Why you need to be data assured

James Blake, Field CTO Security EMEA at Rubrik, looks at defining data assurance and explains how businesses can ensure an architecture that supports it going forward.
James Blake, Field CTO Security EMEA at Rubrik, looks at defining data assurance and explains how businesses can ensure an architecture that supports it going forward.

Data is at the heart of every modern organization; without it, business applications, systems and processes simply can’t function. It’s become mission-critical for almost every business on the planet, so it’s no wonder that it’s highly sought after by cybercriminals.

But what makes data so desirable? Some have learned to collect data and metadata from every corner of their organization, using it to make informed decisions, save costs, or predict what’s around the corner and prepare accordingly. Hackers, meanwhile, have mastered the fine art of ransomware, holding that very data hostage to those who need it most in exchange for one hell of a payday.

According to a recent survey by IDC, over a third of organizations globally have experienced a ransomware attack in the last year, with an average ransom payment of nearly US$250,000. In the UK, ransomware attacks doubled in the first half of 2021 compared to the same period in 2020. It’s clear that the traditional ‘perimeter’ approach to security is no longer working. 

To combat this, modern businesses need to be data assured. This means not only ensuring that they are accurately collecting data and correctly analyzing it for maximum impact, but that that very data is also protected when the worst happens. Sounds easy enough, but how do organizations achieve that, how can they best protect the lifeblood of their infrastructure, and what solutions can help along the way?

It’s time to rethink data protection. It’s time for an inside-out security strategy, whereby the data is not only the last line of defence but the first line of defiance. It’s time to become data assured.

Data assurance, explained

Simply put, data assurance is the act of understanding and correcting errors throughout the data communication process, such as between a host and a storage array. In doing so, data assurance improves the integrity of data across a storage system by enabling the storage array itself to check for said errors, appending error-checking codes to data blocks in order to determine errors in transit. If and when corrupted data is recognized, it is corrected before it reaches its next destination. 

However, for data assurance to thrive, the organization must first adopt the concept of zero trust. A zero trust architecture assumes all users, devices and applications are untrustworthy and can be compromised. In other words, it means trusting nothing and verifying everything. In doing so, permissions are significantly limited, data is only accessible via multi-factor authentication, and therefore the likelihood of anyone or anything maliciously impacting that data is removed.

An architecture designed around zero trust must employ immutable backups to further ensure data security. Immutable backups cannot be modified, deleted or tampered with in any way – intentionally or otherwise, while every attempt to read the data is subject to authentication. So, if you find yourself suddenly exposed, you know at the very least that you have clean, immutable data to reinstate.

As well as requiring certificate-based mutual authentication for secure communications as part of its zero trust cluster design, immutability is built upon filesystem distribution and API authentication. It provides tight controls over which applications can exchange information, how data is transacted, and how it is arranged across physical and logical devices, and requires authentication to all endpoints to allow any of this to happen. With all this in place, security teams can rest in the knowledge that they are on the right track to true data assurance.

In short, being data assured allows security teams to know exactly where their data is, rest easy that it’s stored immutably, and confidently leverage said data to initiate recovery operations or run attack forensics in the wake of a ransomware attack.

READ MORE:

The final piece in the data assurance puzzle is deploying a modern backup solution that can enforce all of the above. Traditional solutions simply aren’t built with data assurance in mind, and therefore don’t offer the visibility and governance capabilities needed to effectively monitor the data flowing through an organization.

For more news from Top Business Tech, don’t forget to subscribe to our daily bulletin!

Follow us on LinkedIn and Twitter

Amber Donovan-Stevens

Amber is a Content Editor at Top Business Tech

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

Laying the foundations for global connectivity

Waldemar Sterz • 26th June 2024

With the globalisation of trade, the axis is shifting. The world has witnessed an unprecedented rise in new digital trade routes that are connecting continents and increasing trade volumes between nations. Waldemar Sterz, CEO of Telegraph42 explains the complexities involved in establishing a Global Internet and provides insight into some of the key initiatives Telegraph42...

IoT Security: Protecting Your Connected Devices from Cyber Attacks

Miro Khach • 19th June 2024

Did you know we’re heading towards having more than 25 billion IoT devices by 2030? This jump means we have to really focus on keeping our smart devices safe. We’re looking at everything from threats to our connected home gadgets to needing strong encryption methods. Ensuring we have secure ways to talk to these devices...

Future Proofing Shipping Against the Next Crisis

Captain Steve Bomgardner • 18th June 2024

Irrespective of whether the next crisis for ship owners is war, weather or another global health event, one fact is ineluctable: recruiting onboard crew is becoming difficult. With limited shore time and contracts that become ever longer, morale is a big issue on board. The job can be both mundane and high risk. Every day...

London Tech Week 2024: A Launched Recap

Dianne Castillo • 17th June 2024

Dominating global tech investment, London Tech Week 2024 was buzzing with innovation. Our team joined the action, interviewing founders and soaking up the latest tech trends. Discover key takeaways and meet some of the exciting startups we met!

The Future of Smart Buildings: Trends in Occupancy Monitoring

Khai Zin Thein • 12th June 2024

Occupancy monitoring technology is revolutionising building management with advancements in AI and IoT. AI algorithms analyse data from IoT sensors, enabling automated adjustments in lighting, HVAC, and security systems based on occupancy levels. Modern systems leverage big data and AI to optimise space usage and resource management, reducing energy consumption and promoting sustainability. Enhanced encryption...