<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>recovery Archives - The Integrator</title>
	<atom:link href="https://integratormedia.com/tag/recovery/feed/" rel="self" type="application/rss+xml" />
	<link>https://integratormedia.com/tag/recovery/</link>
	<description>EMEA&#8217;s Most Sought-After Publication by SMEs and Global Corporates</description>
	<lastBuildDate>Mon, 11 Dec 2023 15:06:44 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>
	<item>
		<title>A Good Security Strategy Against Ransomware is at the Heart of Digital Transformation</title>
		<link>https://integratormedia.com/2022/07/13/a-good-security-strategy-against-ransomware-is-at-the-heart-of-digital-transformation/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=a-good-security-strategy-against-ransomware-is-at-the-heart-of-digital-transformation</link>
					<comments>https://integratormedia.com/2022/07/13/a-good-security-strategy-against-ransomware-is-at-the-heart-of-digital-transformation/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 13 Jul 2022 08:01:41 +0000</pubDate>
				<category><![CDATA[Features]]></category>
		<category><![CDATA[Tech Features]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[CISO]]></category>
		<category><![CDATA[cybercriminals]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<category><![CDATA[IP]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[Veeam Ransomware Trends Report]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=12845</guid>

					<description><![CDATA[<p>Written by: Mohamad Rizk, Senior Director, Technical Sales &#8211; Middle East, Russia &#38; CIS at Veeam Software Digital transformation is seen as a big investment but is becoming a prerequisite for survival in the current and future landscape. Businesses are now more reliant on digital infrastructure than ever – with many organizations completely dependent on [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2022/07/13/a-good-security-strategy-against-ransomware-is-at-the-heart-of-digital-transformation/">A Good Security Strategy Against Ransomware is at the Heart of Digital Transformation</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em><strong>Written by: Mohamad Rizk, Senior Director, Technical Sales &#8211; Middle East, Russia &amp; CIS at Veeam Software</strong></em></p>
<p>Digital transformation is seen as a big investment but is becoming a prerequisite for survival in the current and future landscape. Businesses are now more reliant on digital infrastructure than ever – with many organizations completely dependent on their IT systems and the data being generated, which is their IP. With data being viewed as the “new currency” today, it is vital to protect its integrity. A Modern Data Protection solution ensuring the backup, recovery, and management of critical data is essential.</p>
<div id="attachment_12847" style="width: 159px" class="wp-caption alignright"><a href="https://varonline.com/wp-content/uploads/2022/07/Mohamad-Rizk-Senior-Director-Technical-Sales-Middle-East-Russia-CIS-at-Veeam-Software.jpg"><img decoding="async" aria-describedby="caption-attachment-12847" class="wp-image-12847 " src="https://varonline.com/wp-content/uploads/2022/07/Mohamad-Rizk-Senior-Director-Technical-Sales-Middle-East-Russia-CIS-at-Veeam-Software-e1657698976805-221x300.jpg" alt="" width="149" height="203" /></a><p id="caption-attachment-12847" class="wp-caption-text"><em>Mohamad Rizk, Senior Director, Technical Sales &#8211; ME, Veeam</em></p></div>
<p>The Veeam Ransomware Trends Report 2022, reveals the extent of vulnerability of businesses when it comes to ransomware defense. 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability to recover data without paying the ransom. Cybercriminals are successfully encrypting an average of 47% of production data and victims are only able to recover 69% of impacted data! 76% of organizations also admit to paying ransomware criminals.</p>
<p><strong>Security Weaknesses</strong></p>
<p>Although organizations in the Middle East, in general, spend a lot on security technologies, there is a huge gap when it comes to planning and executing a security strategy. This mainly boils down to the complexity of the IT environment. The region is risk-averse when it comes to adopting cloud technologies and there are still a lot of legacy systems. Protecting these complicated environments is a big challenge and becomes even more so in the transition phase of moving to the cloud.</p>
<p><strong>Pillars of a Robust Security Strategy </strong></p>
<p>Regional CISOs need to have a stringent security plan in place which includes important elements like stress testing of IT Systems, backup, a disaster recovery plan, and educating employees:</p>
<p><strong>Stress Testing of IT Systems</strong></p>
<p>If stress testing of data, people, and processes is not done at regular intervals, ideally once a month, then the business is being put at significant risk. There are a few reasons for the lack of testing. One is that organizations do not have the correct software and processes in place. The second, as mentioned earlier, is that organizations still have legacy disparate systems, which increases the complexities of testing so many different parts. The fear of failure is what causes people not to stress test to the level that they should.</p>
<p><strong>Backup – Immutability is key </strong></p>
<p>Every admin should have a backup. This principle works for any virtual environment; regardless of the hypervisor, you are running (VMware, Hyper-V, or whatever). One of the timeless rules that can effectively address any failure scenario is called the 3-2-1 backup rule. Veeam has upgraded this to the 3-2-1-1-0 rule. This upgraded rule gives incredible versatility by going the extra mile:</p>
<ul>
<li>There should be 3 copies of data</li>
<li>On 2 different media</li>
<li>With 1 copy being off-site</li>
<li>With 1 copy being offline, air-gapped, or immutable</li>
<li>And, 0 errors with SureBackup recovery verification</li>
</ul>
<p><strong>Disaster Recovery</strong></p>
<p>Enterprises produce huge volumes of employee, customer, and corporate data, of which they are the trusted custodians. Given the growing importance of personal data, organizations have a broader societal responsibility to ensure their systems are fully recoverable at all times. While IT departments have a crucial role to play here, business leaders also need to truly buy in to the importance of Disaster Recovery (DR). A good DR strategy should encompass a documented process that has been tested. DR testing needs to be stringent – looking at every possible eventuality and preparing an appropriate response.</p>
<p><strong>Employee Education</strong></p>
<p>Without creating awareness and providing a deeper understanding of best practices through cyber literacy, any threat mitigation tool is rendered useless. It is imperative to educate employees and ensure they practice impeccable digital hygiene.</p>
<p>If organizations in the Middle East follow the above pillars of a sound security strategy, then they would have taken care of a very important piece of the digital transformation puzzle.</p>
<p>The post <a href="https://integratormedia.com/2022/07/13/a-good-security-strategy-against-ransomware-is-at-the-heart-of-digital-transformation/">A Good Security Strategy Against Ransomware is at the Heart of Digital Transformation</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://integratormedia.com/2022/07/13/a-good-security-strategy-against-ransomware-is-at-the-heart-of-digital-transformation/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Veeam Research: 89 percent of Organizations Falling Short on Data Protection</title>
		<link>https://integratormedia.com/2022/02/25/veeam-research-89-of-organizations-falling-short-on-data-protection/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=veeam-research-89-of-organizations-falling-short-on-data-protection</link>
					<comments>https://integratormedia.com/2022/02/25/veeam-research-89-of-organizations-falling-short-on-data-protection/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 25 Feb 2022 08:17:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Tech News]]></category>
		<category><![CDATA[Anand Eswaran]]></category>
		<category><![CDATA[backup]]></category>
		<category><![CDATA[data management solutions]]></category>
		<category><![CDATA[data protection gap]]></category>
		<category><![CDATA[recovery]]></category>
		<category><![CDATA[Veeam]]></category>
		<category><![CDATA[Veeam Data Protection Trends Report 2022]]></category>
		<guid isPermaLink="false">https://varonline.com/?p=12093</guid>

					<description><![CDATA[<p>Veeam Data Protection Trends Report 2022 finds that 89 percent of organizations are not protecting data sufficiently. Veeam Software, a provider of backup, recovery, and data management solutions, also found that 88% of IT leaders expect data protection budgets to rise at a higher rate. An official release state that the report is based on [&#8230;]</p>
<p>The post <a href="https://integratormedia.com/2022/02/25/veeam-research-89-of-organizations-falling-short-on-data-protection/">Veeam Research: 89 percent of Organizations Falling Short on Data Protection</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Veeam Data Protection Trends Report 2022 finds that 89 percent of organizations are not protecting data sufficiently. Veeam Software, a provider of backup, recovery, and data management solutions, also found that 88% of IT leaders expect data protection budgets to rise at a higher rate. An official release state that the report is based on a survey of more than 3,000 IT decision-makers and global enterprises.</p>
<p>Anand Eswaran, Chief Executive Officer at Veeam said, “Data volumes and platform diversity will continue to rise, and the cyber-threat landscape will expand. So, CXOs must invest in a strategy that plugs the gaps they already have and keeps pace with rising data protection demands.”</p>
<p>Key findings from the Veeam Data Protection Trends Report 2022 include:</p>
<ul>
<li><strong>The data protection gap is widening</strong>: Respondents stated that their data protection capabilities cannot keep pace with the demands of the business, with 89% reporting a gap between how much data they can afford to lose after an outage versus how frequently data is backed up.</li>
<li><strong>Businesses face a data protection emergency: </strong>To close the gap between data protection capabilities and this growing threat landscape, organizations will spend around 6% more annually on data protection than broader IT investments.</li>
<li><strong>Businesses have an availability gap: </strong>90% of respondents confirmed they have an availability gap between their expected SLAs and how quickly they can return to productivity. This has risen by 10% since 2021</li>
<li><strong>Data remains unprotected: </strong>Despite backup being a fundamental part of any data protection strategy, 18% of global organizations’ data is not backed up — therefore, completely unprotected</li>
<li><strong>Human error is far too common: </strong>Technical failures are the most frequent cause of downtime with an average of 53% of respondents experiencing outages across infrastructure/networking, server hardware, and software. 46% of respondents experienced cases of an administrator configuration error, while 49% were hindered by accidental deletion, overwriting of data, or corruption caused by users</li>
<li><strong>Protecting remote workers: </strong>Only 25% of organizations utilize orchestrated workflows to reconnect resources during a disaster, while 45% run predefined scripts to reconnect resources running remotely in the event of downtime and 29% manually reconfigure user connectivity</li>
<li><strong>Economic drivers remain critical: </strong>When asked about the most important factors when purchasing an enterprise data solution, 25% of IT leaders are motivated by improving the economics of their solution</li>
</ul>
<p>The post <a href="https://integratormedia.com/2022/02/25/veeam-research-89-of-organizations-falling-short-on-data-protection/">Veeam Research: 89 percent of Organizations Falling Short on Data Protection</a> appeared first on <a href="https://integratormedia.com">The Integrator</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://integratormedia.com/2022/02/25/veeam-research-89-of-organizations-falling-short-on-data-protection/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
