technology to manage their data that was designed in the 1990s is frightening, given that data can be compromised, exfiltrated, taken hostage and can create massive compliance issues for organizations. organizations,” Spanswick said. . “In this survey, we found nearly 100 respondents who said their organizations depend on an outdated data infrastructure, and this begs the question: how many other companies are in the same situation around the world?”

What keeps IT and SecOps teams up at night

Respondents highlighted what they believe would be their biggest barriers to getting their organization back up and running after a successful ransomware attack. The findings are as follows (respondents were asked to check all that apply):

  • integration between IT and security systems (41%)

  • lack of coordination between IT and Security (38%)

  • lack of an automated disaster recovery system (34%)

  • outdated backup and recovery systems (32%)

  • lack of a recent, clean, immutable copy of data (32%)

  • lack of detailed and timely alerts (31%)

Regarding the lack of coordination between IT and security, this is consistent with other findings from this survey indicating that there is often a gap between IT and SecOps that puts business and security postures at risk. For more information on that, click here.

What do respondents want management to prioritize?

Respondents revealed that modernizing data management, protection and recovery capabilities, in addition to increasing collaboration between IT and SecOps, offers a path to strengthen their organizations’ security postures and multi-cloud operations. The top five “must haves” that respondents would ask of management in 2022 are:

  1. Integration between modern security and data management platforms and AI-powered anomalous data access alerts to provide early warning of ongoing attacks (34%)

  2. Extensible platform for third-party applications for security operations and incident response (33%)

  3. Automatic disaster recovery of systems and data (33%)

  4. Upgrading legacy backup and recovery systems (32%)

  5. Fast backup across the organization with encryption of data in transit (30%)

“Both IT decision makers and SecOps need to be co-owners of cyber resiliency outcomes, and this includes an assessment of all infrastructure used in accordance with the NIST framework for data identification, protection, detection, response and recovery. . Additionally, both teams need to have a comprehensive understanding of the potential attack surface,” Spanswick said. “Next-generation data management platforms can bridge the technology gap, improve data visibility, help IT and SecOps teams sleep better at night, and stay one step ahead of bad actors who enjoy mining. data from legacy systems that cannot be recovered.”

For more information:

  • To learn more about Cohesity Data Security, click here.

  • For more information about Cohesity Ransomware Recovery, click here.

  • For more information on Cohesity Threat Defense, click here.

  • To learn more about next generation data management, click here.

[*] When asked, “If a ransomware attack were to occur today, how confident are you that your IT and security teams could be efficiently mobilized to respond to the attack?” Somewhat confident’, ‘A little confident’ and ‘Not at all confident’.

About cohesion

Cohesity radically simplifies data management. We make it easy to protect, manage, and derive value from data—across the data center, the edge, and the cloud. We offer a complete set of consolidated services on a multi-cloud data platform: backup and recovery, disaster recovery, file and object services, development/test and data compliance, security and analytics, reducing complexity and eliminating massive data fragmentation. Cohesity can be delivered as a service, self-managed, or provided by a partner powered by Cohesity.

© 2022 Cohesity, Inc. All rights reserved. Cohesity, the Cohesity logo, Helios and other Cohesity marks are trademarks or registered trademarks of Cohesity, Inc. in the US and/or internationally. Other company and product names may be trademarks of the respective companies with which they are associated.

See also  Bellwether 2022 celebrates art and technology

Leave a Comment