Does your File Storage have Ransomware Attack Protection?

Ransomware. It’s a top-of-mind topic in every organization today and rightfully so. Recent market studies indicate that a staggering 85% of organizations have experienced a ransomware attack. Why is this continually growing as an issue? The Rise of Ransomware: A Growing Threat Landscape Criminals today can fleece any organization in the world, with a relatively…
What is Cloud File Storage and is it Secure?

As the world moves towards a more connected future, every aspect of doing business is evolving. For example, in the past, companies would have implemented on-premises software solutions for critical business processes that were often custom-built and resource intensive. Today however, Software-as-a-Service, or SaaS, is changing the way that companies relate to software; they can…
How to Prevent Ransomware Attacks: Best Practices for Enterprises

Ransomware attacks have been grabbing headlines recently, with the scale and frequency of such attacks only increasing. For enterprises, what are the best ways to prevent ransomware? We’ll look at this critical question and several others as we dive into ransomware attacks and the best practices in terms of how they can be prevented. Table of…
CTERA and Backblaze Partner to Deliver Top Enterprise Cloud Solution

Last week an announcement was made about CTERA’s partnership with BackBlaze, a leading storage cloud platform, to deliver a fast, simple, cost-effective solution that is ideally suited to replace aging on-premises NAS devices. With the joint solution, our customers can eliminate the many tedious tasks, costs, and hardware traditionally required to manage file servers, backup,…
Supply Chain Attacks: What They Are and How to Avoid Them

What are supply chain attacks? Supply chain attacks to damage victim organizations by targeting less secure elements in their supply chain; for example, by injecting a trojan horse in a software or hardware component that is produced by one of their suppliers. Once within the target organizations’ network, the trojan often pivots, spreading laterally to…
Your Guide to NAS Ransomware Protection

It was only a matter of time before ransomware attackers started targeting NAS devices, popular edge appliances used by enterprises and consumers alike for critical file and backup storage. The NAS attacks began in June 2019 and focused mostly on QNAP devices, and then shifted gears toward Synology appliances in July, targeting a flaw in…
Protect Data from Ransomware with Edge-to-Cloud Strategy

Defining Ransomware in the Cloud Ransomware in the cloud refers to ransomware attacks that target organizations’ cloud-based resources. Such attacks seek to compromise cloud services, applications, and storage systems, including servers, databases, file storage, and others. If attackers are successful, they can render cloud-based resources inaccessible, potentially causing major interruption or even shutting an organization…