Why Ransomware Attacks on Backups Should Terrify You
Ransomware attacks on backups have reached epidemic levels, with 96% of attacks now targeting backup infrastructure. In this episode of The Backup Wrap-up, Curtis Preston and Prasanna Malaiyandi break down the alarming statistics and explain why cybercriminals have made your recovery systems their primary target.
The math is simple: if attackers destroy your backups, you're far more likely to pay the ransom. And with only 25% of organizations feeling prepared for ransomware attacks on backups, the gap between threat and readiness is massive.
Curtis and Prasanna discuss two studies revealing these numbers, explore why less than 7% of companies recover within a day, and outline practical defenses including true immutability, separate identity management systems, and MFA. If you're not protecting your backup infrastructure from ransomware attacks on backups, you're leaving yourself wide open.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we're talking about something that keeps me up at night,
Speaker:ransomware attacks on backups.
Speaker:A recent study showed that 96% of ransomware attacks.
Speaker:Now target your backup infrastructure.
Speaker:96%. Why do they do this?
Speaker:Well, it's simple.
Speaker:I think, uh, if they can take out your ability to recover,
Speaker:they've got you over a barrel.
Speaker:You're way more likely to pay that ransom if your backups are toast.
Speaker:Sadly, that same study showed that only about 25% of organizations
Speaker:actually felt confident that they could defend against those attacks.
Speaker:That's a serious gap.
Speaker:Persona and I break down the numbers, talk about what immutability is and
Speaker:why it's your friend, and discuss what you could do right now to stop handing
Speaker:over the keys to your backup kingdom.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that there were no backups of the production
Speaker:database that we had just lost.
Speaker:I don't want that to happen to me.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated backup admins into Cyber Recovery Heroes.
Speaker:. This is the backup wrap up.
Speaker:Hi, and welcome to the backup wrap up.
Speaker:I'm your host w Curtis Preston, AKA, Mr. Backup, and I have with
Speaker:me a guy who is so proud of me in my recent car maintenance Attempt.
Speaker:Attempt.
Speaker:Yeah.
Speaker:Prasanna Malaiyandi.
Speaker:How's it going?
Speaker:Prasanna,
Speaker:I am good.
Speaker:But to
Speaker:wait, you're not gonna tell me you weren't proud of me.
Speaker:no, no.
Speaker:To be fair, your current vehicle requires almost zero maintenance.
Speaker:Yeah.
Speaker:Except for what I did to it.
Speaker:could do that.
Speaker:You could do.
Speaker:Yeah, yeah.
Speaker:Well, there is what I told you I discovered there, there is actually,
Speaker:uh, people highly recommend changing the, the, I don't know,
Speaker:gear, oil or whatever for the, the.
Speaker:For the motor.
Speaker:Um, uh, but like at a hundred thousand miles, which I have passed.
Speaker:Yes.
Speaker:um,
Speaker:do you also do your air filters?
Speaker:um, uh, no I haven't done that.
Speaker:I know I'm supposed to do that, but
Speaker:At like 20,000 miles and how
Speaker:yeah.
Speaker:You blew past that Justice sco.
Speaker:Yeah, just a, six times past that.
Speaker:Um, I have been doing the tires though.
Speaker:Uh,
Speaker:haven't been doing it though.
Speaker:I was saying, versus like before your previous car, you
Speaker:used to do everything on that
Speaker:Yeah, I had to do a lot, right.
Speaker:Um, brake jobs and I haven't needed a brake job on this because of the way
Speaker:the brakes work on the, uh, Tesla.
Speaker:Um, but yeah, but I get, but I had, I got to crank my car up.
Speaker:Uh, which for those that don't know Teslas, they gotta be just a
Speaker:little different with everything.
Speaker:And there's these pressure points that, you know, you don't just
Speaker:have a little pinch weld where you put the, the jack on you.
Speaker:You have a pressure point that you, you have to use that.
Speaker:And so it's, it's more difficult than normal to
Speaker:reason you do that though is because the battery pack, right?
Speaker:The battery
Speaker:Yeah.
Speaker:I, I, I get it.
Speaker:of the body, and so it's down there because low center of
Speaker:It just, it just would've been nice for them to give us two pressure points
Speaker:on the same area so that we could.
Speaker:do that
Speaker:Huh,
Speaker:Most cars don't do that.
Speaker:well, most cars you would lift it up and then you would put the jacks stand
Speaker:underneath like the wheel infrastructure.
Speaker:But this doesn't have that, right?
Speaker:and you
Speaker:I survived, car survived.
Speaker:I have the new, the new pan on there.
Speaker:Um, yeah.
Speaker:Very exciting.
Speaker:Um, uh, yeah, yeah.
Speaker:Speaking of surviving,
Speaker:about today?
Speaker:yeah.
Speaker:So this episode, um, we're going to, uh, just talk a little bit
Speaker:about, you know, we, we, we, we, what, what are you laughing at?
Speaker:As I said, surviving.
Speaker:Do you know what song popped into my head?
Speaker:I got nothing.
Speaker:Destiny's Child.
Speaker:I'm a survivor.
Speaker:I'm a survivor.
Speaker:Yeah, I like it.
Speaker:Um, and we want you to be a survivor too, right?
Speaker:Uh, we want your environment to.
Speaker:Survive, uh, a ransomware attack, right?
Speaker:That is the whole point of the book that I just finished, uh, writing,
Speaker:which is coming out, it's gonna be like right after the, the first of the year.
Speaker:Um.
Speaker:By the way, I have to, I have to reminisce.
Speaker:Um, this is very reminiscent of my very first book that was going to
Speaker:come out in the Christmas of 99.
Speaker:Right.
Speaker:And we did all this work because there was a trade show called Lisa Large
Speaker:Installation System Administration.
Speaker:And the company that I worked for at the time was a.
Speaker:Sponsor it, Lisa.
Speaker:And, uh, so we really wanted to have the book to come out in time
Speaker:for that show so that we could like give it away at the show and all,
Speaker:you know, that kind of stuff, right?
Speaker:And, um, we, we, we, we succeeded, right?
Speaker:Uh, the, the show was like in the first half of December and.
Speaker:The, and it was in San Diego, by the way, interestingly enough, and I, because the
Speaker:company that I worked for was a sponsor.
Speaker:I was able to go back, um, into the sponsorship area
Speaker:when nobody else was there.
Speaker:And, uh, true story, the first copy of my book that I ever saw and, uh, obtained
Speaker:was stolen from the O'Reilly booth.
Speaker:Boo.
Speaker:I literally went in there, I saw my own book, and I was so excited.
Speaker:I just had to take one.
Speaker:And I'm pretty sure the statute of limitations on petty theft is,
Speaker:has, uh, uh, ran out at this point?
Speaker:that you also, uh, nearly lost the
Speaker:is.
Speaker:because
Speaker:No, not, no.
Speaker:Yeah, it is the, it is the same book that I nearly lost, uh, the Yeah.
Speaker:Yep.
Speaker:Absolutely.
Speaker:At Disney.
Speaker:Yeah.
Speaker:Uh, anyway, so, uh, just, just reminiscent of that, but.
Speaker:We talk a lot about, um, the fact that you need to prepare your infrastructure,
Speaker:your specifically your backup infrastructure for a ransomware attack.
Speaker:And so, uh, I thought that, uh, I, I, I went out and I looked for a couple
Speaker:of, uh, articles or, or studies to see if I could, you know, back that up.
Speaker:But before we get to sort of the studies, right?
Speaker:I
Speaker:it's probably useful to talk about like, why should a person care
Speaker:about their backup infrastructure?
Speaker:Because isn't ransomware all about cyber criminals attacking production
Speaker:instances, encrypting data, stealing data from production, right?
Speaker:All that sort of stuff.
Speaker:So yes it is,
Speaker:Everything that you said is correct except for the word all.
Speaker:So if you take out, when you said it's all about attacking, uh,
Speaker:primary infrastructure, it's not, um, it is very much about also
Speaker:attacking your backup infrastructure.
Speaker:So why would they do that?
Speaker:It, I think the answer is obvious, but perhaps it's not.
Speaker:If they can take out your backup infrastructure, if they can encrypt
Speaker:that, if they can delete that.
Speaker:If they can expire your backups right, um, then they take the backup
Speaker:infrastructure out of the equation, uh, from a ransomware perspective,
Speaker:and thus increasing the chance that you would, uh, then pay the ransom.
Speaker:Is, is the number one reason.
Speaker:Do you remember the second reason?
Speaker:I know we've talked about it a few, a
Speaker:think, uh, if I recall from prior podcasts, it was the fact that.
Speaker:All like what is backup?
Speaker:It is taking all of your production environment and protecting
Speaker:it somewhere else, right into the backup infrastructure.
Speaker:What does that mean?
Speaker:of your data is in one place,
Speaker:don't need to go compromise a hundred different production applications.
Speaker:If you can compromise the backup infrastructure, you have access
Speaker:to all the data stored in those a hundred production applications.
Speaker:Yeah, and I, I should have pulled up.
Speaker:Um, I know that I, I don't have a stat, but I know that a
Speaker:significant percentage of, um.
Speaker:Of of modern ransomware attacks include exfiltration, right?
Speaker:Because if they're able to exfiltrate your data, it then once again increases
Speaker:the chance that you'll pay the ransom because you're thinking, I.
Speaker:They have, not only have they prevented my access from important data, they
Speaker:have my 11 herbs and spices, and they're gonna release it to the
Speaker:public, uh, if I don't pay the ransom.
Speaker:Or either they've got, you know, IP that they're going to release
Speaker:or they've got damning evidence.
Speaker:Do you remember the Sony hack?
Speaker:Yep.
Speaker:Where they were talking about artists And
Speaker:not go over well.
Speaker:yeah.
Speaker:And that one, uh, was very damaging to Sony at the time.
Speaker:Right.
Speaker:To their relationship with their, uh, with their talent and all of that.
Speaker:Um, and that was a successful meaning, like they didn't pay
Speaker:the ransom and so they ended up actually, uh, releasing the data.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Just two things to add.
Speaker:So I know in past episodes when we talk about sort of encrypting
Speaker:data plus exfiltrating and then threatening you, again, we've
Speaker:referred to that as double extortion.
Speaker:We didn't make up that term.
Speaker:That's.
Speaker:Kind of what
Speaker:referring to.
Speaker:Uh, the other thing, you also mentioned IP in terms of like
Speaker:company's data being stolen.
Speaker:In that case, you're not talking about IP addresses, you're talking
Speaker:about intellectual property,
Speaker:Thank you very much for clarifying.
Speaker:Yeah.
Speaker:Yeah.
Speaker:We're talking about intellectual property, right?
Speaker:So your 11 herbs and spices is the one I I I like to use a lot.
Speaker:those who are not US based,
Speaker:dude.
Speaker:KFC's everywhere.
Speaker:I have been in many countries and I see KFC everywhere.
Speaker:We have exported that horrible, like, I love it.
Speaker:I love the restaurant.
Speaker:Right?
Speaker:I love KMC.
Speaker:It's been, it's been like a, a year since I've had it, but, um, I think
Speaker:raising canes I think has taken over my, my, uh, need for fried chicken.
Speaker:But, um, yeah, we, we, we've exported that quite a bit, but yeah, so the 11
Speaker:herbs and spices was the phrase that was always up in the, in the advertisements.
Speaker:And so they've got your company intellectual property, whatever it is,
Speaker:it makes your company, your company, and they're threatening to release it
Speaker:or, uh, they're, they've got damning uh, information on, um, you know.
Speaker:Either your executives or perhaps just, uh, the behavior of your
Speaker:company and in and in a modern, in our modern world, the threat there is
Speaker:the threat of being canceled, right?
Speaker:Right now, like I can think of what's that?
Speaker:What,
Speaker:which.
Speaker:you're the one who told me the uh, Campbell Soup.
Speaker:Oh yeah.
Speaker:Yeah.
Speaker:That's just crazy, right?
Speaker:The this, this crazy thing that a Campbell suit, allegedly, a Campbell soup
Speaker:executive, he was supposedly the head of cybersecurity or something, and emails
Speaker:from him leaked out that he was saying.
Speaker:Very unflattering things, both about his own product, uh,
Speaker:or their, their own product.
Speaker:And, uh, also being highly racist about his, uh, his interest,
Speaker:interestingly enough, Indian coworkers.
Speaker:Um, basically anything, anything that is negative about your company or the
Speaker:executives of your company in the current.
Speaker:Shoot, first ask questions later world that we live in.
Speaker:Um, you don't want that kind of stuff to get out because you don't know the degree
Speaker:to which that that is going to be, um, you know, negatively impact your company.
Speaker:Right?
Speaker:So go back to the question at hand.
Speaker:The worry is that either or the, the desire on the part of the
Speaker:threat actor is to either take out the backup infrastructure so
Speaker:that you have to pay the ransom.
Speaker:Or use the backup infrastructure to exfiltrate data.
Speaker:Um,
Speaker:also a third one.
Speaker:what's the third one?
Speaker:If a company is using SaaS and decides not to back up their
Speaker:data, they don't have to worry.
Speaker:Hopefully you're not that company,
Speaker:Hopefully you're not that company.
Speaker:Yeah.
Speaker:Um, yeah, I, I was just thinking about.
Speaker:Yeah, I mean, if you're, if you have a, if you have a SaaS infrastructure
Speaker:and you, you don't have a third party backup of that, and then the, the
Speaker:threat actor attacks that infrastructure then, uh, you know, like for example,
Speaker:the Rackspace incident where they were a SaaS provider of, uh, hosted
Speaker:exchange and then, uh, the entire thing got attacked by ransomware and they
Speaker:basically had to give up and move on.
Speaker:They basically moved the entire.
Speaker:Uh, infrastructure over to Microsoft 365.
Speaker:Right.
Speaker:because yeah.
Speaker:and I would say if we go back in history, right, not even that far back.
Speaker:Ransomware, actors ignored backups.
Speaker:Right.
Speaker:didn't care about their backup infrastructure, but because of all
Speaker:these things, people getting smarter, people not paying the ransomware 'cause
Speaker:they could recover their environment.
Speaker:Backup actors are like, Hey, let me go after that.
Speaker:Yeah.
Speaker:And so, uh, you know, and this is just because not, maybe not
Speaker:everybody, maybe everybody doesn't believe what we're saying, right?
Speaker:And so I thought it would be interesting.
Speaker:to this podcast.
Speaker:Come on.
Speaker:Yeah.
Speaker:Well, I like some of the people who listen to this podcast, think I'm an idiot.
Speaker:Right.
Speaker:So, um, you know, my wife, uh, being one of them anyway, no, she
Speaker:just uses it to, to go to sleep.
Speaker:The, um, the, there's a couple of different reports here that I thought
Speaker:were, uh, really telling the, the biggest of which was this, um, ransomware
Speaker:trends report from 2024, which was, um.
Speaker:Cited in in vio, it's 25 Disaster Recovery Statistics.
Speaker:And they were saying that 96% of modern ransomware attacks attempt
Speaker:to infect the backup repositories.
Speaker:Um, 96% is basically everything.
Speaker:Yeah.
Speaker:It's like what are those other 4% doing?
Speaker:Yeah, it's like the, it's like the one out of, what is it?
Speaker:The, the four out of five recommend sugarless gum for their patients.
Speaker:Chew, chew gum.
Speaker:What's with the one guy, like, he doesn't like you.
Speaker:You don't think they should chew sugarless gum anyway?
Speaker:so do you remember Dwayne
Speaker:Of course.
Speaker:and he was like, because he was a red teamer
Speaker:Yep.
Speaker:What is a red team or Prasanna?
Speaker:It is someone that a company hires to attack their infrastructure and
Speaker:pretend like they're a hacker, so then they can figure out what the
Speaker:flaws are and what the vulnerabilities are that they should probably fix.
Speaker:As depicted in the amazing movie sneakers.
Speaker:Yes.
Speaker:And so he actually mentioned, he's like, I love going after backup infrastructure
Speaker:because that has everything I, I
Speaker:remember him saying that, and that's like stuck with me all this time.
Speaker:yeah.
Speaker:And, and, and some of it is not as obvious as you might think.
Speaker:So we talked about.
Speaker:Uh, we talked about that the, the backup system is this honeypot from
Speaker:which you can get basically everything.
Speaker:He also looked at it from a different standpoint.
Speaker:He also looked at service accounts, for example, service accounts that
Speaker:are often unmonitored, that often don't have the, none of the limits.
Speaker:Uh, for typical accounts are applied to these service accounts because,
Speaker:well, it's the backup service account and so of course, uh, it's gonna
Speaker:be transferring ridiculous tons of.
Speaker:So if they can get access to that service account, they can then, uh, gain direct
Speaker:access to that host and, and transfer the data just like the backup system.
Speaker:Which is interesting when you think about it because on the podcast we
Speaker:talk about, least privilege access.
Speaker:And if you think about backup, it's the exact opposite.
Speaker:Yeah, it is.
Speaker:It is it really?
Speaker:Yeah.
Speaker:Because backup, in order to do its job, um, it has to basically be all powerful.
Speaker:It has to have access to every file, every database, everything on the system.
Speaker:Which is why, by the way, right.
Speaker:iPhone backup is so challenging because, um, the, because of the way that, that the
Speaker:security is done, uh, within the iPhone.
Speaker:Right.
Speaker:Yep.
Speaker:so you can't.
Speaker:For example, backup third party apps in the iPhone from a, from a third party
Speaker:app, because one third party app can't see another third party app's data.
Speaker:And so if, if that problem existed in regular IT infrastructure,
Speaker:this would be a problem.
Speaker:And so you do have these service accounts that are essentially all
Speaker:powerful, that are typically unmonitored.
Speaker:And, and if they are monitored, they're all the, the alerts
Speaker:and everything are turned off.
Speaker:Um, what, what are you laughing about now?
Speaker:it's, it's, it's, I was going back to that story.
Speaker:Sorry.
Speaker:Maybe we don't have time for another story, but the story you would
Speaker:always tell about how you worked at a company where they went the
Speaker:opposite way and locked everything down and you could never do your job
Speaker:Yes, yes.
Speaker:to everything and they would not allow you access.
Speaker:That story is at the exact same time as my, uh, book story.
Speaker:Um, 'cause it was literally in, in 1999, we were preparing for Y 2K and
Speaker:that company, the, the cybersecurity people took their job seriously.
Speaker:And it's the most, it's the, it's the organization.
Speaker:That had the crunchiest internal infrastructure that I've ever seen before
Speaker:or since, uh, that it, that even once you were inside, it was not assumed that
Speaker:you could get from anywhere to anywhere.
Speaker:And here I was, this, this jerk that was good, trying to
Speaker:transfer data from everywhere.
Speaker:I was setting off all kinds of bells and whistles, and they, they kept
Speaker:telling 'em to, to shut it off.
Speaker:So here's an interesting thing.
Speaker:Here's another reason why we're having this conversation now, is you
Speaker:got the first statistic, 90, 96% of.
Speaker:Ransomware attacks include targeting the backup system.
Speaker:Couple that with the following data.
Speaker:So this is from a Kaseya, uh, study, , well, let me ask you a question.
Speaker:What do you think?
Speaker:So, you know, we've been p we've been preaching ransomware and
Speaker:we're not the only ones, right?
Speaker:This, this is like the biggest thing ever, right?
Speaker:For years, right?
Speaker:So what percentage do you think.
Speaker:Of, of, uh, the, the, the environments that they have.
Speaker:What percentage of youth of these environments do you think have any
Speaker:policies or controls to prevent malicious access to the back of infrastructure?
Speaker:What do you think that percentage is?
Speaker:Oh,
Speaker:so being.
Speaker:An optimist would.
Speaker:Right.
Speaker:I would hope for like 80%, but I know that is probably way too high.
Speaker:Yeah, that would be, that would be a correct, uh, assumption.
Speaker:The, the percentage that was in this study was 25%.
Speaker:Oof.
Speaker:Ugh.
Speaker:So we have, we have some work to do.
Speaker:Right.
Speaker:And so that's why we're starting here.
Speaker:It's like just number one, um, you know, what do you call it?
Speaker:Um.
Speaker:You, you need to, um, you, you need to do something about this, right?
Speaker:96% of the attacks and 25% of people are ready for those attacks.
Speaker:This, this is a problem, right?
Speaker:Um, and, uh, which is why, here's a third statistic.
Speaker:This said, uh, this is from, uh, another, from the Nvidia OIT study.
Speaker:Less than 7% of companies recover within a day from ransomware.
Speaker:Right.
Speaker:Over a third, take more than a month.
Speaker:That makes perfect sense to me.
Speaker:Right?
Speaker:Because as we covered a lot in the book, the hardest part of the ransomware
Speaker:recovery is not the restore part, it's the what the hell happened part.
Speaker:Right.
Speaker:Um, and if you.
Speaker:Have something happen to your backup infrastructure, then, you
Speaker:know, it's just everything's out.
Speaker:Everything's out the window.
Speaker:And, and that, and it's interesting everything we've talked about,
Speaker:I know we've had Mike on the podcast, Mike Saylor, who's
Speaker:your co-author for this book.
Speaker:Um,
Speaker:talk about how.
Speaker:Difficult it is to do the forensics and or time consuming, right?
Speaker:It's not like you're going to just say, oh, everything's good.
Speaker:I'm just gonna blow away everything and recover my data and start going again,
Speaker:So.
Speaker:Is it just unrealistic to even have a one day stat?
Speaker:Why does that even make sense?
Speaker:No, I, I think that's a perfectly, uh, reasonable question.
Speaker:I, I actually, I thought of, I was thinking about that as I was,
Speaker:um, as I was reading it, right?
Speaker:Because I, I don't think it is, um, unless you have like the smallest of attacks
Speaker:or you really spend a lot of money for.
Speaker:Um, XDR tools and, um, you know, uh, SEIM and SOAR tools and you're, and
Speaker:you, and you catch it at that moment.
Speaker:You catch it at the initial infection and, and it sets off all the triggers and
Speaker:then you, you quarantine it at that one.
Speaker:Computer that got, um, attacked then.
Speaker:Sure.
Speaker:Right.
Speaker:If you're able to, to figure that out.
Speaker:But you still, you know what, even in that situation, you have to
Speaker:still go around and look everywhere.
Speaker:You, you can figure out, you can quarantine that server or that
Speaker:laptop and say, all right, we know what they put on that laptop.
Speaker:Let's go look everywhere else to see if that thing is everywhere else.
Speaker:Yeah.
Speaker:And, um.
Speaker:else they might have dropped elsewhere in your environment, which
Speaker:signature.
Speaker:right.
Speaker:And you, you know, and so it's, you can't assume that you, you caught
Speaker:it and therefore, oh, well we caught it early, and so we're good.
Speaker:You don't know what you didn't catch.
Speaker:Right.
Speaker:And so, you know, you, you, it, it, it's just, it's just not easy.
Speaker:Right.
Speaker:And so going back to the topic at hand.
Speaker:The one thing I just want to make sure that we do is at least let's make the
Speaker:backup infrastructure impervious and
Speaker:how, how can we do that?
Speaker:And the, the real answer, the only answer in my opinion is actual immutability.
Speaker:Right.
Speaker:Um, and because you cannot, as long as the computer, if it's a
Speaker:computer and it's plugged into the network, it's hackable, right?
Speaker:You can reduce the risk, right?
Speaker:We, we can do two things.
Speaker:One is like guaranteed the other is like, let's not make it, let's not,
Speaker:let's not leave the keys in the ignition of the car sitting in, you know,
Speaker:in the worst neighborhood, right?
Speaker:Um.
Speaker:And so because we know it's a target and so we do things like separate
Speaker:the backup infrastructure, right?
Speaker:To use a different, uh, IAM system.
Speaker:That's identity access management use a different IAM system.
Speaker:So don't you don't have it just be part of the, uh, Intra ID domain.
Speaker:Don't have it be part of whatever.
Speaker:Whatever.
Speaker:Centralized.
Speaker:Password system that you have, don't make it be part of that.
Speaker:Make it various different, perhaps even a different kind of infrastructure, not
Speaker:just a different, uh, domain in intra, but perhaps don't even use that over there.
Speaker:Right?
Speaker:It's only like four systems.
Speaker:So do you really need active directory over there?
Speaker:Right.
Speaker:So consider perhaps a local password management system, uh, with a third
Speaker:party password management system.
Speaker:Um, you know, separate that backup infrastructure as much as possible.
Speaker:Obviously, turn on MFA or turn on, uh, PA keys.
Speaker:That's something that we talk a lot about.
Speaker:Um, but if your backups, if, if the actual data.
Speaker:Of the backups is sitting on truly immutable storage where that even
Speaker:you can't delete it if you wanted to, then at least you know you will
Speaker:have that data when you need it.
Speaker:Yes, I agree with everything you said.
Speaker:I sense a big but.
Speaker:No, I, but yes, I want to talk about in a separate podcast episode,
Speaker:because it is gonna be more detailed.
Speaker:Yeah.
Speaker:I want to talk about immutability
Speaker:and why it's difficult in backups
Speaker:Yeah,
Speaker:don't think it's as simple because otherwise everyone would turn the switch,
Speaker:and so I think we should cover it in an episode we talk about immutability,
Speaker:the different kinds and.
Speaker:to other technologies.
Speaker:Yeah.
Speaker:Yeah.
Speaker:I, I think it is simple as long as you choose the right product.
Speaker:Choosing the right product is the difficult part, right?
Speaker:Because there are many products that call themselves immutable that don't meet
Speaker:the definition that I just said, right?
Speaker:And, um, um, you know, I can think of a we'll cover that on a future episode.
Speaker:So,
Speaker:all right, so your backup systems are under attack, 96%.
Speaker:How many times?
Speaker:I gotta say that.
Speaker:96. You round that up, that's a hundred percent
Speaker:let's just hundred, nearly a hundred.
Speaker:I
Speaker:Yeah, nearly a hundred percent.
Speaker:Couple that with the other stats that we've seen in other, uh, studies of
Speaker:like the number of companies that will be attacked by ransomware, right?
Speaker:So you basically, , if you don't have a method and a process to block.
Speaker:The threat actors from your backup system, then, uh, basically you're, you know,
Speaker:you're just gonna hand over the keys.
Speaker:Yep,
Speaker:Yeah,
Speaker:I agree.
Speaker:yeah,
Speaker:It.
Speaker:It's one of those things too.
Speaker:I know everyone's like, oh, ransomware is never gonna attack me, which is
Speaker:probably what people were saying three years ago, but just look at the news
Speaker:and how many people get hit every day,
Speaker:other day.
Speaker:It's just keeps going up and up and up and up, and up, and up
Speaker:It's, it's why we took the approach we took in the book, right?
Speaker:It's not a matter of if, but when,
Speaker:Yep.
Speaker:you know, statistically speaking, this is, this is the most likely kind
Speaker:of thing that's gonna happen to your environment from a cyber perspective.
Speaker:Right.
Speaker:So, um, uh, that's why we took the, the, the tack that we took in the
Speaker:book, which is you're going to get ransomware, so let's make sure that
Speaker:you're gonna be able to respond to it.
Speaker:Yep.
Speaker:All right, well thanks for chatting Prasanna.
Speaker:No, I, I'm looking forward to our next episode on Immutability.
Speaker:Me too.
Speaker:And hopefully you folks are listening to it or looking forward to it.
Speaker:Hopefully you folks are looking forward to it too for some reason.
Speaker:That was tying my tongue, but uh, that is a wrap.
Speaker:I.