wonderfully unique software solutions

Backup alone insufficient as more attacks target file storage: Tributech

Traditional backup software is no longer a “reliable shield” on its own for data protection, according to Anna Michniewska, chief operating officer (COO) at Tributech.

Michniewska, blogging for the data orchestration and governance software company, said that the subtleties of today’s data-integrity focused attacks make it easier for attackers to deceive or disrupt information system processes in an organisation.

“As the volume of data generated and stored continues to surge, so does the menace posed by cybercriminals seeking to exploit vulnerabilities within systems,” she wrote.

“Manipulating backup files can go unnoticed for extended periods, compromising the integrity of an organisation’s data.”

Michniewska cited a Rubrik finding that 93% of external organisations surveyed said that attackers had tried to change backup files duing a cyberattack, with 73% saying these attempts were “at least partially successful”.

In software vendor Veeam’s Data Protection Trends 2023 report, it was suggested that organisations may now need to further develop and integrate data protections within their data security strategies, she added.

“These attacks exploit weaknesses in network security, software vulnerabilities, and human errors to gain unauthorized access and tamper with crucial data sets,” Michniewska said.

“The consequences of such attacks can be severe, leading to financial losses, legal ramifications, damage to reputation, and most importantly, a loss of trust from clients and stakeholders.”

Solutions like Tributech can be deployed alongside backup solutions to strengthen data protection against data manipulation attacks, Michniewska said, to help ensure data integrity and validity.

“[Tributech] data notarisation and verification protects data integrity throughout the entire lifecycle, not only in backup scenarios. It uses cryptographic methods to create a secure audit trail, validating the authenticity and immutability of data from creation, transfer, to eventual backup,” she said.

Thomas Plank, chief executive officer (CEO) at Tributech, said in a separate explainer that it was “necessary” to establish baselines of all relevant data.

This means organisations can monitor any change to data integrity and therefore any adversarial manipulation, helping defend against rising threats such as ransomware, he said.

( Photo by Ray Shrewsberry on Unsplash )

Recent Articles

LANSA low-code helped these IT providers build their businesses

Even specialist IT companies use low-code strategies and technology to help them move up in their markets, gaining market share alongside the...

Foxit PDF editor suite expands AI capabilities for 2024

Smart PDF commands and enhanced AI assistant functionality are set to give the desktop and cloud versions of Foxit PDF Editor Suite...

Vyond bundles in further AI and branding capabilities for corporate creatives

Video creation platform vendor Vyond is expanding its offerings with new brand-management tools as well as further generative AI functionality responding to...

LastPass analyst warns of looming credentials crisis

Organisations should beware of an oncoming crisis in the secure management of user access, according to a cybersecurity specialist at password management...

Octopus Deploy follows Codefresh buy with 2024.1 Server

Continuous delivery (CD) pipeline platform vendor Octopus Deploy has acquired fellow development software specialist Codefresh and rolled out a new version of...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox