Connect with us

Tech Features

Data tampering is an underrated threat — get your backup ready

Published

on

data backup

By Charles Smith, Consulting Solution Architect, Data Protection, Barracuda Networks (EMEA)

The constant string of attacks organisations face is an ever-present reminder of how important it is to have an up-to-date, readily accessible copy of everything that matters to your business. Resilient backups allow you to recover more quickly from data damage, disruption, or loss, particularly if a ransomware attack has resulted in encrypted or deleted files.

These are well-known and widely reported benefits of backups — but there’s more. Immutable data backups can also protect you from the underrated threats of data tampering and malicious insiders, unpredictable activities that can significantly damage brand trust and reputation if they’re not addressed.

Data tampering and manipulation

Data tampering such as deletion and manipulation have been called the “next level of cyberattacks.” While attacks on data integrity aren’t new, their growing sophistication in the age of generative AI will make them harder to spot.

The perpetrators could be external, such as activists or nation-state groups, but more often they are internal, disaffected insiders with broad access rights out for revenge, mischief, personal, or financial gain.

Hypothetical external incidents could include an attacker successfully breaching a stock market’s IT system to alter share price updates, leading to panic selling and financial chaos. There are also reported examples of malicious insiders trying to alter data records within their current or former company, changing passwords, disabling servers, deleting files, or engaging in cyberespionage.

Companies need defences that will detect and prevent any attempt at data tampering inside the network, but also provide them with a robust and accurate version of the truth that can restore the original data and set the record straight.

The double defence against data tampering

Your first layer of protection should be a security solution that includes strong access controls, data encryption, secure communication protocols, and AI-driven measures to detect and respond to anomalies that could signpost attempted data interference. The combined impact should prevent external attackers from being able to access your network and alter or delete data, and it should also block internal malicious actions by authorised users.

There is a second, equally important layer of defence: an immutable data backup. Immutable data cannot be changed or deleted. This means that if an attacker does manage to tamper with or manipulate your communications, documents, and more — your backup files are unaffected and can be used to restore data and prove beyond doubt where content has been falsified.

The many benefits of immutable backups

Immutable backups can help an organisation to recover from any incident where data is encrypted, deleted, damaged, tampered with, or lost.

  1. They offer an extra line of defence against determined bad actors. Despite the security measures in place, determined attackers may find ways to compromise or bypass security controls. Immutable backups provide an extra safeguard by ensuring that even if the primary data is tampered with, the backup remains intact and unaltered.
  • They protect the company from insiders with ill intent.  No one likes to think about insider threats. These are your colleagues after all. But our own recent research suggests that malicious insiders were the root cause of around a third (39%) of data breaches in the last year. Immutable backups help to protect against insider attacks, as they prevent authorised users from altering or erasing data.
  • They mitigate the impact of ransomware. Immutable backups can protect against ransomware attacks by ensuring that a clean, unaltered copy of the data is available for restoration, reducing the impact and potential need to pay the ransom.
  • They protect you from accidental data corruption. Data can be corrupted due to hardware failures, software bugs, or human error. Immutable backups help protect against these scenarios by providing a point-in-time copy of the data that cannot be modified or corrupted, allowing for reliable data restoration.
  • They are essential for compliance and data protection regulations. Some industry sectors and regulatory frameworks require organisations to maintain immutable backups for data retention and compliance purposes. Immutable backups ensure the integrity and authenticity of the data.

By combining security measures with immutable backups, organisations can implement a resilient data protection strategy that addresses both major, common cyberthreats such as ransomware and underrated, unanticipated threats that could do just as much harm. With immutable backups, you’re ready for them all.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Tech Features

AI and Digital Currencies Transform MENA Into Rising Fintech Leader

Published

on

abstract representation of AI and digital currencies

By Naser Taher, Chairman of MultiBank Group

Naser Taher, Chairman of MultiBank Group
Naser Taher, Chairman of MultiBank Group

The Middle East and North Africa (MENA) region has become the leading laboratory for financial innovation, where artificial intelligence (AI), central bank digital currencies (CBDCs), and sovereign wealth fund (SWF) strategies converge to reshape global cash flows. According to the World Economic Forum, venture capital investments in MENA grew by about 33% a year from 2015 to 2023, with funding reaching $644 million in 2024. This surge reflects deliberate efforts to position the region as a fintech powerhouse for the new economy.

One of the most significant developments is the strategic collaboration between the Abu Dhabi Investment Office (ADIO) and the Trump Organization to establish an AI and Web3 Free Zone. The $6.6 billion initiative aims to attract global tech firms, AI researchers, and fintech ventures to the UAE, further cementing MENA’s leadership in next-generation digital infrastructure.

Machine learning algorithms now process trades worth billions on Saudi Arabia’s Tadawul exchange daily, while automated risk assessment systems evaluate loan applications in real time from Dubai to Riyadh. Saudi Arabia’s Financial Sector Development Program has embedded AI throughout its capital markets ecosystem as part of Vision 2030’s broader economic transformation. PwC analysis projects this technological integration will generate almost $135 billion for the country’s economy by 2030, fundamentally altering how banks manage liquidity, assess credit risk, and compete regionally.

Central banks across the Gulf have moved beyond theoretical frameworks into live testing of digital currencies. The UAE’s Digital Dirham is set to enter retail circulation through licensed banks and fintech companies by late 2025, enabling near-instant cross-border payments where traditional banking requires days and charges hefty fees. Meanwhile, Saudi Arabia and the UAE have jointly piloted Project Aber, issuing a single wholesale CBDC. 

Gulf SWFs are reshaping the region’s infrastructure landscape, no longer content with simple portfolio plays. These institutions now control $4.9 trillion in assets, with projections reaching $7.3 trillion by 2030. In the first nine months of 2024, they accounted for 40% of all international SWF transactions, deploying $55 billion across 126 deals. Notably, Abu Dhabi’s Investment Authority and Saudi Arabia’s Public Investment Fund (PIF) are increasing allocations to blockchain and digital projects. In Qatar, the Qatar Investment Authority is working through the Qatar Financial Centre’s new Digital Asset Regulations 2024 to trial real-world asset tokenization.

Alongside these public sector moves; private institutions are also innovating on a scale. MultiBank’s new Electronic Communication Network (ECN) will introduce the Gulf’s first interbank trading and prime brokerage ecosystem, linking BRICS and GCC jurisdictions. Designed to compete with Western counterparts such as Bloomberg and Reuters, it connects conventional trading desks to machine-driven order routing and the MultiBank Chain’s tokenization layer. Cross-border deals become faster, safer, and more transparent, with settlements possible in gold or a mix of currencies instead of U.S. dollars alone. By opening the door to tokenized real-world assets and other decentralized products, the network sharpens the Gulf’s bid to serve as a global finance hub.

However, important challenges remain. Fintech ventures still need to navigate a maze of rules that shift from one border to the next; a single, region-wide framework would let ideas—and capital—move faster. As more money flows online, hackers gain fresh openings, and cybersecurity becomes even more critical. And while Gulf youth embrace tech with ease, the GCC needs far more specialists who can work with blockchains, train risk models, and secure CBDC payment rails. That calls for a push on everything from university courses to mid-career reskilling.

The next breakthrough won’t come from technology alone but from how well policymakers, entrepreneurs, and the sovereign heavyweights backing them work in sync. CBDC pilots are live, AI already guides trading desks, and deep pools of patient capital sit ready to fund new ideas. If the region’s key players keep pulling in the same direction, the Gulf won’t just join the digital finance conversation—it could end up leading it.

Continue Reading

Tech Features

Unleash Unmatched Cyber Defense: Sophos Firewall v21.5’s Breakthrough NDR-Essential

Published

on

Colleagues collaborating around a table in a modern office, captured candidly in natural light.
Chris McCormack, Senior Product Marketing Manager at Sophos

Sophos, a global leader in innovative security solutions for defeating cyberattacks, recently announced an update to its Sophos Firewall. Now, Sophos Firewall includes Sophos NDR Essential—free for all customers with an XStream Protection license.

With this integration, Sophos Firewall leverages two dedicated artificial intelligence engines to detect malware communications and algorithmically generated domain names. This new capability, powered by the Sophos Network Detection and Response probe, identifies previously unknown threats and complements the Active Threat Response features already in place.

Sophos Connect Integrates EntraID for SSO

The VPN client bundled with Sophos Firewall now supports EntraID (Azure AD) for single sign-on. This enhancement secures SSL and IPsec VPN connections and improves user experience by adding multi-factor authentication for both Sophos Connect and the user portal.

Other VPN-related improvements include:

  1. Intuitive interface updates: “Site-to-site” is now “policy-based,” and “route-based” tunnel interfaces are renamed for clarity.
  2. Dynamic IP pool validation: Prevents address conflicts across SSL VPN, IPsec, L2TP, and PPTP.
  3. Strict profile enforcement: Excludes default IPsec profile values to ensure algorithm synchronization and eliminate session negotiation issues.
  4. Enhanced scalability: Supports up to 3,000 route-based VPN tunnels, 1,000 SD-RED site-to-site tunnels, and 650 concurrent SD-RED devices.

Additional Management Enhancements

Furthermore, Sophos has rolled out several management improvements to streamline daily operations:

Flexible IPv6 DHCP-PD: Supports /48 to /64 prefixes for better ISP compatibility.

RA and DHCPv6 server enabled by default: Simplifies IPv6 deployments.

Resizable table columns: Improves the admin interface on ultra-wide screens.

Advanced search: SD-WAN routing and local ACL rules now support name, ID, and content-based searches.

Default configuration updates: Only the default network and MTA rules are provided; custom gateway probes and rule groups default to “None.”

Secure by Design

Moreover, Sophos continues to harden its firewall platform with a secure-by-design approach. Specifically, features are containerized, and integrity checks on critical OS files use mathematical checksums—any mismatch triggers an alert. Consequently, monitoring teams can swiftly identify potential compromises and react accordingly.

Availability

Customers can download and deploy this update manually on any Sophos Firewall with a valid license.

For more on Sophos’s Middle East strategy, check out our previous coverage:
Sophos Announces Intent to Expand Middle East Operations with New Data Center in the UAE

Continue Reading

Tech Features

Driving the Future: How Logical Data Management Powers EV Innovation in the UAE

Published

on

EV assembly line showing virtual data dashboards and logical data management overlays.
By Gabriele Obino, Regional Vice President and General Manager, Southern Europe, Middle East and CIS, Denodo

Logical data management is revolutionizing EV production in the UAE by replacing slow, siloed systems with a virtualized data layer. Consequently, manufacturers like Seres report an 88% reduction in data delivery time, empowering on-shop-floor decision-making and accelerating Industry 4.0 initiatives.

The Rise of Logical Data Management in EV Manufacturing

Under the UAE’s Operation 300bn strategy, EV production faces surging data volumes. Traditional ETL pipelines buckle under real-time demands. By contrast, logical data management—often called data virtualization—creates a semantic layer that unifies multiple stores without replication. This approach slashes latency, reduces storage overhead, and accelerates analytics across design, production, and operations.

Limitations of Traditional Data Systems for EV Production

Legacy batch-driven data warehouses delay critical actions. In a high-stakes assembly line, even millisecond lags can compromise quality or safety. Moreover, centralized silos inflate storage and governance costs, especially under strict UAE data-sovereignty laws. Static architectures simply cannot keep pace with AI-driven analytics or digital twin simulations.

Adopting Logical Data Management for Real-Time Insights

Firstly, Logical data management platforms (Denodo) let shop-floor teams query live data instantly. For example, EV manufacturer Seres cut data delivery time by 88% and built 600+ self-service analytics apps. Furthermore, virtualized data services simplify compliance with role-based security, ensuring governed access to sensitive vehicle-PII under UAE regulations.

Implementation Strategy for Logical Data Management

1-Identify critical data sources affecting safety, cost, and sustainability

2-Pilot virtualization on latency-sensitive processes such as battery-pack assembly

3-Enforce governance policies to maintain data integrity and security

4-Train non-technical staff on user-friendly analytics tools

5-Monitor production metrics improvements to scale across the factory

Additionally, regular reviews help refine and scale each phase effectively.

Future Outlook for Logical Data Management in the UAE EV Market

Looking ahead, as the EV sector grows beyond the current US$1.8 billion market, data becomes as vital as any physical component. Therefore, by valuing data on par with hardware, UAE factories can slash defects, boost efficiency, and maintain a competitive advantage. Consequently, early adopters of logical data management will lead the next wave of automotive innovation.

For more on cutting-edge EV innovations in the region, check out our feature:
NIO’s Industry-Leading Innovations Set New Benchmarks for Intelligent Premium Electric Mobility

Continue Reading

Trending

Copyright © 2023 | The Integrator