{"id":55479,"date":"2023-03-09T15:01:57","date_gmt":"2023-03-09T11:01:57","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=55479"},"modified":"2024-01-05T14:23:54","modified_gmt":"2024-01-05T10:23:54","slug":"securing-your-digital-data-achieving-cyberstorage-today","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/securing-your-digital-data-achieving-cyberstorage-today\/","title":{"rendered":"Securing Your Digital Data: Achieving Cyberstorage Today"},"content":{"rendered":"<p>The growing threat against backups by cybercriminals in the course of an attack has the industry looking for a stronger definition of what should be included when considering where and how your backups are stored.<!--more--><\/p>\n<p>The identification and destruction of backups has long been a known threat tactic used as part of ransomware attacks, with the obvious logic being, \u201cIf you don\u2019t have backups, you have no choice but to pay the ransom.\u201d What started as simple scripts designed to find specific file types has evolved. In some cases, the search for backups is rendered as a complex sub-attack that uses known vulnerabilities to gain access to SAN and NAS devices before finding and deleting backup files. In other cases, it\u2019s <a href=\"https:\/\/www.advintel.io\/post\/backup-removal-solutions-from-conti-ransomware-with-love\" target=\"_blank\" rel=\"noopener noreferrer\">attacks specific to a backup vendor<\/a> designed to find user accounts with application-specific privileges to eliminate relevant backups via APIs.<\/p>\n<p>Threat actors aren\u2019t fools; they understand the mitigation steps taken by today\u2019s brightest IT organizations and look for ways to circumvent security controls to locate, exfiltrate, and delete backups to leave the victim organization with paying the ransom as their only option.<\/p>\n<p>But the good guys have been diligently evolving as well. Last year, Gartner put out the <a href=\"https:\/\/www.gartner.com\/doc\/reprints?__hstc=188485175.e8c99a796634b076aa70f92e88d8ba58.1673636642316.1673636642316.1673636642316.1&amp;__hssc=188485175.4.1673636642316&amp;__hsfp=3295102214&amp;id=1-2AKX3SXL&amp;ct=220713&amp;st=sb&amp;submissionGuid=b37d670e-3ee5-44b2-b0ba-03f4caed0e02\" target=\"_blank\" rel=\"noopener noreferrer\">Hype Cycle for Storage and Data Protection Technologies, 2022<\/a>, coining a since-repeated phrase that denotes having backup storage that is resilient to cyberattack: <em>cyberstorage<\/em>.<\/p>\n<p>According to Gartner, cyberstorage \u201c<em>protects storage system data against ransomware attacks through early detection and blocking of attacks, and aids in recovery through analytics to pinpoint when an attack started. The solutions can be pure software, a dedicated appliance or fully integrated with the data storage solution<\/em>.\u201d<\/p>\n<p>In short, Gartner says, \u201c<em>Cyberstorage provides active defense against cyberattack on unstructured data<\/em>.\u201d They paint a picture of the technology timeline in the Hype Cycle shown below:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-55481\" src=\"\/wp-content\/uploads\/2023\/03\/Figure_1_Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022.png\" alt=\"Figure_1_Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022\" width=\"1170\" height=\"771\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2023\/03\/Figure_1_Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022.png 1170w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2023\/03\/Figure_1_Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022-300x198.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2023\/03\/Figure_1_Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022-1024x675.png 1024w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2023\/03\/Figure_1_Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022-768x506.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2023\/03\/Figure_1_Hype_Cycle_for_Storage_and_Data_Protection_Technologies_2022-624x411.png 624w\" sizes=\"auto, (max-width: 1170px) 100vw, 1170px\" \/><\/p>\n<p>And while the Hype Cycle report is looking for storage-vendor specific solutions that may take as many as 10 years to come to fruition, as with any cybersecurity need, there are many ways to achieve the same end goal \u2013 and in a much shorter period than 10 years!<\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 40%;\"><img decoding=\"async\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/Ransomware-Awareness-Poster-Pack-2.png\" alt=\"Poster Pack\" \/><\/div>\n<div class=\"call-to-action__right\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Ransomware Awareness Poster Pack<\/div>\n<div class=\"call-to-action__text\">\n<p>4 white-label posters to help you educate your end-users on how not to get hit by ransomware.<\/p>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-38530902-54cb-489c-9f02-772612f0072d\" data-portal=\"5442029\" data-id=\"38530902-54cb-489c-9f02-772612f0072d\"><span class=\"hs-cta-node hs-cta-38530902-54cb-489c-9f02-772612f0072d\" id=\"hs-cta-38530902-54cb-489c-9f02-772612f0072d\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/38530902-54cb-489c-9f02-772612f0072d\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-38530902-54cb-489c-9f02-772612f0072d\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/38530902-54cb-489c-9f02-772612f0072d.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<p>Let\u2019s break cyberstorage down into a few specific goals to help find ways to achieve cyberstorage practically while the industry attempts to catch up and create some form of a unified solution:<\/p>\n<p><strong>1) Early Detection and Blocking of Attacks<\/strong> \u2013 I believe that Gartner has it in mind that this \u201cdetection\u201d and \u201cblocking\u201d is done as part of the storage system. But the preventative and protective layers of your cybersecurity strategy should be most effective well before an attacker ever gets to the point where they are trying to encrypt or delete backups, right?<\/p>\n<p>Most cybersecurity practitioners put the emphasis on the <a href=\"https:\/\/www.coveware.com\/blog\/2022\/10\/26\/q3-2022-quarterly-report\" target=\"_blank\" rel=\"noopener noreferrer\">most common initial attack vector of most ransomware attacks \u2013 phishing<\/a> \u2013 putting a layered strategy in place to keep malicious email from ever reaching an inbox. But <a href=\"https:\/\/www.acronis.com\/en-us\/lp\/cyberthreats-report-2022-end-year\/#registration\" target=\"_blank\" rel=\"noopener noreferrer\">a bit more than 1 in 9 attacks actually see the inside of an inbox<\/a> \u2013 making it critical that your \u201cearly detection and blocking\u201d of attacks includes endpoint protection that stops both known and unknown threats.<\/p>\n<p id=\"last\">And by \u201cendpoint\u201d, I don\u2019t just mean workstations and laptops; I mean every system on the network. Part of Gartner\u2019s definition of <em>cyberstorage<\/em> includes pinpointing when an attack started, so that meaningful recovery actions can be taken that won\u2019t include infected systems and data within the backups used. This means your <a href=\"https:\/\/www.msp360.com\/solutions\/endpoint-prevention-and-protection\/\">endpoint protection<\/a> needs to be on any system that can be used as an asset for the attacker. Additionally, it must provide an ability to detect malicious or suspicious code, regardless of the obfuscation method(s) used and whether the code is run or lies dormant. The goal here is to find the malicious code before it does any harm.<\/p>\n<div id=\"slidebox\"><span class=\"close\">\u00a0<\/span><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" data-portal=\"5442029\" data-id=\"4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><span class=\"hs-cta-node hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" id=\"hs-cta-4a146d91-d63d-4e82-9aab-1f5f0c43f780\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-4a146d91-d63d-4e82-9aab-1f5f0c43f780\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/4a146d91-d63d-4e82-9aab-1f5f0c43f780.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p><strong>2) Keeping Backups Inaccessible to Attackers Through Cloud and Hybrid-Cloud Storage<\/strong> \u2013 According to the Gartner report, by 2026 \u201clarge enterprises will triple their unstructured data capacity stored as file or object storage on-premises, at the edge or in the public cloud, compared to 2022.\u201d Note that on-prem is still mentioned here. The somewhat old, but still pretty relevant, \u201c<a href=\"https:\/\/www.msp360.com\/resources\/blog\/following-3-2-1-backup-strategy\/\">3-2-1 Backup Rule<\/a>\u201d states that there should be one copy (the \u201c1\u201d in \u201c3-2-1\u201d) of the data held offsite. This is generally held today to mean stored in the cloud.<\/p>\n<p>Given that attackers are seeking out backups as part of ransomware attacks, it makes sense that organizations should take steps to ensure there is a copy of backups that is seemingly out of reach of an attacker by keeping it off-premises (with the cloud being the obvious choice). Of course, I\u2019m assuming that you\u2019re using a modern backup solution that supports cloud-based backups.<\/p>\n<p><strong>3) Making Backups Immutable<\/strong> \u2013 There\u2019s an extension to the \u201c<a href=\"https:\/\/www.msp360.com\/resources\/blog\/following-3-2-1-backup-strategy\/\">3-2-1 Backup Rule<\/a>\u201d that states that one of your copies should be <em>immutable<\/em> (that is, it can\u2019t be modified or deleted). The term \u201cImmutable Data Vault\u201d can also be found in Gartner\u2019s Hype Curve above, demonstrating that this additional security measure \u2013 while not the ultimate answer to stopping attacks \u2013 plays a role in achieving a state of<em> cyberstorage<\/em>. (It\u2019s likely \u2013 from Gartner\u2019s perspective \u2013 that this technology will simply become a feature in a much larger \u201csecure storage\u201d offering in the future. But, for now, it\u2019s a capability offered by many cloud storage providers today that you can take advantage of.)<\/p>\n<h3>Why Attempt to Achieve Cyberstorage?<\/h3>\n<p>If you\u2019ve been in IT for a while, you know that Gartner doesn\u2019t always get their industry trending right. But this cyberstorage concept just makes sense. While cybercriminals have been changing their ransomware tactics to increase the pressure to pay a ransom, the \u201cget out of jail free\u201d card has always been \u2013 and will continue to be \u2013 the presence of viable, undisturbed backups that can recover an environment quickly.<\/p>\n<p>But beyond ransomware attacks specifically, additional benefits also exist. <a href=\"https:\/\/www.msp360.com\/solutions\/endpoint-prevention-and-protection\/\">Endpoint protection<\/a> based on deep learning can help to stop every kind of cyberattack and not just those that seek to delete your backups and encrypt your data. Cloud-based backups increase the recovery options from just on-prem to also include a cloud-based virtual environment. <a href=\"https:\/\/www.msp360.com\/resources\/blog\/immutable-backups\/\">Immutable backups<\/a> imply a high data durability standard \u2013 meaning you can rely on the backed-up data when it comes time to recover.<\/p>\n<p>By rethinking your storage strategy to one that is focused on Gartner\u2019s definition of <a href=\"https:\/\/www.msp360.com\/resources\/blog\/cyberstorage-and-immutable-data-a-match-made-in-heaven\/\">cyberstorage<\/a>, it\u2019s possible to achieve a simple but effective version that more effectively and efficiently protects the organization against any kind of threat that may disrupt the business, including ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The growing threat against backups by cybercriminals in the course of an attack has the industry looking for a stronger definition of what should be included when considering where and how your backups are stored.<\/p>\n","protected":false},"author":85,"featured_media":55482,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[877],"tags":[],"class_list":["post-55479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-articles"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/55479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/85"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=55479"}],"version-history":[{"count":6,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/55479\/revisions"}],"predecessor-version":[{"id":57245,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/55479\/revisions\/57245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/55482"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=55479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=55479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=55479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}