www.veritas.com Open in urlscan Pro
23.75.66.32  Public Scan

Submitted URL: https://veritastechnologiesllc.tellwise.com/rest/v1/url/redirect/eyJJZCI6MTI3Mzg1NzY5OTg1MzExOCwiSW52aXRhdGlvbklkIjoxMjg1ODkxMzM3MTQ3MzgwfQ_...
Effective URL: https://www.veritas.com/resources/cyber-security-timeline.html?inid=us_homepage_hero_resiliency_timeline
Submission: On December 13 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

This site uses cookies and related technologies, as described
in our privacy policy, for purposes that may include site operation, analytics,
enhanced user experience, or advertising. You may choose to consent to our use
of these technologies, or manage your own preferences.
Manage Settings Accept Decline All
Assess Your Readiness
A
R
A
N
S
O
M
W
A
R
E
A
T
T
A
C
K
H
A
P
P
E
N
S
1
5
T
I
M
E
S
E
V
E
R
Y
S
E
C
O
N
D
.


CLICK.


CLICK.





|

When a cyber attack happens, there's a lot that can go wrong (or right!)
depending on your data protection solution. Follow the sequence of events below
to experience a cybersecurity breach from two very different perspectives:

With Veritas vs. Without





With Veritas


INTRUDER ALERT!

A phishing attack, disguised as a cat video, unleashes malware on your
organization. Anomaly detection identifies abnormal data transfers and triggers
malware scans. Users restore files, servers, and services, while you and your
team investigate and lock down your network.

Brief: Anomaly Detection

ANOMALY DETECTION

Veritas anomaly detection relies on artificial intelligence (AI) to identify
abnormal events, changes or shifts in files, all with the objective of providing
advanced warning of a ransomware event.

Read the brief

Video: Anomaly Detection, a Best Practice to Combat Ransomware

ANOMALY DETECTION, A BEST PRACTICE TO COMBAT RANSOMWARE

Catch a threat before it becomes a devastating ransomware attack with anomaly
detection. This demo walks through how easy it is to use the anomaly detection
engine and seamlessly integrate into the NetBackup primary server.

Watch the video
×
Video Player is loading.
Play Video
PlayNext playlist item
Mute

Current Time 0:00
/
Duration 2:50
Loaded: 5.81%


0:00

Stream Type LIVE
Seek to live, currently behind liveLIVE
Remaining Time -2:50
 
Share
1x
Playback Rate

Chapters
 * Chapters

Descriptions
 * descriptions off, selected

Captions
 * captions settings, opens captions settings dialog
 * captions off, selected

Audio Track
 * en (Main), selected

Picture-in-PictureFullscreen

This is a modal window.



Beginning of dialog window. Escape will cancel and close the window.

TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaque
Font Size50%75%100%125%150%175%200%300%400%Text Edge
StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional
Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall
Caps
Reset restore all settings to the default valuesDone
Close Modal Dialog

End of dialog window.

Close Modal Dialog

This is a modal window. This modal can be closed by pressing the Escape key or
activating the close button.


Close Modal Dialog

This is a modal window. This modal can be closed by pressing the Escape key or
activating the close button.



This is a modal window.



Without Veritas


IGNORANCE IS NOT CYBER-BLISS.

Without access to a Veritas malware scanning tool for backup data, this attack
will go undetected, leaving the hackers to recon your environment. Similarly,
without near real-time alerting of suspicious events, unstructured data can be
exfiltrated without your knowledge.

Read How Every Second Counts
< Back to Timeline


EVERY SECOND COUNTS.




HURRY! YOUR MONEY AND REPUTATION ARE GOING UP IN FLAMES.


Getting breached is one thing; thwarting the attacker is something else.
According to IBM, it takes an organization an average of 207 days to discover a
breach and up to 70 days to contain it¹. That's a very troubling realization,
especially considering that 96.88% of all ransomware infections take less than
four hours to successfully infiltrate their target². In fact, the fastest
malicious software on record can gain control of a company's systems in just 45
minutes³.

When it comes to breaches, speed of response is crucial. Companies that
contained a breach within 30 days saved more than $1 million as compared to
those that took longer⁴. A slow response enables attackers to become more firmly
rooted in your systems, making it more difficult and costly to remove them. This
often results in losses of customer trust, productivity, and major fines.

< 30 days
$3.09M on Average
30 days >
$4.25M on Average

Cybercrime will cost companies worldwide an estimated $10.5 trillion annually by
2025, up from $3 trillion in 2015.

Meanwhile, global spending on cybersecurity products and services is predicted
to exceed $1 trillion, in aggregate, over the five-year period from 2017 to
2021, a growth rate of 12-15% year-over-year.


VERITAS CAN HELP YOU PROTECT YOUR DATA IN THE CLOUD.

Veritas offers next generation technology that revolutionizes data management,
resiliency, cybersecurity, and sustainability in the cloud. Our multi-layered
data security strategy safeguards your cloud data—anywhere and everywhere. In
fact, we are the leader in multi-cloud data management. Over 80,000
customers—including 95% of the Fortune 100—rely on us to help ensure the
protection, recoverability, and compliance of their data. We have a reputation
for reliability at scale, which delivers the resilience our customers need
against the disruptions threatened by cyberattacks, like ransomware. No other
vendor is able to match our ability to execute, with support for 800+ data
sources, 100+ operating systems, 1,400+ storage targets, and 60+ clouds.

 

1 “Cost of a Data Breach 2022,” IBM Security.
2 “Microsoft Digital Defense Report,” Microsoft, September 2020.
3 Ibid.
4 “Cost of a Data Breach 2022,” IBM Security.
5 “2022 Must-Know Cyber Attack Statistics and Trends,” Embroker, October 13,
2022.

MON 9:00 AM
With Veritas


CALL OF THE HERO.

You work quickly to stop ransomware from gaining control of your backups.
Practicing Zero Trust Zero TrustDefinition:The Zero Trust security model
describes a “never trust, always verify” approach to the design and
implementation of IT systems. A Zero Trust strategy is based on continuous
evaluation and verification of network access every time and for every single
access. Not just users, but devices and workloads too. , you utilize immutable
backups Immutable backupsDefinition:An immutable backup is a backup file that
can’t be altered or deleted. Having an immutable backup ensures that you have a
secure copy of recoverable data to protect against attacks or other data loss.
and encrypted data. Near real-time alerts about accessed sensitive data allow
you to swiftly identify and disable the compromised account.

White Paper: NetBackup Flex Scale

NETBACKUP FLEX SCALE

Enterprises today need a data protection solution that integrates across cloud
models, provides reliable cyber-resilience, and improves operational
efficiencies.

Download the white paper

Brief: IT Analytics

IT ANALYTICS

Reduce data management and protection complexity while gaining visibility and
control over enterprise data wherever it resides.

Download the overview

White Paper: Recovery Vault

RECOVERY VAULT

An organization can be confident its data is secure in the cloud, plan for
disaster recovery, meet compliance and governance requirements, and prevent data
loss from ransomware with Veritas Recovery Vault.

Download the white paper

Without Veritas


WHAT YOU DON'T KNOW CAN HURT YOU.

There’s a spike in Help Desk tickets. Something’s wrong, but without penetration
test verification your vulnerabilities are unknown. Hackers are altering,
erasing, and encrypting your data. Without secure-by-default immutability and
indelibility, even your backups are at risk.

Read Containment is Control
< Back to Timeline


CONTAINMENT IS CONTROL


FAILING TO PLAN FOR CONTAINMENT IS PLANNING TO FAIL.

Last year broke the records. According to CNET, we hit the highest number of
data breaches with 1862 recorded. This was up 68% from the prior year, a
significant and troubling increase. And when you consider that in 2022 the
average breach cost $4.35 million², it’s easy to see why so many organizations
are racing to bolster their systems, processes, and procedures designed to
manage these crises.

What is crucial for companies of all sizes to understand is that the long tail
costs of data breaches extend for months to years and include significant
expenses that most organizations are not even aware of and/or do not anticipate
in their annual planning.

A Data Breach Containment & Response Plan can make a crucial difference in the
extent of your exposure and losses. While it’s true that different types of
incidents like business email compromise, ransomware, or stolen data all require
specialized responses to contain the incident and recover from it, there are a
few common early steps that you should take regardless of the type of security
issue you’re facing.

DATA BREACH CONTAINMENT & RESPONSE PLAN - COMPONENTS³:

> Containment:
> Notify your local law enforcement agency immediately. Depending on the country
> and jurisdiction of your business, there are various data breach reporting
> laws that must be adhered to. As part of this, law enforcement agencies can
> often help to investigate the scope of the breach and to try to track the
> criminals behind the attack.

> Communication:
> Tell your stakeholder base there was a breach. You will not know all the
> details immediately, but early communication is key. Let them know what you
> did to prepare for this type of incident, that there was a breach, that it is
> being investigated, and that more details are forthcoming. Then further
> communication can be sent once it is contained, the amount of data loss is
> known, and the plans for remediation and compensation are put in place.

> Remediation:
> Put steps in place to remediate the breach. This includes fixing whatever
> caused the breach and looking at what systems, processes, and procedures are
> in place to detect and reduce the likelihood of this occurring again. The
> business needs to weigh the cost of the breach against the cost of
> implementing mitigating controls. The containment process itself can be costly
> and time consuming, and result in lost revenue. To learn more about response
> strategies and tactics throughout every stage of a data breach, we recommend
> the Cybersecurity & Infrastructure Security Agency’s (CISA) Federal Government
> Cybersecurity Incident & Vulnerability Response Playbooks.

To learn more about response strategies and tactics throughout every stage of a
data breach, we recommend the Cybersecurity & Infrastructure Security Agency’s
(CISA) Federal Government Cybersecurity Incident & Vulnerability Response
Playbooks.

 

Download the playbooks

 

1 “Number of Data Breaches in 2021 Surpasses All of 2020,” Identity Theft
Resource Center, September 6, 2021.
2 “Cost of a Data Breach 2022,” IBM Security.
3 “Containment, Communication, and Remediation: The 3 Keys to a Breach
Response,”
Tripwire, January 25, 2022.

MON 10:00 AM
With Veritas


YOU VS RANSOMWARE.

While grabbing a quick drink you receive an alert: malware has been detected.
You begin flagging suspicious events for investigation. Instant rollback Instant
rollbackDefinition:Instant Rollback for VMware facilitates a speedy recovery
from a ransomware attack by restoring all affected systems and secure
mission-critical apps and data directly to the production environment, standing
up anything from an individual server to an entire data center in a matter of
minutes. and instant access Instant accessDefinition:Instant Access allows VM
and workload administrators to quickly access their virtual machine, browse for
what they need, and get their data back, eliminating the reliance on backup
administrators. shrink recovery times. Consistent policy-based solutions help to
minimize data loss.

White Paper: Veritas Data Insight

VERITAS DATA INSIGHT

There’s compliance risk hiding in your data. Data Insight provides visibility,
context, and analytics across your infrastructure so you can regain control of
your information and protect your organization.

Download the white paper

Technical Brief: Malware Scanning

MALWARE SCANNING

Automated malware detection bolsters your defenses against undesirable data
propagating within your environment.

Download the white paper

White Paper: Isolated Recovery Environment

ISOLATED RECOVERY ENVIRONMENT

Veritas provides a turn-key Isolated Recovery Environment (IRE) and immutable
data vault ensuring a secure copy of critical backup data by creating an
isolated, immutable storage environment.

Download the white paper

Without Veritas


IT'S NO CONTEST.

The hackers are winning. IT admins struggle to access systems—including backup
or recovery infrastructure. Productivity is plummeting, the company is losing
money, and the pressure is high. Meanwhile, you are not even aware that cloud
object storage is being deleted.

MON 10:30 AM
With Veritas


BUSINESS NEVER CEASES.

Maintaining business continuity is critical right now so you and your team work
fast to restore key systems, such as SaaS workloads and business apps. Pivoting
to forensic reporting, you locate the blast radius in your cloud data and alert
the IT team where to focus their efforts.

White Paper: Veritas Alta™ SaaS Protection

VERITAS ALTA™ SAAS PROTECTION

Grow into the cloud safely. This cloud-based secondary storage platform enables
you to centrally protect and manage all types of SaaS data at any scale.

Download the white paper

White Paper: Application Resiliency

APPLICATION RESILIENCY

Achieve high availability and disaster recovery for a wide array of critical
business services across all major clouds. Increase application uptime and
optimize performance with confidence.

Download the white paper

Without Veritas


LOOKING FOR A LIFE JACKET.

You’re swept up in a data breach tsunami—accounts locked, data compromised, and
backups corrupted. And by not adhering to a shared responsibility model, you’re
only now realizing that application reliability and data resiliency are YOUR
problem.

Read More Than Just Another Dollar
< Back to Timeline


MORE THAN JUST ANOTHER DOLLAR.


THE EFFECTS OF A CYBERATTACK CAN EXTEND WELL BEYOND JUST THE FINANCIAL LOSS.

The impact of a ransomware attack can be immense. Consider these key findings
from Sophos’s State of Ransomware 2022 Report¹:

 * It took on average one month to recover from the damage and disruption. 
 * 90% of organizations said the attack had impacted their ability to operate.
 * 86% of private sector victims said they had lost business and/or revenue
   because of the attack.
 * 72% put faith in approaches that don’t stop organizations from being
   attacked.

The unfortunate reality is that there is a lot of data in the cloud today that
remains unprotected due to the confusion of responsibility between cloud service
providers and their customers. Many IT buyers assume that because they're
effectively outsourcing the running of their infrastructure to a trusted third
party, the provider will take care of everything. This is simply not true. 

To ensure cloud security, it is imperative that you, the customer, understand
the shared responsibility model which, in its simplest terms, means that cloud
service providers are responsible for delivering a highly available
infrastructure, and you are responsible for application reliability and data
resiliency. 

The good news is that Veritas can help you handle your responsibility, which
leads to shorter downtimes and more complete data recovery, alleviating
operational costs.


SHARED RESPONSIBILITY MODEL IN THE CLOUD




CONTINUALLY MANAGING YOUR CYBER RISK IS ESSENTIAL TO SUCCESS.

For businesses of all sizes, managing cyber risk is critical. This requires
continually assessing your cyber risk profile and proactively managing your
defenses. But it’s also vital that you take steps to mitigate the impact a
cyberattack could have on your reputation and brand.

1 “The State of Ransomware 2022,” Sophos, April 27, 2022.

MON 11:30 AM
With Veritas


CONTROLLING THE SPREAD

Reviewing data access patterns, you identify patient zero and the point of
infection. These findings lead to the compromised user accounts and exfiltrated
data. Plans are already in place to mitigate the exfiltrated data, so you set
them in motion.

Data Sheet: Data Protection for Cloud Workloads

DATA PROTECTION FOR CLOUD WORKLOADS

Minimize both the risk and impact of a ransomware attack with a solution that
helps you protect against, detect, and recover from attacks quickly. Learn more
about our ransomware resiliency strategy.

Download the data sheet

Brief: Trust Nothing, Verify Everything

TRUST NOTHING, VERIFY EVERYTHING

Zero Trust ensures that only verified individuals, systems, and processes have
access to the parts of the network that they need. In addition to guarding
against ransomware, it helps businesses develop a secure infrastructure of
improved protection that can thwart future attacks.

Download the white paper

Without Veritas


CHAOS REIGNS

Operations have ceased, a ransom demand has been issued, and everyone is
consumed by stress. Frantic, you try to identify which data and applications
have been affected, but you don’t have the right tools. It won’t be long before
regulatory and compliance issues are triggered.

MON 2:30 PM
With Veritas


GOOD NIGHT RANSOMWARE!

Ransomware thwarted and data restored, you are fully operational. Thanks to your
robust cyber security response plan, you were able to quickly identify the risk
and recover quickly using an unaffected backup image. You deserve that hot bath
and a good night’s sleep.



Without Veritas


PRESSURE TO PAY.

A sensitive document is posted online, which has customers worried and
management on their heels. The pressure to pay the ransom is high. Meanwhile,
with numerous cloud-hosted apps down, you are being confronted by frustrated
employees who want answers and support.

Read Paying Doesn't Mean Power
< Back to Timeline


PAYING DOESN'T MEAN POWER.


A PAYOUT IS RARELY THE WAY OUT.

Organizations are getting better at post-attack data recovery. As ransomware has
become more prevalent, organizations have improved their ability to restore
operations in the aftermath of an attack. Of all organizations hit by ransomware
in 2021, almost all, 99%, were able to recover some encrypted data. This is up
slightly from 96% in 2020.

And of these organizations, almost half (44%) report using multiple restoration
approaches to maximize the speed and efficacy with which they restart
operations. While encrypted backups was the number one method used by 73% of
impacted organizations, 46% reported that they paid the ransom to restore data.

Notably, while “The State of Ransomware 2022” Sophos survey indicates that
paying the ransom almost always results in recovering some data, the percentage
of data restored after paying has dropped to 61%, down from 65% in 2020.
Similarly, only 4% of those that paid the ransom got ALL their data back in
2021, down from 8% in 2020.

46

Paid ransom and got some of their data back

61

Data restored after paying ransom

4

Paid ransom and restored ALL of their data

Veritas helps minimize how much data a hacker can access prior to being
detected. We do this in two ways, first we encrypt the data so that whatever is
exfiltrated is not usable and, secondly, by backing up the data often, we
accelerate how quickly business operations can get up and running.


DON'T TAKE OUR WORD FOR IT:

ESG validated 12 test scenarios covering the Veritas solution for cybersecurity,
including protecting data, detecting threats, and recovering at scale. A
holistic, multi-layered, and comprehensive cybersecurity strategy is always the
best defense against downtime and data loss due to malware infiltration. Veritas
understands that this can be a complex challenge and has delivered an enterprise
foundation to help organizations protect IT services as part of an overall
cybersecurity strategy. The Veritas cybersecurity strategy provides
organizations with the tools, functionality, and confidence that IT services
will be highly available, resilient, and protected from ransomware.

Read the ESG Technical Validation

 

Source: “The State of Ransomware 2022,” Sophos, April 27, 2022.

MON 9:30 PM
With Veritas


A NEW DAY.

Battle-tested and energized, you and the IT teams are conducting a post-incident
review. Areas of improvement are identified and discussed; test scenarios are
updated. You’re feeling confident—when the next attack comes, and it will,
you’ll be ready.

White Paper: Best Practices to Combat Ransomware

BEST PRACTICES TO COMBAT RANSOMWARE

Ransomware is scary. But there are steps you can take now to avoid becoming a
target, while also reducing the potential damage an attack could have on your
business.

Download the white paper

Without Veritas


YOU'VE HAD ENOUGH, BUT HAVE THEY?

The VP of Operations requests that you and the CTO determine how this breach
occurred and formulate a plan for remediation. Unfortunately, with little to no
forensics, zero-day is unknown, forcing the organization to recover from
one-month old backups.

TUE 9:00 AM
With Veritas


PRACTICE MAKES PERFECT.

Coming on the heels of the attack, your invitations to the next recovery
rehearsal are readily accepted across the organization. Everyone better
appreciates the importance of these exercises and is eager to put all the recent
learnings into practice.

White Paper: Preparing to Protect the Future

PREPARING TO PROTECT THE FUTURE

Data protection and recovery isn't a race that your company has to win; it's a
journey that is embarked upon that with a forward-thinking attitude you can stay
ahead of the curve and remain prepared for potential challenges along the way.

Download the white paper

Without Veritas


YOU'VE LOST THE BATTLE AND THE WAR.

Another sensitive file is posted online, operations are frozen, data
infrastructure is corrupted, and malware is still on the loose. There’s no
leverage and little hope of recovering the data. With the tough questions left
unanswered, you’ve been asked to step aside. Hey, someone had to take the fall.

Read Make A Bad Day Better
< Back to Timeline


MAKE A BAD DAY BETTER.


THE AFTERMATH OF A BREACH CAN BE MORE ABOUT HOW YOU'VE HANDLED IT THAN THE
ATTACK ITSELF.

Capital One suffered a data breach in 2019 involving 100 million customers in
the US and Canada. It issued a statement confirming the liability costs of
managing the incident would be around $100-150 million to pay for “customer
notifications, credit monitoring, technology costs, and legal support.”

Just as damaging however was the immediate 6% drop in the stock price which was
attributed to reputational damage. Soon after the breach, one analyst said:
“This headline is not a good one for Capital One. We worry about longer term
reputational damage and also the potential for political and regulatory actions,
including penalties.”¹

The longer-term impact on reputation can also be a major factor. According to
Aon and Pentland Analytics’ report Reputation Risk in the Cyber Age², the impact
of cyberattacks on shareholder value can be substantial with some companies in
the report showing a fall of 25% in their market value over the year following
an attack.


KEEP YOUR CUSTOMERS HAPPY.

It’s not only shareholder value that is of concern – it’s also customer
perception. The high-profile cyberattack in 2018 of telecommunications firm
TalkTalk resulted in the hacking of the personal details of over 150,000
customers. In addition to the immediate cost of dealing with the incident, the
company lost over 100,000 customers (as well as over one-third of its company
value)³. Damage of this magnitude can be difficult, if not impossible, to
repair.

Creating perceptions of honesty and transparency are essential to retaining
customers and avoiding a short-term reputational hit that transforms into a
long-term reputational disaster.

At Veritas, we recommend prioritizing backup and recovery as a reliable part of
a comprehensive, multilayered resiliency framework— a part that supports the
protect, detect, and recover components of your organization’s overall
cybersecurity strategy. Our solutions help you fortify all critical and valuable
data, detect potential ransomware threats and ensure orchestrated and automated
recovery, so you are up and running quickly.



1 “Capital One shares dive after data breach affecting 100 million,” CNBC, July
30, 2022.
2 “Reputation Risk in the Cyber Age,” Aon and Pentland Analytics, July 18, 2018.
3 Ibid.

TUE 10:00 AM


IT’S A DANGEROUS WORLD FOR ENTERPRISE DATA. ARE YOU RANSOMWARE-READY?


ANSWER 4 SIMPLE QUESTIONS TO DETERMINE HOW PREPARED YOU ARE TO HANDLE A
CYBERSECURITY ATTACK.

Take the Assessment
Veritas 360 Defense
|
Launch Announcement
Learn More