![]() As part of the security chain, multi-factor authentication (MFA) should also be enabled on the guest OS the console is running on, which prevents the attacker from getting close to your backup management plane. This means that, should a threat actor obtain a privileged user’s username and password, they still cannot log into the console without having this additional passcode. With this feature, anyone who logs into the Veeam Backup & Replication console has to enter a one-time passcode. With multifactor authentication in V12, businesses can add a layer of validation to their data protection strategy. ![]() With the release of Veeam Backup & Replication v12, numerous enhancements have allowed enterprises to better protect one of their most valuable assets: Their data. However, when disaster strikes, you need a reliable and trusted backup to restore from. Secure backups are a solid and robust foundation for cyber resiliency. What if a malicious employee or someone else has gained access to a privileged network user account? If they delete your backups, what happens then? ![]() Unfortunately, even if you pay, there is no guarantee that you’ll get your data back. If ransomware hits and your backups are encrypted, you may contemplate paying the ransom if you don’t have a strong strategy in place. It’s no secret that threat actors commonly target an organizations’ backups. But what does this look like in real-world terms? An in-depth defense strategy must be taken, coupled with a methodology that’s built around secure backups, advanced monitoring and recovery at-scale. Of course, the best way to avoid a disaster is to prevent it from happening in the first place. Whether you’re protecting critical data from a ransomware attack or safeguarding it against malicious actors, security plays a prominent role in achieving cyber resiliency.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |