SlideShare a Scribd company logo
2023 EXECUTIVE SUMMARY
RANSOMWARE
TRENDS
NORTH AMERICA EDITION
© 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
According to the 2023 Data Protection Trends Report, 85% of organizations suffered at least
one cyberattack in the preceding twelve months; an increase from 76% experienced in the prior
year. To better understand the preparedness and recoverability of cyberattacks, an independent
research firm conducted a blind survey of 1,200 unbiased IT leaders whose organizations suffered
at least one ransomware attack in 2022 — including 350 for North America.
This is the second annual survey of organizations who suffered cyberattacks with a key focus
to compare the viewpoints of four different roles that are involved in cyber-preparedness and/
or mitigation: Security professionals, CISO or other IT executives, IT Operations generalists and
backup administrators.
The full 2023 Ransomware Trends Report is available at https://vee.am/RW23.
“IT takes a village” … but organizations aren’t aligned
While many organizations may say that ‘ransomware is a disaster’ and therefore include cyberattacks
within their Business Continuity or Disaster Recovery (BC/DR) planning, the actual interaction between
the teams leaves much to be desired.
55%
believe either ‘significant
improvement’ or ‘complete overhaul’
is needed between the Cyber and
Backup teams.
75%
saw increased premiums
42%
saw increased deductibles
13%
saw coverage benefits reduced
42%
believe their risk management
program is working well, with the
rest either seeking improvement or
do not have a program yet.
That said, there is alignment on two areas: budget and playbooks. For 2023, cyber (prevention) budgets
grew by 5.5%, while backup (remediation) budgets grew by 5.5%. Beyond that, when asked about
Incident Response Teams and how organizations plan on dealing with the inevitability of cyberattacks,
the most common elements of the ‘playbook’ in preparation to recover are:
• Clean backup copies, which one might presume includes data that is ‘survivable’ against attacks
and does not include malicious code.
• Recurring verification that the backups are recoverable.
Cyber insurance can help … if you can get it
Globally, 77% of ransoms were paid by insurance, with 75% of cyber-victims in North America paying
via insurance. But cyber-insurance is becoming harder and more expensive, with 20% of organizations
stating that ransomware was now specifically excluded from their policies. While those with cyber
insurance saw significant changes in their last policy renewals:
© 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Paying the ransom does not ensure recoverability
What might surprise some people is that even though most respondents paid the ransom, many of them
actually had ‘do not pay’ policies from either their corporate management or a governmental regulation.
That said, even paying the ransom is not a guarantee that you’ll be able to recover.
63%
paid the ransom and could
recover data
19%
paid the ransom but could
not recover data
14%
did not pay the ransom because
they recovered from backup
Sadly, the global statistic that 16% of organizations that were able to recover themselves without
paying is down from 19% in last year’s survey.
To recover without paying, your backups must survive
In at least 93% of cyber-events, the criminal attempted to attack the backup repositories, which
effectively negates any other options other than paying the ransom.
76%
of organizations lost at least some
of their backup repositories during
the attack
82%
of organizations use immutable
cloud repositories
34%
of backup repositories were lost
when the cyber-villain was able to
affect the backup solution
64%
of organizations use immutable
disk storage
When you first get attacked, you have two choices: pay or restore-from-backup. By attacking the backup
solution, the cyber-villain is removing one of their victims’ choices.
The secret to survivable backups is immutability
There are other best practices such as securing the backup credentials, automating the cyber
detection scans of backups, auto verifying that backups are actually restorable, etc., but a key tactic
is to ensure that the backup repositories cannot be deleted or corrupted. This is ‘immutability’ and
can be enacted throughout the data protection lifecycle:
And when it comes to survivable media, it is hard to be more ‘air-gapped’ than a tape cartridge that
is removed from its drive and stored on a shelf. In fact, 47% of data is still written to a tape at some
point in the data protection strategy.
© 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
The secret to recoverability is portability
Like in any other disaster (e.g., fire, flood, tornado), one key strategy decision is ‘where will we recover
to?ʼ — meaning that if the production servers are compromised, you’ll need new ones. While larger
organizations may have multiple datacenters with ‘cold’ servers standing by, many do not, so it is not
surprising that most survey respondents had a hybrid plan:
66%
of organizations plan to recover to
cloud-hosted infrastructure or DRaaS
81%
of organizations plan to recover to
servers within a datacenter
It is notable that the intent to recover to servers within a datacenter could include:
• Cold-servers that were standing by, such as the dual-datacenter model.
• Acquiring new servers if supply chains permit.
• Simply wiping and re-using the original servers, assuming they aren’t taped off for forensics
or law enforcement.
Since the two statistics add up well beyond 100%, it is heartening that most organizations’ BC/DR
and cyber resiliency strategies include both location types, depending on the crisis.
Do not re-infect during recovery
Like the doctor’s motto of “Do no harm” is the mindset of not reintroducing the malware or cyber-
infected data into the production environment during restoration. With other disasters (e.g., fire/
flood), the data in the backups, replicas and snapshots, is valid to immediately begin recovering
with. Unfortunately, one of the many complexities in cyber warfare is that the data immediately
prior to receiving the ransom demand is likely compromised too.
So, it is important to thoroughly scan data during the recovery process.
This is not always an easy task, based on whether the data protection solution offers integration
with detection technologies (during backup, restore or both), as well as some kind of ‘staging’ or
‘sandbox’. When asked to the cyber-victims within the survey:
• 44% first restored to an isolated test area or ‘sandbox’ before reintroducing to production.
• 35% restored to production and then immediately scanned.
• 12% restored and then simply monitored behaviors.
• 9% had no means of preventing reinfection.
© 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners.
Concluding remarks from the research
Based on lessons learned from the 1,200 attack experiences within this survey, most organizations
today employ a few key technologies in preparation for the next assault:
• Immutable storage within disks, clouds and air-gapped media, to ensure survivability.
• Hybrid IT architectures for recovering to alternative platforms like any other BC/DR strategy.
• Staged restorations, to prevent re-infection during recovery.
Questions related to this research data and insights
can be directed to StrategicResearch@veeam.com
The Veeam perspective
Veeam believes that secure backup is your best line of defense against ransomware.
Veeam is committed to helping organizations minimize downtime and data loss, so that
they never have to pay a costly ransom. Only Veeam provides the most recovery options
on the market, and a truly portable data format, empowering you to recover, anywhere:
from physical to virtual, between clouds or even the cloud to an on-premises data
center
. There’s no one silver bullet to solve your ransomware problem, which is why
Veeam takes a multi-layered approach to ransomware protection and recovery.
To learn more, please visit https://www.veeam.com/ransomware-protection.html
About Veeam Software
Veeam provides organizations with resiliency through data security, data recovery and
data freedom for their hybrid cloud. The Veeam Data Platform delivers a single solution
for Cloud, Virtual, Physical, SaaS and Kubernetes environments that give businesses
peace of mind their apps and data are protected and always available so that they can
keep their businesses running. Headquartered in Columbus, Ohio, with offices in more
than 30 countries, Veeam protects over 450,000 customers worldwide, including 82% of
the Fortune 500 and 72% of the Global 2,000. Veeam’s global ecosystem includes 35,000+
technology partners, resellers, service providers, and alliance partners. To learn more,
visit www.veeam.com or follow Veeam on LinkedIn @veeam-software and Twitter @veeam.
Scan to learn more about
Veeam ransomware solutions

More Related Content

Similar to Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION

Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Sarah Nirschl
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
Metaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
Metaorange
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
kairostech
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
CloudMask inc.
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
aakash malhotra
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
Aggregage
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
sarah david
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
sahil lalwani
 
Cyber Client Alert
Cyber Client AlertCyber Client Alert
Cyber Client Alert
Graeme Cross
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
Karyl Scott
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.
SoulStoneBR
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-clouddrewz lin
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
Symantec
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
sarah david
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 

Similar to Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION (20)

Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
Cashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidenceCashing in on the public cloud with total confidence
Cashing in on the public cloud with total confidence
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
How Preparation and Strategy Can Be Used to Fight and Defeat Any Ransomware A...
 
Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptxthe_role_of_resilience_data_in_ensuring_cloud_security.pptx
the_role_of_resilience_data_in_ensuring_cloud_security.pptx
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Cyber Client Alert
Cyber Client AlertCyber Client Alert
Cyber Client Alert
 
What CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber SecurityWhat CIOs Need To Tell Their Boards About Cyber Security
What CIOs Need To Tell Their Boards About Cyber Security
 
Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.Ransomware Defense and Remediation with Pure Storage.
Ransomware Defense and Remediation with Pure Storage.
 
Asset 1 security-in-the-cloud
Asset 1 security-in-the-cloudAsset 1 security-in-the-cloud
Asset 1 security-in-the-cloud
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdfthe_role_of_resilience_data_in_ensuring_cloud_security.pdf
the_role_of_resilience_data_in_ensuring_cloud_security.pdf
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 

More from 株式会社クライム

Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...
Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...
Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...
株式会社クライム
 
VeeamとExaGridの検証レポート(2023年 12月)ショートバージョン
VeeamとExaGridの検証レポート(2023年 12月)ショートバージョンVeeamとExaGridの検証レポート(2023年 12月)ショートバージョン
VeeamとExaGridの検証レポート(2023年 12月)ショートバージョン
株式会社クライム
 
StarWind Virtual Tape Library for IBM i.pdf
StarWind Virtual Tape Library for IBM i.pdfStarWind Virtual Tape Library for IBM i.pdf
StarWind Virtual Tape Library for IBM i.pdf
株式会社クライム
 
StarWind Virtual SAN(VSAN)for vSphereパンフレット
StarWind Virtual SAN(VSAN)for vSphereパンフレットStarWind Virtual SAN(VSAN)for vSphereパンフレット
StarWind Virtual SAN(VSAN)for vSphereパンフレット
株式会社クライム
 
N2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリ
N2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリN2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリ
N2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリ
株式会社クライム
 
株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)
株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)
株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)
株式会社クライム
 
Blocky for Veeam : それはWindowsだけでランサムウエア対策
Blocky for Veeam : それはWindowsだけでランサムウエア対策Blocky for Veeam : それはWindowsだけでランサムウエア対策
Blocky for Veeam : それはWindowsだけでランサムウエア対策
株式会社クライム
 
ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)
ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)
ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)
株式会社クライム
 
株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)
株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)
株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)
株式会社クライム
 
EspressReport : Java Standard Reporting tools
EspressReport : Java Standard Reporting toolsEspressReport : Java Standard Reporting tools
EspressReport : Java Standard Reporting tools
株式会社クライム
 
EspressChart:de facto Standard Java Chart Tool
EspressChart:de facto Standard Java Chart ToolEspressChart:de facto Standard Java Chart Tool
EspressChart:de facto Standard Java Chart Tool
株式会社クライム
 
『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf
『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf
『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf
株式会社クライム
 
Windows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナー
Windows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナーWindows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナー
Windows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナー
株式会社クライム
 
Microsoft 365もデータ保護必須!2種の手段をご紹介!
Microsoft 365もデータ保護必須!2種の手段をご紹介!Microsoft 365もデータ保護必須!2種の手段をご紹介!
Microsoft 365もデータ保護必須!2種の手段をご紹介!
株式会社クライム
 
プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』
プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』
プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』
株式会社クライム
 
VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?
VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?
VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?
株式会社クライム
 
Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説
Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説
Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説
株式会社クライム
 
Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携
Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携
Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携
株式会社クライム
 
Amazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DR
Amazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DRAmazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DR
Amazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DR
株式会社クライム
 
StarWind VTL for AWS and Veeam
StarWind VTL for AWS and VeeamStarWind VTL for AWS and Veeam
StarWind VTL for AWS and Veeam
株式会社クライム
 

More from 株式会社クライム (20)

Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...
Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...
Veeam Backup for AWSは、不慮の削除、ランサムウェア、その他のデータ損失シナリオからの信頼性の高いリカバリのためのネイティブなポリシーベ...
 
VeeamとExaGridの検証レポート(2023年 12月)ショートバージョン
VeeamとExaGridの検証レポート(2023年 12月)ショートバージョンVeeamとExaGridの検証レポート(2023年 12月)ショートバージョン
VeeamとExaGridの検証レポート(2023年 12月)ショートバージョン
 
StarWind Virtual Tape Library for IBM i.pdf
StarWind Virtual Tape Library for IBM i.pdfStarWind Virtual Tape Library for IBM i.pdf
StarWind Virtual Tape Library for IBM i.pdf
 
StarWind Virtual SAN(VSAN)for vSphereパンフレット
StarWind Virtual SAN(VSAN)for vSphereパンフレットStarWind Virtual SAN(VSAN)for vSphereパンフレット
StarWind Virtual SAN(VSAN)for vSphereパンフレット
 
N2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリ
N2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリN2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリ
N2WS Backup & Recovery:AWS・Azure環境でのバックアップトリカバリ
 
株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)
株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)
株式会社 クライムが提供する各種ランサムウェア対策ソリューション集(Veeam, Blocky, Zerto 等)
 
Blocky for Veeam : それはWindowsだけでランサムウエア対策
Blocky for Veeam : それはWindowsだけでランサムウエア対策Blocky for Veeam : それはWindowsだけでランサムウエア対策
Blocky for Veeam : それはWindowsだけでランサムウエア対策
 
ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)
ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)
ExaGrid と Veeamを 連携させるソリューション (クライムが提供する)
 
株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)
株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)
株式会社クライムが提供するVeeamに関する総合カタログ(Nutanix,RedHat, VMware,Hyper-V)
 
EspressReport : Java Standard Reporting tools
EspressReport : Java Standard Reporting toolsEspressReport : Java Standard Reporting tools
EspressReport : Java Standard Reporting tools
 
EspressChart:de facto Standard Java Chart Tool
EspressChart:de facto Standard Java Chart ToolEspressChart:de facto Standard Java Chart Tool
EspressChart:de facto Standard Java Chart Tool
 
『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf
『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf
『Veeam』+『Wasabi』ですぐに始めるBCP・ランサムウェア対策.pdf
 
Windows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナー
Windows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナーWindows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナー
Windows 2012/2012 R2サポート期限迫る!まだ間に合う延命対策セミナー
 
Microsoft 365もデータ保護必須!2種の手段をご紹介!
Microsoft 365もデータ保護必須!2種の手段をご紹介!Microsoft 365もデータ保護必須!2種の手段をご紹介!
Microsoft 365もデータ保護必須!2種の手段をご紹介!
 
プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』
プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』
プライバシーを置き去りにしない!自動マスキングで開発をスムーズに DevOpsの高速化ツール『Accelario』
 
VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?
VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?
VMレプリケーション なら 「オンプレ」「クラウド」自由自在 【Zerto(ゼルト)】とは?
 
Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説
Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説
Veeam v12新機能セミナー!クラウドへの直接バックアップ、多要素認証など便利機能をまるっと解説
 
Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携
Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携
Oracle?SQL Server?PostgreSQL?誰でも簡単にできる異種DB移行・連携
 
Amazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DR
Amazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DRAmazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DR
Amazon RDS/Azure SQL/Google Cloud SQL 対応DBが多様!異種DBへの移行・連携ならSyniti DR
 
StarWind VTL for AWS and Veeam
StarWind VTL for AWS and VeeamStarWind VTL for AWS and Veeam
StarWind VTL for AWS and Veeam
 

Recently uploaded

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
William (Bill) H. Bender, FCSI
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
Tata Consultancy Services
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
juniourjohnstone
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
A. F. M. Rubayat-Ul Jannat
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
gcljeuzdu
 
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
CIOWomenMagazine
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
akaash13
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
Amir H. Fassihi
 

Recently uploaded (10)

Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
W.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest ExperienceW.H.Bender Quote 65 - The Team Member and Guest Experience
W.H.Bender Quote 65 - The Team Member and Guest Experience
 
TCS AI for Business Study – Key Findings
TCS AI for Business Study – Key FindingsTCS AI for Business Study – Key Findings
TCS AI for Business Study – Key Findings
 
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
SOCIO-ANTHROPOLOGY FACULTY OF NURSING.....
 
Case Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of ManagementCase Analysis - The Sky is the Limit | Principles of Management
Case Analysis - The Sky is the Limit | Principles of Management
 
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
一比一原版杜克大学毕业证(Duke毕业证)成绩单留信认证
 
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
Oprah Winfrey: A Leader in Media, Philanthropy, and Empowerment | CIO Women M...
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
Training- integrated management system (iso)
Training- integrated management system (iso)Training- integrated management system (iso)
Training- integrated management system (iso)
 
Founder-Game Director Workshop (Session 1)
Founder-Game Director  Workshop (Session 1)Founder-Game Director  Workshop (Session 1)
Founder-Game Director Workshop (Session 1)
 

Veeam 2023 EXECUTIVE SUMMARY:RANSOMWARE TRENDS NORTH AMERICA EDITION

  • 2. © 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. According to the 2023 Data Protection Trends Report, 85% of organizations suffered at least one cyberattack in the preceding twelve months; an increase from 76% experienced in the prior year. To better understand the preparedness and recoverability of cyberattacks, an independent research firm conducted a blind survey of 1,200 unbiased IT leaders whose organizations suffered at least one ransomware attack in 2022 — including 350 for North America. This is the second annual survey of organizations who suffered cyberattacks with a key focus to compare the viewpoints of four different roles that are involved in cyber-preparedness and/ or mitigation: Security professionals, CISO or other IT executives, IT Operations generalists and backup administrators. The full 2023 Ransomware Trends Report is available at https://vee.am/RW23. “IT takes a village” … but organizations aren’t aligned While many organizations may say that ‘ransomware is a disaster’ and therefore include cyberattacks within their Business Continuity or Disaster Recovery (BC/DR) planning, the actual interaction between the teams leaves much to be desired. 55% believe either ‘significant improvement’ or ‘complete overhaul’ is needed between the Cyber and Backup teams. 75% saw increased premiums 42% saw increased deductibles 13% saw coverage benefits reduced 42% believe their risk management program is working well, with the rest either seeking improvement or do not have a program yet. That said, there is alignment on two areas: budget and playbooks. For 2023, cyber (prevention) budgets grew by 5.5%, while backup (remediation) budgets grew by 5.5%. Beyond that, when asked about Incident Response Teams and how organizations plan on dealing with the inevitability of cyberattacks, the most common elements of the ‘playbook’ in preparation to recover are: • Clean backup copies, which one might presume includes data that is ‘survivable’ against attacks and does not include malicious code. • Recurring verification that the backups are recoverable. Cyber insurance can help … if you can get it Globally, 77% of ransoms were paid by insurance, with 75% of cyber-victims in North America paying via insurance. But cyber-insurance is becoming harder and more expensive, with 20% of organizations stating that ransomware was now specifically excluded from their policies. While those with cyber insurance saw significant changes in their last policy renewals:
  • 3. © 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. Paying the ransom does not ensure recoverability What might surprise some people is that even though most respondents paid the ransom, many of them actually had ‘do not pay’ policies from either their corporate management or a governmental regulation. That said, even paying the ransom is not a guarantee that you’ll be able to recover. 63% paid the ransom and could recover data 19% paid the ransom but could not recover data 14% did not pay the ransom because they recovered from backup Sadly, the global statistic that 16% of organizations that were able to recover themselves without paying is down from 19% in last year’s survey. To recover without paying, your backups must survive In at least 93% of cyber-events, the criminal attempted to attack the backup repositories, which effectively negates any other options other than paying the ransom. 76% of organizations lost at least some of their backup repositories during the attack 82% of organizations use immutable cloud repositories 34% of backup repositories were lost when the cyber-villain was able to affect the backup solution 64% of organizations use immutable disk storage When you first get attacked, you have two choices: pay or restore-from-backup. By attacking the backup solution, the cyber-villain is removing one of their victims’ choices. The secret to survivable backups is immutability There are other best practices such as securing the backup credentials, automating the cyber detection scans of backups, auto verifying that backups are actually restorable, etc., but a key tactic is to ensure that the backup repositories cannot be deleted or corrupted. This is ‘immutability’ and can be enacted throughout the data protection lifecycle: And when it comes to survivable media, it is hard to be more ‘air-gapped’ than a tape cartridge that is removed from its drive and stored on a shelf. In fact, 47% of data is still written to a tape at some point in the data protection strategy.
  • 4. © 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. The secret to recoverability is portability Like in any other disaster (e.g., fire, flood, tornado), one key strategy decision is ‘where will we recover to?ʼ — meaning that if the production servers are compromised, you’ll need new ones. While larger organizations may have multiple datacenters with ‘cold’ servers standing by, many do not, so it is not surprising that most survey respondents had a hybrid plan: 66% of organizations plan to recover to cloud-hosted infrastructure or DRaaS 81% of organizations plan to recover to servers within a datacenter It is notable that the intent to recover to servers within a datacenter could include: • Cold-servers that were standing by, such as the dual-datacenter model. • Acquiring new servers if supply chains permit. • Simply wiping and re-using the original servers, assuming they aren’t taped off for forensics or law enforcement. Since the two statistics add up well beyond 100%, it is heartening that most organizations’ BC/DR and cyber resiliency strategies include both location types, depending on the crisis. Do not re-infect during recovery Like the doctor’s motto of “Do no harm” is the mindset of not reintroducing the malware or cyber- infected data into the production environment during restoration. With other disasters (e.g., fire/ flood), the data in the backups, replicas and snapshots, is valid to immediately begin recovering with. Unfortunately, one of the many complexities in cyber warfare is that the data immediately prior to receiving the ransom demand is likely compromised too. So, it is important to thoroughly scan data during the recovery process. This is not always an easy task, based on whether the data protection solution offers integration with detection technologies (during backup, restore or both), as well as some kind of ‘staging’ or ‘sandbox’. When asked to the cyber-victims within the survey: • 44% first restored to an isolated test area or ‘sandbox’ before reintroducing to production. • 35% restored to production and then immediately scanned. • 12% restored and then simply monitored behaviors. • 9% had no means of preventing reinfection.
  • 5. © 2023 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. Concluding remarks from the research Based on lessons learned from the 1,200 attack experiences within this survey, most organizations today employ a few key technologies in preparation for the next assault: • Immutable storage within disks, clouds and air-gapped media, to ensure survivability. • Hybrid IT architectures for recovering to alternative platforms like any other BC/DR strategy. • Staged restorations, to prevent re-infection during recovery. Questions related to this research data and insights can be directed to StrategicResearch@veeam.com The Veeam perspective Veeam believes that secure backup is your best line of defense against ransomware. Veeam is committed to helping organizations minimize downtime and data loss, so that they never have to pay a costly ransom. Only Veeam provides the most recovery options on the market, and a truly portable data format, empowering you to recover, anywhere: from physical to virtual, between clouds or even the cloud to an on-premises data center . There’s no one silver bullet to solve your ransomware problem, which is why Veeam takes a multi-layered approach to ransomware protection and recovery. To learn more, please visit https://www.veeam.com/ransomware-protection.html About Veeam Software Veeam provides organizations with resiliency through data security, data recovery and data freedom for their hybrid cloud. The Veeam Data Platform delivers a single solution for Cloud, Virtual, Physical, SaaS and Kubernetes environments that give businesses peace of mind their apps and data are protected and always available so that they can keep their businesses running. Headquartered in Columbus, Ohio, with offices in more than 30 countries, Veeam protects over 450,000 customers worldwide, including 82% of the Fortune 500 and 72% of the Global 2,000. Veeam’s global ecosystem includes 35,000+ technology partners, resellers, service providers, and alliance partners. To learn more, visit www.veeam.com or follow Veeam on LinkedIn @veeam-software and Twitter @veeam. Scan to learn more about Veeam ransomware solutions