drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2025
    • DRJ Spring 2026
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Locking Down Your Backup Environment to Protect It From Ransomware

by Jon Seals | September 27, 2022 | | 0 comments

This post previously appeared on the Cobalt Iron website.

By CHRIS SNELL

One need only glance at the news on any given day to see that security breaches and ransomware attacks are on the rise all over the world … and the threats are only getting more sophisticated. If you haven’t already heeded the warnings to get your house in order, the clock is ticking.

The threat is real, ever-present, and growing. And backups are a No. 1 target because of their role as the critical last line of defense for an organization.

The financial cost of a ransomware attack can be extremely high. In fact, a 2021 Ponemon Institute report put the average cost of a data breach in 2021 at $4.24 million. That cost, coupled with the risk to public relations and customer trust, organizations can’t afford to look the other way. That’s why risk mitigation and security are rightfully at the top of every IT leader’s list of issues to solve for.

In our conversations with IT leaders, they’re asking some important questions:

  • “Is our environment secure?”
  • “Are we cyber resilient?”
  • “Are we ready to recover?”
  • “And could we recover our data cleanly?”

Another question worth asking is this: Have we locked down all of our attack vectors?

A typical large organization has a complex backup infrastructure comprising multiple, stitched-together hardware and software products that lack scalability. As the amount of backup data increases, the infrastructure grows larger and more complex … resulting in exponentially more ransomware vulnerabilities with each new addition to the environment.

The number of attack vectors grows with your data

Common areas that are ripe for attack are out-of-date software, databases, networks, and remote sites, among many others. Most of the vulnerable attack points are either flying under the radar for a lot of companies or are too challenging to keep up with across the entire environment.

A genuinely secure backup solution will cover all potential attack points:

  • Out-of-date software
  • Operating systems
  • Internal threats
  • Applications
  • Processes
  • Networks
  • Systems
  • Storage
  • Databases
  • Remote sites
  • Backup catalog

Right now you might be thinking, “I’m covered because I have immutable backup storage.”

But don’t let that lull you into a false sense of security. The truth is, most backup products today only cover about four or five of those vulnerabilities at most, leaving other components vulnerable to attack.

Immutable storage isn’t enough. To be truly secure, you need isolated zones of cyber protection and recovery to eliminate all attack vectors. One way to do that is by not allowing any access into the infrastructure at all.

This concept is called containment by design. It means there’s a secured perimeter around the entire backup infrastructure — traditionally a variety of products, integrations, data stores, and processes — to minimize exposure to malicious attacks. It creates as few paths as possible for an attacker to get into the solution and into your data.

A backup solution that takes the containment approach offers these capabilities:

  • Zero accessibility to backup hardware and software components or backup data
  • Multiple, automatically managed copies of backup data, including off-site
  • Multiple, isolated security zones
  • Data always locked down within your security access zones
  • Multiple zones of air gap
  • Robust authentication — including multi-factor authentication to the solution dashboard for visibility and management — without granting access to backup components or backup data
  • Cyberattack event recovery and validation

… and many, many more.

Cobalt Iron Compass covers nearly all attack points. The unique Compass architecture — through its inherent inaccessibility — shields the entire landscape. Every Compass deployment includes Cyber Shield technology at no extra cost. Cyber Shield’s containment-by-design architecture locks out hackers with isolated zones of cyber protection and safe recovery. It completely eliminates common attack vectors with zero direct access to the protection zones, and it eliminates the simple but real threat of daily human errors with an analytics-driven, software-automated framework. Cobalt Iron is constantly developing enhanced security features that, when available, get pushed into your deployment at no additional cost.

So what about you? Do you have any of those vulnerabilities in your environment? Could your entire backup landscape stand up to a cyberattack? Don’t take any chances. Check out this solution brief to find out more about how Cobalt Iron Compass will protect your enterprise.

Related Content

  1. Data Mobility Emerging as a Must-Have Backup Software Feature
    Data Mobility Emerging as a Must-Have Backup Software Feature
  2. Disk Backup Targets Get Modern Makeover
  3. Backup Solutions Expand the Fight Against Ransomware

Recent Posts

CData Featured as a New MCP Launch Partner in Databricks Marketplace, Powering Enterprise AI Agents with Live Access to 350+ Business Systems

November 6, 2025

Has the AI ‘Free Tier’ Era for SMBs Finally Run Out?

November 6, 2025

Keeper Security’s Industry-First Forcefield Protects Against Memory-Based Attacks on Windows Endpoints

November 6, 2025

The AI Paradox: CISOs Gain Confidence in Defense Against Traditional Threats but Are Unprepared for AI Identities, Says Portnox Survey

November 6, 2025

Fortinet Launches Secure AI Data Center Solution to Protect Models, Data, and Infrastructure at Scale

November 5, 2025

Assured Data Protection Launches New US Public Sector Division

November 5, 2025

Archives

  • November 2025 (18)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2025 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Spring 2026 | The Future Runs on Resilience

    Leave your details below for a chance to win a free pass to DRJ Spring 2026 | The Future Runs on Resilience. The winner will be announced on December 19. Join us for DRJ's 74th Conference!
    Enter Now