Five reasons why backing up is crucial for businesses

27

An increase in phishing and ransomware attacks, human error, greater reliance on the cloud and enterprise networks make regular backups essential for any company.

Ram Narayanan, Country Manager, Check Point Software

Over the past year, Covid-19 has led to unprecedented lifestyle changes around the world. Whether you are working from home for the first time, adjusting to the changing social distancing rules, or taking part in eLearning, the pandemic has thrown up a variety of new challenges and cyber threats. As many organizations transitioned to a remote workforce, organizations witnessed a dramatic rise in cyber-attacks from hackers looking to exploit remote employees working without the safety net of their corporate network. 

According to data from Check Point Research, ransomware attacks in the UAE increased by 16% in June since the beginning of the year and globally the average number of ransomware attacks increased each week by 20% in May and April, by 41% in the first half of the year and 93% in the last 12 months.

In view of the high level of risk that this represents for companies and their data security, Check Point Software wants to highlight the crucial importance of restoring a company’s stolen or encrypted data in the event that it falls victim to a cybercriminal. As such, the data security specialist reveals its five reasons why businesses should make backups a priority:

  1. Preventive measures do not always work: As cyber criminals continue to target the remote workforce, companies have started to expand their cybersecurity strategy through robust defense software, both for the corporate network and the cloud, to update systems and apps on a regular basis, to install a VPN and to increase levels of protection on employees’ devices, as well as to provide cybersecurity training for workers. While these measures do considerably increase the level of protection for a business, it is still possible that they could fail to stop an attack, as cyber criminals constantly develop new ways to get round the defenses. It is essential to have a backup plan so that no data is lost in the event of a cyberattack. If a company becomes the victim of a double ransomware extortion attack, having a backup system in place gives them the chance to quickly restore things back 

to normal.

  1. Cyber-attacks are evolving: Cyber-attacks are evolving every day and cybercriminals are constantly striving to find security loopholes. Companies are often unprepared for new ransomware, phishing emails, and malware. This is why, despite the updates and protective barriers they may have in place, new generation cyber-attacks could still get through these defenses and achieve their objectives.
  1. Data theft puts a company’s reputation at risk: Losing information by exposing customers’ personal data can have irreparable consequences for a business in terms of reputation and financial loss. Since GDPR came in a few years ago, allowing customer’s personal documents to be compromised can lead to litigation.
  1. The cloud becomes another attack vector: It is true that the cloud has brought great advantages to companies, like reducing costs and allowing remote working. However, storing data on cloud platforms exponentially increases the attack surface through which cybercriminals could gain access to the corporate network. So, it’s a good idea, in fact it’s essential to carry out regular manual backups of the information stored in the cloud, in case anything outside the company’s control might happen.
  1. Internal dangers are sometimes undetectable: Unfortunately, even with all possible cybersecurity measures and the best protection software in place, the responsibility of users is fundamental. It is essential to train employees on the different techniques and correct approach to cybersecurity. Instilling in employees the importance of having up-to-date backups in the event of an unforeseen event or cyber-attack can be one of the best defenses. 

Having the security of a backup of our company’s most sensitive and important data gives us many advantages and protects us against any unexpected attacks, both on our company and employees, as well as on our customers and suppliers. This technique is a form of protection in addition to all the hardware and software measures we may have, even if we are migrating our data and files to the cloud” advised Ram Narayanan, Country Manager, Check Point Software Technologies, Middle East.

About Check Point Research:

Check Point Research (CPR) provides leading cyber threat intelligence to Check Point Software customers and the greater intelligence community. The research team collects and analyzes global cyber-attack data stored on ThreatCloud to keep hackers at bay, while ensuring all Check Point solutions are updated with the latest protections. The research team consists of over 100 analysts and researchers cooperating with other security vendors, law enforcement and various CERTs. 

About Check Point Software Technologies Ltd.:

Check Point Software Technologies Ltd. is a leading provider of cyber security solutions to corporate enterprises and governments globally.  Check Point Infinity´s portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.