Sponsor Content Created With Veeam
The real cost of SaaS data loss: how to avoid becoming another statistic
As cloud applications become the operational nervous system for modern enterprises, failing to protect the identity layer and SaaS workloads can cost millions
Software as a Service (SaaS) applications now sit firmly at the centre of enterprise operations. From email and collaboration to customer engagement and automated workflows, cloud platforms remove friction and accelerate business agility. According to Gartner’s 2026 forecasts, worldwide software spending is projected to reach a staggering $1.43 trillion this year, with global SaaS investments expected to top $576 billion by 2029, according to Forrester.
However, this profound dependence is accompanied by a dangerous misconception. Many IT leaders and cloud architects assume their SaaS providers handle comprehensive data protection by default. In reality, these platforms prioritize uptime and availability, operating under a shared responsibility model where the customer remains solely responsible for their data.
Without the right architecture, technical debt and complex interdependencies can leave organizations exposed. Today, SaaS data is far more vulnerable than many businesses realize, and the mechanisms of compromise are evolving rapidly.
The identity layer becomes the new centre of gravity
Ransomware and extortion tactics have shifted dramatically, moving away from opportunistic endpoint malware toward highly coordinated strikes on the systems that offer the most leverage: identity providers.
As researchers at Veeam note in their latest SaaS data protection report, 6 Reasons to Protect Your SaaS Data: “Ransomware’s centre of gravity has shifted. Control of identity — and the chain of systems it unlocks — now determines the scope, speed, and impact of modern attacks.”
This evolution is starkly illustrated in recent threat intelligence from Coveware by Veeam. According to its late-2025 data, high-volume ransomware groups like Akira and Qilin accounted for roughly 65% of observed attacks. At the same time, the economics of extortion are weakening. With average ransom payments dropping 66% throughout 2025, and only 23% of victims paying anything at all, attackers are now ruthlessly targeting trusted access layers to maximize disruption.
For identity and access management (IAM) professionals, this is a critical turning point. Remote access compromise now represents more than half of all major incidents. Once an attacker gains a foothold through Microsoft Entra ID or a similar platform, the traditional security perimeter loses relevance. Threat actors can enumerate identity relationships, escalate privileges, and move laterally across Microsoft 365, Salesforce, and other interconnected SaaS environments.
The operational impact extends far beyond traditional data encryption. Malicious actors can modify or revoke permissions, dismantle Microsoft Teams structures, delete SharePoint sites, and corrupt automation workflows at scale. Because identity connects HR systems, financial applications, and custom integrations, a single compromised credential can transform a localized technical failure into an organization-wide outage.
The financial and operational toll of downtime
When disaster strikes a SaaS environment, continuity is measured in minutes. The financial impact of data loss rarely stems from a single missing file; the real cost appears when normal operations slow to a halt.
According to IBM’s latest Cost of a Data Breach report, incidents involving data distributed across multiple environments, such as public clouds, private clouds, and on-premises systems, are incredibly complex to contain, costing an average of $5.05 million. The bulk of this cost comes from the gruelling recovery process itself, the hours or weeks required to revalidate data, rebuild configurations, and confirm the integrity of cloud environments.
Regulatory pressure is also fundamentally changing the calculus for IT directors and CISOs. Mandates like NIS2, the Digital Operational Resilience Act (DORA), and updated SEC reporting rules all demand demonstrable cyber resilience. If an attacker manipulates data using valid identity pathways, organizations must still be able to prove they can reconstruct a clean, verifiable state.
Despite these rising costs, most teams remain unequipped to restore operations at the speed modern businesses demand. As experts at Veeam point out in 6 Reasons to Protect Your SaaS Data, modern incidents require complex coordination to reconstruct identity relationships and validate data across interconnected systems. Consequently, it’s common for recovery windows to stretch into weeks, a timeline Gartner continues to highlight, resulting in disrupted revenue cycles, missed service commitments, and expanded regulatory exposure.
Why native SaaS tools fall short
A surprising number of organizations still rely solely on the native recovery options provided by their SaaS vendors. For Backup Admins and M365 App Owners, this over-reliance creates a dangerous operational gap.
Native tools are engineered for availability and scale, not for comprehensive, long-term data protection. They typically provide short retention windows, narrow restore scopes, and inconsistent coverage across diverse data types. Furthermore, because SaaS providers preserve the current state of an environment rather than historical, point-in-time versions, accidental or malicious changes can quickly become permanent.
“Integrating Backup as a Service (BaaS) is essential for safeguarding cloud workloads and maintaining operational continuity,” explains Michael Hoeck, senior director analyst at Gartner.
“Enterprises must understand the shared data responsibility model of SaaS applications and evaluate their vendors' data protection measures. If these measures are inadequate, third-party solutions should be considered to guarantee comprehensive data protection”.
If an identity system is compromised, a native recycle bin cannot rebuild the intricate hierarchy of users, permissions, and configurations. Layering manual exports or custom scripts only increases the operational load, leaving visibility fragmented and continuity plans difficult to uphold.
Building a modern SaaS resilience strategy
To effectively safeguard cloud workloads, organizations must rethink their approach to data protection. According to data protection experts at Veeam, a modern resilience strategy must treat SaaS data as core infrastructure, rather than a peripheral convenience.
As Veeam researchers point out, enterprise continuity relies on capabilities that native tools were never built to deliver. This requires third-party solutions that offer granular role-based controls, extended retention, anomaly detection, and cross-tenant visibility. Crucially, backup infrastructure must be isolated from the primary identity trust layer, ensuring that backups remain immutable even if an administrator's account is fully compromised.
An effective strategy must also address two distinct recovery scenarios. First is day-to-day operational recovery, which allows IT teams to rapidly restore missing emails, corrupted Salesforce records, or misapplied permissions with precision. Second is full-scale disaster recovery, which provides a verifiable path back from tenant-level compromise, mass deletions, and widespread identity abuse.
A forward-looking industry outlook
As SaaS portfolios expand and hybrid architectures grow more intricate, the interdependencies between applications and identities will continue to deepen. The boundaries between social engineering, help-desk manipulation, and technical exploitation have nearly disappeared, making trusted access the most viable attack vector.
For CIOs and cloud architects, the mandate is clear. Recognizing the SaaS protection gap is the critical first step. By integrating identity-aware recovery plans into their core disaster recovery strategies, organizations can ensure they maintain operational control when disruptions inevitably occur.
In a world defined by automation and tightly coupled systems, relying on default platform settings is a gamble few can afford. True resilience demands purpose-built safeguards, empowering enterprises to operate with confidence as their cloud footprint continues to expand.
For more information, download the Veeam whitepaper '6 Reasons to Protect Your SaaS Data'
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.
For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.
-
Will AI hiring entrench gender bias?ITPro Podcast Leaders need to proactive as attackers launch more consistent, sophisticated attacks
-
Met Office hails huge efficiency gains in first year of cloud supercomputing with Microsoft AzureNews In moving to the cloud, the Met Office has bolstered operational resilience and helped to deliver more accurate forecasts
