Insider Threats & Ransomware Webinar

This Insider Threat and Ransomware Webinar explores what you need to know to keep your date safe today. Insider threat may once have only applied to disgruntled employees, or perhaps accidental deletions or modifications due to carelessness or over-delegation of administrative privileges. It generally referred to an actual person, but in today’s technological world an insider threat can be much more. Watch the Ransomware Webinar below to find out more about the three types of insider threat.

Types of Insider Threat

Compromised

This is the act of using another person’s credentials to access information and resources, often without the knowledge of the user. These can access backup systems, create back doors, and are difficult to detect because the user is a known entity.

Negligent (or uninformed, unaware, accidental)

These are users who are not properly educated on security practices and fall prey to things such as phishing emails, are unaware of the impact of their actions, or simply have too many rights and accidentally delete or negatively impact data.

Malicious

Malicious employees are dangerous for many reasons. While employed, they have access to data, proprietary information, financials, etc., that could be used for personal gain or against the company. A common tactic is for ‘revenge’ when employees willfully destroy or modify data to hurt or hamper a company’s efforts in the market or its general operations. Contractors and vendors who work within a facility and have access to network resources can also provide information related to security practices or even actual data to outside sources.
Hackers and other insider threats know that, in order for their attack to be successful, the target or victim must not be able to restore data to circumvent their activities. They specifically go after remote and cloud backups first, then work their way back to local files and workloads. By cutting off the access to backup files, they force companies to pay ransoms or meet other demands.

How can Enhanced Data Protection help?

In an effort to help curb insider threats, Veeam™ released a feature called Insider Protection and made it available to Veeam Cloud & Service Providers. The inherent challenge for the customer is that it typically requires more frequent, full backups in order to reduce the risk of losing an entire backup chain. This becomes cost-prohibitive, as it requires more disk space in the cloud backup repository.

Global Data Vault recognized this challenge and, instead of charging customers more for additional disk space required to implement Insider Protection, applied additional development in our cloud infrastructure to create a “gap” and a hidden repository. The Enhanced Data Protection repository keeps the full chain of backup files intact so that we can guarantee quick and complete recovery without having to attempt to rebuild metadata or piece together any missing parts of the chain. This repository is not visible to, or accessible from, a customer’s network and is impervious to insider threats.

 

 

Free Cybersecurity Downloads

what is enhanced data protection

Enhanced Data Protection

In the cybersecurity webinar, we discuss several times on enhanced data protection but what is enhanced data protection and why do you need it? This single-page free download has all the information you need to know.

Cybersecurity Guide

Cybersecurity Guide

What can your company do to prepare and protect against cyber attack? Download this free 6-page Cybersecurity Guide for the low down on  Cloud Data Management, Backups and Disaster Recovery.

More Global Data Vault Webinars

Webinar: The Difference Between BaaS and DRaaS

Webinar: The Difference Between BaaS and DRaaS

Global Data Vault is kicking off a new webinar series that takes us Back to the Basics. For our inaugural episode, we are breaking down the difference between Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS), with a little bit of Veeam and Global...

Webinar: The Importance of Veeam VMCE Certification

Webinar: The Importance of Veeam VMCE Certification

Do you have questions about Veeam VMCE Certification? We have answers! Our recent webinar focused on the importance of Veeam VMCE certification. Steven New, Senior Support Manager, and Kelly Culwell our Product Manager discuss key points including what the VMCE...

Cybersecurity Webinar: Why Patching is Critical

Cybersecurity Webinar: Why Patching is Critical

The topic of the June 2021 Global Data Vault webinar was patching: why it's so critical and when it should be done, and best practices for how often you should do it. Topics covered include what to patch, why patching is so essential, how often it should be done, how...

How to Create a Disaster Recovery Plan

How to Create a Disaster Recovery Plan

Business Continuity vs. Disaster Recovery     While similar in nature and often confused, business continuity planning and disaster recovery planning are two distinctly different activities, and yet entwined. Disaster recovery is a significant component of continuity...

Managing the Risk of Having Data in the Cloud

Managing the Risk of Having Data in the Cloud

In this webinar, we discussed the March 2021 OVHcloud fire in Europe and the challenges of maintaining and protecting data no matter where it resides. Many customers lost data due to the fire and not having backups, offsite backups, or a disaster recovery plan. Our...

Veeam Backup & Replication v11 Webinar

Veeam Backup & Replication v11 Webinar

Veeam Backup & Replication v11 is available! With over 200 new features and enhancements, we wanted to focus on our favorites and a few buzzworthy items such as CDP and restore anything to Hyper-V. We invite you to listen as Veeam Certified Architect and 2021...

Eliminating backup headaches for MSPs and VARs

Eliminating backup headaches for MSPs and VARs

In this webinar, we visit with Nick Scholle, CIO of Technology Pointe, and hear how partnering with Global Data Vault has:       Reduced costs related to colocation, hardware, and software       Added value to customer offerings       Eliminated repetitive tasks...

AWS, Azure, or GDV: Who Cares More About Your Data and Why

AWS, Azure, or GDV: Who Cares More About Your Data and Why

The Pros & Cons of Public, Private, and Fully-Managed Cloud Services Selecting a public cloud or backup/disaster recovery provider can be daunting. While there is nothing “wrong” with services such as AWS or Azure, or even other cloud backup providers, they could...

MSP Reseller + GDV = Success

MSP Reseller + GDV = Success

Success Stories of How MSP Resellers and VCSP Work Together Through our reseller program, Global Data Vault offers DRaaS, BaaS, O365 Backup, Enhanced Data Protection, and an elite cybersecurity solution. Our straightforward commissions, paired with the philosophy,...

Insider Threat Webinar

Insider Threat Webinar

Insider Threats and Enhanced Data Protection – joint webinar with BitLyft What is an insider threat and how do they affect businesses? How do I defend and protect myself against insider threats and malware? Learn how to create a complete security posture?  ...

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *