Insider Threats & Ransomware Webinar

This Insider Threat and Ransomware Webinar explores what you need to know to keep your date safe today. Insider threat may once have only applied to disgruntled employees, or perhaps accidental deletions or modifications due to carelessness or over-delegation of administrative privileges. It generally referred to an actual person, but in today’s technological world an insider threat can be much more. Watch the Ransomware Webinar below to find out more about the three types of insider threat.

Types of Insider Threat

Compromised

This is the act of using another person’s credentials to access information and resources, often without the knowledge of the user. These can access backup systems, create back doors, and are difficult to detect because the user is a known entity.

Negligent (or uninformed, unaware, accidental)

These are users who are not properly educated on security practices and fall prey to things such as phishing emails, are unaware of the impact of their actions, or simply have too many rights and accidentally delete or negatively impact data.

Malicious

Malicious employees are dangerous for many reasons. While employed, they have access to data, proprietary information, financials, etc., that could be used for personal gain or against the company. A common tactic is for ‘revenge’ when employees willfully destroy or modify data to hurt or hamper a company’s efforts in the market or its general operations. Contractors and vendors who work within a facility and have access to network resources can also provide information related to security practices or even actual data to outside sources.
Hackers and other insider threats know that, in order for their attack to be successful, the target or victim must not be able to restore data to circumvent their activities. They specifically go after remote and cloud backups first, then work their way back to local files and workloads. By cutting off the access to backup files, they force companies to pay ransoms or meet other demands.

How can Enhanced Data Protection help?

In an effort to help curb insider threats, Veeam™ released a feature called Insider Protection and made it available to Veeam Cloud & Service Providers. The inherent challenge for the customer is that it typically requires more frequent, full backups in order to reduce the risk of losing an entire backup chain. This becomes cost-prohibitive, as it requires more disk space in the cloud backup repository.

Global Data Vault recognized this challenge and, instead of charging customers more for additional disk space required to implement Insider Protection, applied additional development in our cloud infrastructure to create a “gap” and a hidden repository. The Enhanced Data Protection repository keeps the full chain of backup files intact so that we can guarantee quick and complete recovery without having to attempt to rebuild metadata or piece together any missing parts of the chain. This repository is not visible to, or accessible from, a customer’s network and is impervious to insider threats.

 

 

Free Cybersecurity Downloads

what is enhanced data protection

Enhanced Data Protection

In the cybersecurity webinar, we discuss several times on enhanced data protection but what is enhanced data protection and why do you need it? This single-page free download has all the information you need to know.

Cybersecurity Guide

Cybersecurity Guide

What can your company do to prepare and protect against cyber attack? Download this free 6-page Cybersecurity Guide for the low down on  Cloud Data Management, Backups and Disaster Recovery.

More Global Data Vault Webinars

How to Test Your Environment Against Cyber Threats

How to Test Your Environment Against Cyber Threats

Over the last several years, the frequency of cyber threats and attacks has increased. It is estimated that there is an attack every 39 seconds and an estimated 30,000 websites a day get hacked. And the vast majority of these things are the result of an error:...

Spooktacular Tricks for a Successful Veeam Implementation

Spooktacular Tricks for a Successful Veeam Implementation

Welcome and thanks for joining our heavily themed October webinar today. We have a spooktacular discussion about Veeam implementations. We will cover ways to avoid the graveyard, aka common mistakes to avoid. We'll pull the sheet off the ghost of scary implementations...

Webinar: The Importance of a Business Impact Analysis

Webinar: The Importance of a Business Impact Analysis

The following is a lightly edited transcript of our September 2022 webinar on the importance of Business Impact Analysis. The speakers are: Kelly Culwell, Senior Manager, Service Transition, Dataprise Steven New, Director of Operations, Dataprise Tom Shay, vCIO,...

Webinar: How DRaaS Works in a Crisis

Webinar: How DRaaS Works in a Crisis

Below is a lightly edited transcription of our recent webinar: Kelly02:55 Disaster recovery really isn't fun, right? It's not something that anybody ever wants to have to go through, but unfortunately, a lot of businesses do. We've had discussions before about what to...

Webinar: Data Protection Trends 2022

Webinar: Data Protection Trends 2022

Our March webinar featured special guest, Jason Buffington, Vice President of Solution Strategy for Veeam® Software, and author of the comprehensive industry report: Data Protection Trends 2022. With webinar host, Kelly Culwell, Global Data Vault, Jason took a deep...

Webinar: How to verify backups are working?

Webinar: How to verify backups are working?

Global Data Vault’s February 2022 webinar again takes us "back to the basics" with an important topic: how to verify if your backups are working. Not to spoil the movie ending here, but the common theme in the video below is the need to test, monitor, and test again....

How to Avoid Ransomware Webinar

How to Avoid Ransomware Webinar

Global Data Vault's January webinar takes us back to the basics with a topic that's actually anything but basic--ransomware and how to avoid it.  Today, we're sharing our recent client experiences with ransomware, how these companies knew they were attacked, what the...

Webinar: Cybersecurity Budget Breakdowns

Webinar: Cybersecurity Budget Breakdowns

When it comes to cybersecurity, every organization is constrained and confined by some sort of budget. This webinar, hosted by BitLyft Cybersecurity, brings together a cybersecurity professional and an IT veteran to discuss the challenges and opportunities of finding...

Webinar: Best Free Backup Tools

Webinar: Best Free Backup Tools

In this episode of Global Data Vault's "Back to Basics" webinar series, we look at the best free backup tools on the web. It’s a bit of a show and tell, as Steven New, Global Data Vault’s Senior Support Manager, demonstrates how each of them can be used for planning...

Webinar: Understanding Veeam? Demystifying Veeam Vocabulary

Webinar: Understanding Veeam? Demystifying Veeam Vocabulary

Webinar: Understanding Veeam? Demystifying Veeam VocabularyIn this episode of our Back to Basics Veeam webinar series, we provide you with a deeper understanding of some of the more common Veeam vocabulary. Many of the terms used in Veeam are multipurpose, so here we...

Back Up As a Service

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *