Home > Integrated Products > VxBlock 1000 and 3-Tier Platform Reference Architectures > White Papers > Protect Your Data Wherever it Lives: A Data-First Strategy for Fully Integrated VxBlock Systems > The challenge: Cyber attacks on business-critical systems
No matter the industry or size of the organization, cyber attacks are on the rise. The frequency of attacks is growing exponentially, with hacking and malware making up 52 percent and 28 percent of attacks respectively, according to the 2019 Verizon Data Breach Investigations Report.
According to the RSA Cybersecurity Poverty Index, 66 percent of organizations report that they have had a security incident that negatively affected their operations, and 72 percent of organizations say they are still “immature” (or worse) in capabilities involving incident response and recovery. Remediation from a destructive cyber attack is often painful and time consuming, with a direct negative impact on an organization’s bottom line.
All organizations are concerned about a destructive cyber attack, and 59 percent of organizations believe that isolating affected systems and recovering from backups should be the response to ransomware, according to the 2017 State of Cybercrime Report by Secureworks.
Hackers’ primary entry mode is through an organization’s many end-point devices. Alternatively, hackers resort to phishing techniques and zero-day malware that enters the environment through email. The likelihood that all malware will be discovered before harm is done is slim, and the discovery time for an attack is still likely to be measured in weeks or months. This time gap provides hackers with the opportunity to map the network, escalate privileges, and plan a devastating attack, ranging from extortion (ransomware) to outright destruction of business-critical systems. These types of cyber attacks can cripple an organization, leading to expensive remediation, revenue loss, negative publicity, and lasting customer distrust. As fast as organizations build defenses against different attack vectors, hackers devise new ways to circumvent them.
To create a more comprehensive approach to cyber-risk mitigation, organizations need to evolve and automate their business continuity and recovery strategies. Focusing on threat detection analysis and remediation. Dell EMC Cyber Recovery provides the power to enable an automated workflow to augment data protection infrastructure with true data isolation, data forensics, analytics, and—most importantly—data recovery for increased business resiliency.