Quick tips for Veeam® Backup Security

Cyber-attacks typically have two high level objectives, the first being to cripple business operations by encrypting vital production data, and the second more recent trend is the capture and breach of Sensitive Personal Identifying Information (PII). Backups play a key role in defense against cyber-attacks, potentially allowing systems to be restored to a known safe […]

Common Cyber Threats and How To Avoid Them

Cyber threats come in many forms so for that reason a holistic approach is required in order to tackle them. Cybersecurity is of the utmost importance to all organizations, so the responsibility should not fall to just one department. Everybody within the organization has a role to play, so we will kick off here by […]

Considerations for a Cyberattack Crisis Communications Plan

In our earlier article The Blocky for Veeam® – 5 Step Guide to a Safer Network we highlighted the importance of creating a Cyber Security Policy and Disaster Recovery Plan. A key element of this should be a communications plan which can be easily overlooked during the turmoil of containing a cyberattack and the restoration […]

Ransomware attack – Who should you contact?

If you have fallen victim to a ransomware attack you will certainly have a lot of decisions to make. Like many other crime situations it can be very easy to make that ‘knee jerk reaction’ without taking a moment to step back and consider the options, or indeed look for help. Following the shock of […]

Veeam Backup Protection for Branch & Remote Offices

Cybercriminals look for multiple routes to infiltrate a network, so accordingly cybersecurity measures need to be equally as comprehensive. In the context of protecting Veeam backup files and the storage volumes that hold them, there are many recommended best practices. Unfortunately, some of these measures may not be practical for branch or remote office deployment […]

Could Your Password be Cracked in 60 Seconds?

Could your Password be Cracked in 60 Seconds? If your password is 7 characters long and uses a mixture of numbers with uppercase and lowercase letters, then the answer is YES(1). This is based on analysis undertaken prior to August 2019, so the situation is probably even worse today as the processing power in the […]

Veeam backups targeted by the Conti ransomware group

Conti ransomware first appeared in late 2019 and has steadily grown to become one of the forefront ransomware-as-a-service (RaaS) operations. A recent report from ransomware incident response firm Coveware1, based on thousands of cases investigated during Q2 2021, showed Conti V2 to be the second-most-prevalent ransomware encountered, trailing Sodinokibi, also known as REvil by just […]

The Ransomware as a Service (RaaS) model explained

If you have been following the recent posts on our LinkedIn page, you will have seen several articles discussing the industrialization of cybercriminal activity and the new term ‘Ransomware-as-a-Service (Raas)’. This is the name that has been given to an evolving ecosystem of threat actors that work together to provide the tools, network access, and […]