Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Cybersecurity strategies for protecting data against ransomware and other threats

Data volumes continue to expand at an exponential rate, with no sign of slowing down. For instance, IDC predicts that the amount of commercial data in storage will grow to 12.8 ZB by 2026. To watch 12.8 ZB worth of movies in 780p HD, you’d need to plant yourself in front of the TV for more than 154 million years.

Protecting these ever-increasing volumes of data is a high priority, and while there are many different types of cybersecurity threats to enterprise data, ransomware dominates the field. Ransomware accounted for nearly a quarter (24%) of data breach incidents in the 2023 Verizon Data Breach Investigations Report, and Sophos’ State of Ransomware 2023 found that two-thirds of surveyed companies had experienced a ransomware attack.

Claus Torp Jensen, formerly CTO and Head of Architecture at CVS Health and Aetna, agreed that ransomware is a top concern. “At the top of the cybersecurity risk chart is ransomware attacks. Cybersecurity strategies need to evolve from data protection to a more holistic business continuity approach. … In today’s environment, it often isn’t possible to establish 100% protection, but we can ensure that if and when something happens, we have a clear path and approach to quick recovery.”

Experts torn on best security approach

There’s broad agreement that, while critical, modern cybersecurity strategies can’t fully protect data from ransomware and other kinds of attacks. However, there is some debate about the best approach to protecting that data.

Zero trust has taken hold in a big way over the past five years, and for good reason, according to Rich Heimann, chief artificial intelligence officer at Tier4.ai. “Zero trust operates on the principle of ‘never trust, always verify,’” Heimann says. “It’s about assuming the worst and verifying it. This is a stark contrast to other security paradigms like Defense in Depth, which are more speculative. The essence of zero trust is about validation. So, while my answer is zero trust, [it] is not just the concept that I advocate but a mindset. I think you must validate your assumptions, your technology, your policies, your people, and your processes.”

In a similar vein, Rohit Ghai, CEO of RSA, emphasizes the need to protect and secure identities. “Identity has always been the most successfully attacked target in an organization’s infrastructure,” Ghai notes. “And while organizations have made great strides in implementing multi-factor authentication, recent data breaches have shown that threat actors are adapting to new cybersecurity capabilities and finding ways to bypass MFA. Organizations will only be as safe as their identities are secured.”

The case for a multifaceted approach

But there’s broad consensus that neither zero trust nor identity controls can fully protect an organization’s data. As a result, Gene De Libero, principal at Digital Mindshare LLC, recommends incorporating zero trust alongside AI and other technologies. “First, leveraging AI-driven security enables advanced predictive threat detection and automated responses, utilizing artificial intelligence to stay ahead of cyberthreats,” De Libero says. “Second, implementing a zero trust architecture mandates verification for every access request, drastically minimizing the attack surface. Finally, embracing a cybersecurity mesh architecture allows various cybersecurity solutions to work together seamlessly, enhancing the overall defense mechanism. Together, these strategies provide the enterprise with a comprehensive defense framework, supporting the strategic priorities of technology and marketing executives in protecting their organization’s data.”Brian Thomas, CIO at DivergentCIO, takes that approach one step farther, arguing for “an increasingly sophisticated and dynamic cybersecurity landscape. This requires a multifaceted approach that combines advanced technologies and proactive strategies. Which includes zero trust architecture, advanced threat detection, encryption, security audits, technology risk assessments and cybersecurity awareness training, and of course regular disaster recovery/business continuity planning.”

Santiago Martin-Romani, who serves as vice president of technology services at a variety of companies, echoed Thomas and De Libero about the importance of a multifaceted cybersecurity strategy. “In 2024 and beyond,” Martin-Romani says, “a layered cybersecurity approach is vital. Implementing multi-factor authentication (MFA) is projected to reduce account compromise attempts by 90% according to a Microsoft report. Zero-trust network access (ZTNA) can further strengthen access control. Regular security audits, combined with employee training on cyber hygiene, are crucial for user awareness. And leveraging data encryption technologies with a market size expected to reach $180 billion by 2025.”

Finally, Will Lassalle, CIO at JLS Technology USA, points to the importance of preparing not just cyber defenses to prevent a successful attack, but also implementing a robust plan for mitigating and recovering from the damage of the inevitable successful breach. “Rather than focusing solely on prevention,” Lassalle says, “organizations should adopt a resilience mindset. This involves preparing for inevitable breaches and recognizing that every system has vulnerabilities. Resilience extends beyond defense to include robust strategies for post-breach scenarios. Cyber resilience encompasses two critical aspects:

  • Continuous Defense: Strengthening operations against constant attacks to ensure business continuity under “normal” cyber warfare conditions.
  • Post-Breach Strategy: Developing adaptive plans that go beyond recovery, acknowledging the dynamic digital battlefield where threats evolve.”

Enter LTO: A time-tested last line of defense

Backup and recovery are a critical part of that post-breach strategy, often called the last line of defense. But IT can find it difficult to scale these systems efficiently to protect rapidly expanding data volumes without compromising performance and reliability. Traditional systems may run into significant bottlenecks and limitations.

LTO (Linear Tape-Open) is a well-established magnetic tape data storage technology first launched in 2000 that continues to have relevant applications in long-term archive, data backup, high-capacity data transfer, and offline storage, especially with the updates that have been made to it over the past decade. These include features such as write-once, read-many (WORM), hardware-based encryption, partitioning enabling Linear Tape File System (LTFS), multiple digital encoding methods, and lossless data compression techniques. LTO-9 can store 18TB of uncompressed data (45TB 2.5:1 compressed) on a single cartridge with up to a 400 MBPS (1000 MBPS 2.5:1 compressed) data transfer rate.

The best news? An LTO-9 cartridge costs only about $100.

LTO technology provides a scalable, affordable, high-density means of gaining offline storage for data that can be rapidly recovered. It’s not a full solution to the broader ransomware and data security challenges, but it can play a critical and indispensable role in a multifaceted defense.

For an even deeper dive into ransomware and how LTO technology can provide a critical defense, read Ultrium’s white paper: Exploring the Ransomware Epidemic


Read More from This Article: Cybersecurity strategies for protecting data against ransomware and other threats
Source: News

Category: NewsJune 24, 2024
Tags: art

Post navigation

PreviousPrevious post:Ahead of the curve on advanced cooling for AI & HPCNextNext post:10 ways to break free from AI pilot purgatory

Related posts

The AI revolution isn’t about technology – it’s about people
June 20, 2025
Transversal, innovador e impulsor del cambio: el rol del CIO gana enteros en el complejo escenario actual
June 20, 2025
Multicloud ROI: A guide to maximizing value and efficiency
June 20, 2025
“클라우드 퍼스트를 넘어 클라우드 온리로” PPG의 대담한 혁신 이야기
June 20, 2025
이미지가 살아 움직인다···미드저니, ‘사진 기반 영상 생성’ 기능 출시
June 20, 2025
기업 데이터 노출 우려 커진 아사나 MCP···보안 리더가 지금 점검해야 할 사항은?
June 20, 2025
Recent Posts
  • The AI revolution isn’t about technology – it’s about people
  • Transversal, innovador e impulsor del cambio: el rol del CIO gana enteros en el complejo escenario actual
  • Multicloud ROI: A guide to maximizing value and efficiency
  • “클라우드 퍼스트를 넘어 클라우드 온리로” PPG의 대담한 혁신 이야기
  • 이미지가 살아 움직인다···미드저니, ‘사진 기반 영상 생성’ 기능 출시
Recent Comments
    Archives
    • June 2025
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.