Cohesity Research Reveals that Reliance on Legacy Technology Is Undermining How Organizations Respond to Ransomware
Nearly half of respondents say their company relies on outdated backup and recovery infrastructure — in some cases dating back to the 1990s, before today's sophisticated cyberattacks.
August 30, 2022
PRESS RELEASE
SAN JOSE, Calif. Aug. 29, 2022 (BUSINESS WIRE) — New global research commissioned by Cohesity, a leader in next-gen data management, reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. In some cases, this technology is more than 20 years old, and was designed long before today’s multicloud era and onslaught of sophisticated cyberattacks plaguing enterprises globally.
“In this survey, we found nearly 100 respondents who said their organizations are relying on outdated data infrastructure, and this raises the question, how many other businesses are in the same situation around the world?”
Challenges pertaining to outdated infrastructure could easily be compounded by the fact that many IT and security teams don’t seem to have a plan in place to mobilize if and when a cyberattack occurs. Nearly 60% of respondents* expressed some level of concern that their IT and security teams would be able to mobilize efficiently to respond to an attack.
These are just some of the findings from an April 2022 survey, conducted by Censuswide, of more than 2,000 IT and SecOps professionals (split nearly 50/50 between the two groups) in the United States, the United Kingdom, Australia, and New Zealand. All respondents play a role in the decision-making process for IT or security within their organizations.
“IT and security teams should raise the alarm bell if their organization continues to use antiquated technology to manage and secure their most critical digital asset – their data,” said Brian Spanswick, chief information security officer, Cohesity. “Cyber criminals are actively preying on this outdated infrastructure, as they know it was not built for today’s dispersed, multicloud environments, nor was it built to help companies protect and rapidly recover from sophisticated cyberattacks.”
Backup and Recovery Infrastructure That Could Be Considered Archaic
Forty-six percent of respondents said that their organization relies on primary backup and recovery infrastructure that was designed in, or before, 2010. Nearly 100 respondents (94 out of 2011) revealed that their organization relies on backup and recovery infrastructure that was built before the new millennium — in the 1990s.
Enterprises are utilizing this legacy technology despite the fact that managing and securing data environments has become much more complex, not just because of the exponential growth in structured and unstructured data, but because of the vast array of locations where that data is stored. Forty-one percent of respondents stated that they store data on-premises, 43% rely on public cloud storage, 53% utilize a private cloud, and 44% have adopted a hybrid model (some respondents are using more than one option).
“In 2022, the fact that any organization is using technology to manage their data that was designed in the 1990s is frightening, given that data can be compromised, exfiltrated, held hostage, and it can create massive compliance issues for organizations,” said Spanswick. “In this survey, we found nearly 100 respondents who said their organizations are relying on outdated data infrastructure, and this raises the question, how many other businesses are in the same situation around the world?”
What Keeps IT and SecOps Teams Up at Night
Respondents highlighted what they believe would be their biggest barriers to getting their organization back up and running after a successful ransomware attack. The findings are as follows (respondents were asked to check all that apply):
integration between IT and security systems (41%)
lack of coordination between IT and Security (38%)
lack of an automated disaster recovery system (34%)
antiquated backup and recovery systems (32%)
lack of a recent, clean, immutable copy of data (32%)
lack of and timely detailed alerts (31%)
With respect to the lack of coordination between IT and security, this coincides with other findings from this survey, denoting that a gap often exists between IT and SecOps that puts businesses and security postures at risk. For more on that, click here.
What Do Survey Respondents Want Management to Prioritize?
Respondents revealed that modernizing data management, protection, and recovery capabilities, in addition to increasing collaboration between IT and SecOps, offers a path to strengthening their organizations’ security postures and multicloud operations. The top five “must have'' measures that respondents would ask management for in 2022 are:
1. Integration between modern data management and security platforms and AI-powered anomalous data access alerts to provide early warning of attacks in progress (34%)
2. Extensible platform for third-party applications for security operations and incident response (33%)
3. Automated disaster recovery of systems and data (33%)
4. Upgrading from legacy backup and recovery systems (32%)
5. Rapid, organizationwide backup with in-transit data encryption (30%)
“Both IT decision-makers and SecOps should co-own the cyber-resilience outcomes, and this includes an evaluation of all infrastructure used in accordance with the NIST framework for data identification, protection, detection, response, and recovery. Also, both teams need to have a comprehensive understanding of the potential attack surface,” said Spanswick. “Next-gen data management platforms can close the technology gap, improve data visibility, help IT and SecOps teams sleep better at night, and stay one step ahead of bad actors who take great delight in exfiltrating data from legacy systems that can’t be recovered.”
For more information:
To learn more about Cohesity Data Security, click here.
To learn more about Cohesity Ransomware Recovery, click here.
To learn more about Cohesity Threat Defense, click here.
To learn more about next-gen data management, click here.
[*] When asked “If a ransomware attack occurred today, how confident, if at all, are you/would you be that your IT and Security teams would be able to mobilize efficiently to respond to the attack,” 60% applies to respondents who said ‘Somewhat confident’, ‘Not very confident’, and ‘Not at all confident’.
About Cohesity
Cohesity radically simplifies data management. We make it easy to protect, manage, and derive value from data — across the data center, edge, and cloud. We offer a full suite of services consolidated on one multicloud data platform: backup and recovery, disaster recovery, file and object services, dev/test, and data compliance, security, and analytics — reducing complexity and eliminating mass data fragmentation. Cohesity can be delivered as a service, self-managed, or provided by a Cohesity-powered partner.
© 2022 Cohesity, Inc. All rights reserved. Cohesity, the Cohesity logo, Helios, and other Cohesity marks are trademarks or registered trademarks of Cohesity, Inc. in the U.S. and/or internationally. Other company and product names may be trademarks of the respective companies with which they are associated.
You May Also Like
Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024The Unreasonable Effectiveness of Inside Out Attack Surface Management
Dec 4, 2024