Similar Posts
The Growing Threat of Privilege Escalation Attacks
FacebookXPrivilege escalation attacks have become one of the most dangerous cybersecurity threats facing organizations today. These sophisticated attacks allow threat actors to transform minor security breaches into complete network compromises, often targeting backup systems and critical infrastructure along the way. This blog post summarizes the main points of my latest podcast episode. If you’d like,…
Backup tapes lost a $1.5B case!
FacebookXWhat do I always tell you in my books, blogs, and podcast? Don’t use your backup system as an archive system. And heaven help you the day you try to satisfy a big e-discovery case using only backup tapes. I often say that doing so can result in what the legal world calls an adverse…
How to Get Real ROI from Backups: Beyond Disaster Recovery
FacebookXGetting meaningful ROI from your backups has been the holy grail of data protection for decades. For too long, backup systems have been viewed as necessary evils – expensive insurance policies that drain budgets without delivering tangible returns until disaster strikes. But what if your backup infrastructure could provide measurable business value beyond disaster recovery?…
Cloud Catasrophes: Musey deletes itself
FacebookXHere is the cautionary tale of Musey – yet another tragic story of cloud data loss that should serve as a wake-up call to all of us. Musey was a promising startup pouring millions into developing an innovative interior design app. But in an instant, an admin’s slip-up led to their entire Google Workspace account…
Navigating the Complexities of eDiscovery and Backups
FacebookXeDiscovery has become a vital part of legal processes, but companies often struggle to perform eDiscovery against backups. This blog post explores this topic, and how it can be streamlined. This blog post summarizes the main points of my latest podcast episode. If you’d like, you can listen to it or watch it at https://www.backupwrapup.com/)…
Do not pay ransomware ransom!
FacebookXYou don’t negotiate with terrorists, and you don’t pay ransom unless you have no other choice. Even then, you should try every available avenue before you decide to pay money to the company holding your data for ransom. It’s just a bad idea. Last week there was a news story of a company that paid…
