Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireTechnologies & SolutionsCybersecurity News

The next evolution of cyber defense: Ransomware-proof object storage

By Tony Liau
cyber-security.jpg

Image by your_photo via Freepik

August 10, 2022

Ransomware has topped the list of the most prominent cybersecurity threats organizations face today. The past year alone saw a notable jump (13%) in attacks that utilized data exfiltration. On top of this, Veeam’s 2022 ransomware trends report revealed that businesses are not only being increasingly targeted by ransomware but are also losing the battle to prevent and defend against it. According to the report, 72% of organizations had partial or complete attacks on their backup repositories in 2021, dramatically impacting the ability to recover data. Moreover, almost all attackers attempted to destroy backup repositories to disable the victim’s ability to recover without paying the ransom. 


Data is more critical than ever, so it’s no secret that it needs more protection as organizations’ data creation and consumption continue to grow in quantity and complexity. Data protection used to be a director or vice president-level decision, and with the exponential rise of ransomware, data protection has become a C-level or board-level discussion for every business. While the best-case scenario is stopping a ransomware attack before it hits production environments, that’s not always possible. Therefore, organizations must back up their data. 


This starts with ensuring the backups are safe by implementing ransomware resiliency throughout the process. It means having a hardened backup system so bad actors can’t get in. It means ensuring that your backup solution is performant enough to recover data when the production data is maliciously encrypted. Most importantly, it means keeping them on immutable storage to prevent any vector of digital tampering. To meet the security issues of today, organizations must now shift to object-based backup storage. 


Why current data storage methods fail 

Historically, shopping for backup storage was a balancing act. Customers had to consider whether ease of use and simplicity was more important than performance. They had to think about how to ransomware-proof their chosen solution while assessing the risk and overhead of managing the storage layer. And, of course, they had to worry about whether the solution would fit their budget envelope. The question was always, “What do I sacrifice, and how much of it?” 


But as ransomware attacks continue to rise — targeting primary data and, more often than ever, targeting backups —  having multiple co-located backup copies, detection and remediation are critical to ensure resilience, and sacrificing data protection is no longer an option. 


Because data is more critical than ever and needs to be protected and instantly recoverable, organizations cannot sacrifice performance. Because ransomware is so prevalent and detrimental to an organization, the security of a solution cannot be compromised. IT administrators are constantly overburdened, so they must prioritize ease of use and simplicity. Budgetary pressures are ever-present, and no organization has the luxury of sacrificing affordability with a looming recession. Today, the backup storage market is underserved, and businesses are left with no ideal solution checking off all the above-described boxes, often leaving them vulnerable to attacks. 


Object-based backup storage as the modern data storage hero 

Luckily, emerging technology can help address modern security concerns, specifically: object-based backup storage. While object storage itself has been around for 20+ years, only now are industries seeing the consideration and optimization of object storage for backup and recovery. Object storage delivers scale through its metadata-driven flat file system. Its ability to store large amounts of unstructured data has led to its adoption by large enterprises and become the de facto choice for cloud storage. 


On-premises object-based backup storage provides inherent advantages such as security and immutability, which can guarantee that data is unchangeable and safe against malicious attacks such as ransomware. The optimized performance enables the ability to run failed workloads directly from backup, ensuring companies are business as usual within minutes during any outages. 


File and block storage is far too ransomware prone to continue existing in the fashion they do. In contrast, object storage allows businesses to continue using storage as they always have, but now with ransomware resiliency.  


Navigating complications with object storage for backup 

Typical object storage implementations are feature-rich and designed for use with multiple applications that leverage erasure coding, multi-master replication, and various redundancy nodes. Current on-premises solutions focus on serving large enterprise markets and aren’t optimized for single applications like backup and restore.


But businesses — especially midsize enterprises — need a ransomware-proof solution with performance that can run production environments from backup storage for disaster recovery. When choosing on-premises object storage solutions, organizations should look towards solutions that move outside of specifically distributed, large-scale Kubernetes enterprise applications. Instead, look for an object storage solution designed specifically for the backup use case with hardened security and the right level of redundancy.


With an object storage backup solution tailored for midsize enterprises with constrained IT, organizations can ensure they are provided with defense against ransomware.

KEYWORDS: cyber security data storage disaster recovery ransomware risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tony Liau is VP of Product at Object First.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker ransomware

    Object storage: An ally in defeating ransomware

    See More
  • incident-response-freepik1170x658v6.jpg

    A 3-step approach to cyber defense: Before, during and after a ransomware attack

    See More
  • doctor telehealth freepik

    Healthcare’s next emergency: Ransomware follows in the footsteps of the pandemic

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • 9780367339456.jpg.jpg.jpg

    Cyber Strategy: Risk-Driven Security and Resiliency

  • databasehacker

    The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing