{"id":44275,"date":"2021-12-03T19:43:55","date_gmt":"2021-12-03T19:43:55","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/"},"modified":"2021-12-03T19:43:55","modified_gmt":"2021-12-03T19:43:55","slug":"protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/","title":{"rendered":"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing"},"content":{"rendered":"<p><span data-label=\"promo\">Paid Feature<\/span> Normally, when we have more of something, we tend to think of it as less valuable. We might even become less protective of it.<\/p>\n<p>And if there\u2019s one thing we have a lot of, it\u2019s data. The amount of <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/data_volumes\" rel=\"noopener\">data created or replicated worldwide<\/a> hit 64.2ZB in 2020, according to IDC, and will continue growing at 23 per cent CAGR over the coming years.<\/p>\n<p>So, given this exponential rise in the amount of data that organisations are generating and holding, can we be a little more relaxed about looking after it? Of course not. If data wasn\u2019t valuable, we wouldn\u2019t have the scourge of ransomware, and tech execs wouldn\u2019t be having sleepless nights worrying about it.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Gartner forecasts three quarters of IT organisations will face <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/Ransomware_models\" rel=\"noopener\">one or more ransomware threats<\/a> between now and 2025. Cybersecurity Ventures estimates that <a target=\"_blank\" href=\"https:\/\/go.theregister.com\/k\/CyberSecurity_Report\" rel=\"noopener\">a ransomware attack occurs every 11 seconds<\/a>, and this will result in an estimated financial loss of over $20bn for 2021.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p>At the same time, \u201cnew\u201d ransomware models are the top concern for IT execs, Gartner\u2019s Emerging Risks Monitor shows, as ransomware organisations become \u201cmore specialised and otherwise efficient.\u201d Some of the most worrying developments, according to Gartner are \u201cviruses that linger and infect backup systems, do not rely on phishing as a vector, harder-to-identify viruses such as \u201cfileless\u201d and \u201ccrypto-jacking\u201d attacks.\u201d<\/p>\n<p>As Gartner\u2019s Matt Shinkman says, the consequences of a ransomware attack can be crippling, even fatal, for any organisation: \u201cProlonged operational delays, data loss and exposure, as well as the reputational damage that follows, present potential existential risks to an organisation that executives are all too well aware of, especially if the attacks occur as a result of inadequate cybersecurity controls.\u201d<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>So, protecting data is clearly essential. But companies need to understand what data they need to protect.<\/p>\n<h3 class=\"crosshead\"> <span>Your data, yesterday and today<\/span><br \/>\n<\/h3>\n<p>Veeam Software solution architect John Wood points out, \u201cThe data that you have today is obviously the most valuable data that you have.\u201d<\/p>\n<p>But that data may also feed the AI or analytics systems driving companies into the future, \u201cYesterday&#8217;s data is just as valuable for gaining insight about where you&#8217;ve come from, and potentially where you&#8217;re going.\u201d And historic or archived data stretching back over years is very hard to recreate.<\/p>\n<p>The problem is, as AWS data management and storage specialist Sumit Kalia explains, traditional data protection approaches weren\u2019t developed with modern threats in mind: \u201cThe emphasis was placed on some sort of natural event, such as a flood or an earthquake, and centred on physical separation, tape shipping, and high availability between sites.\u201d<\/p>\n<p>Do these strategies really protect you against a ransomware attack? For example, how do companies ensure their secondary data centre isn\u2019t also compromised? What should RPO and RTO guidelines be in the wake of a ransomware attack? How does restoring from tape square with getting an ecommerce business back online to minimise lost revenue?<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>\u201cThat&#8217;s the question you need to ask the business,\u201d Kalia advises. \u201cAnd the answer \u2018well, not really\u2019 is quite often what we hear.\u201d<\/p>\n<p>So, how should you approach protecting this data? And ensuring that you can get it back up and running in the event of a ransomware \u2013 or any type of cyber &#8211; attack?<\/p>\n<p>According to Kalia, companies should start with something like the NIST Cybersecurity Framework, which provides a five step playbook for identifying risks, protecting services, detecting threats, and responding to attacks. The fifth step is recovery. And this is the one that\u2019s often neglected.<\/p>\n<p>\u201cThis is becoming one of the most important areas for customers in terms of ensuring they&#8217;ve got an insurance policy that allows them to recover at any given point,\u201d Kalia says. \u201cThat&#8217;s the bit that helps our customers to recover quickly, whilst minimising any sort of disruption, as well as meeting any business and regulatory requirements.\u201d<\/p>\n<p>The NIST framework informs Veeam\u2019s entire data protection workflow, Wood notes. The first step is helping customers identify what needs to be protected and securing that on immutable storage. Veeam\u2019s platform can also be used to monitor and scan data for potential vulnerabilities or compromises, for example by detecting large changes within data sets.<\/p>\n<p>But \u201cthe other half of any data protection is being able to recover in the event of an event happening, whether it be using technologies around instant recovery or secure recovery technologies.\u201d<\/p>\n<p>Veeam\u2019s Instant Recovery provides immediate restore of workloads as VMs by running them directly from compressed and deduped backup files, without the need to extract VMs and copy them to production storage.<\/p>\n<h3 class=\"crosshead\"> <span>But have you really recovered?<\/span><br \/>\n<\/h3>\n<p>Secure Restore provides the ability to scan the data for malware before it is restored into production, allowing admins to either stop the process or allow it to continue with restrictions.<\/p>\n<p>And while it\u2019s great to have a recovery plan, it\u2019s even better to know that it actually works, so Veeam also emphasises the ability to test the recoverability of the data, in the event of, for example, a ransomware attack.<\/p>\n<p>A final point, Wood says, is that it is Veeam\u2019s duty to ensure its own processes are as secure as possible, particularly given the growing threat of ransomware being delivered through compromised supply chains, for example.<\/p>\n<p>\u201cWe need to practice what we preach\u2026making sure that our supply chain is secure, to ensure that what we&#8217;re delivering to our customers has inbuilt security, so they can be assured that we&#8217;re treating security as a day zero priority.\u201d<\/p>\n<p>But if designing the right process is one challenge, another is deciding where to actually carry this out.<\/p>\n<p>As Kalia points out, even if companies have traditional redundant data centres, they might have to face up to the possibility that a compromise at one will almost certainly mean the secondary data centre has also been compromised.<\/p>\n<p>AWS, he explains, \u201ctakes a very much a proactive approach to infrastructure security, one that doesn&#8217;t rely on typical protective or reactive approaches, but instead builds security into the infrastructure from the ground up. That also includes culture.\u201d<\/p>\n<p>How can an enterprise or other large organisation hope to mimic this? \u201cBy using the same tools that AWS does&#8230; these are the same tools that are available to you today, so you can build these event driven security solutions through a variety of AWS services\u201d<\/p>\n<p>For example, AWS offers object storage with object lock capabilities, through AWS S3, effectively offering a WORM model which means customers can be sure the data has not been changed. \u201cWhenever the business has a requirement to satisfy compliance regulations, especially in the financial and healthcare sectors, you can simply capture a golden copy of that business record.\u201d<\/p>\n<p>But if AWS can provide the foundational platform and tools for securely storing data, says Wood, \u201cyou need partners like Veeam to actually take full advantage of that capability.\u201d<\/p>\n<p>This includes making sure \u201cthe data is there in the right fashion, in the right form, but also thinking beyond just the data. How do I get it back in a timely manner? Am I storing it in the most efficient way possible? These are all the things that Veeam is actually looking at. It&#8217;s not just \u2018throw my data in there and it will be all okay.\u2019\u201d<\/p>\n<p>And this is the fundamental issue. Companies have often looked at backup and disaster recovery as their last line of defence when the unthinkable happens to their critical infrastructure. This needs to be turned on its head.<\/p>\n<p>Companies need to accept that they will come under attack and will do so repeatedly. This means recovery processes are no longer just a last resort, but will become, if not routine, certainly a regular occurrence.<\/p>\n<p>And once you\u2019ve made this leap the whole issue of data protection is no longer an adjunct to your critical infrastructure. Instead, backup and recovery become critical infrastructure in their own right.<\/p>\n<p> <i>Sponsored by Veeam.<\/i>\n<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2021\/12\/03\/protecting_backups_ransomware\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you know what your recovery position really is? Paid Feature\u00a0 Normally, when we have more of something, we tend to think of it as less valuable. We might even become less protective of it.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-44275","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-03T19:43:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing\",\"datePublished\":\"2021-12-03T19:43:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/\"},\"wordCount\":1351,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/\",\"name\":\"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2021-12-03T19:43:55+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/","og_locale":"en_US","og_type":"article","og_title":"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-03T19:43:55+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing","datePublished":"2021-12-03T19:43:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/"},"wordCount":1351,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/","url":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/","name":"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2021-12-03T19:43:55+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2YaysVLN22XwB8y-TEuZMlgAAAgU&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/protecting-your-critical-infrastructure-is-one-thingprotecting-your-backups-is-the-same-thing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting your critical infrastructure is one thing\u2026protecting your backups is the same thing"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44275"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44275\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}