Data resiliency in the face of ransomware
Backups on their own are not enough
Businesses with an online presence have to deal with the constant threat of cyber attacks, and ransomware stands out as one of the most disruptive threats a company can face.
The malware costs an average of $4 million to remedy, and while it can be detected or tackled with the right tools and backups, neither are silver bullets.
Cyber criminals want to get at sensitive data, and they’re ramping up their efforts. Check Point Research has found that weekly cyber attacks reached a two-year high last quarter at an average of 1,258 attacks per organization, per week.
In this episode, Rory and Jane are joined by Denis Kennelly, general manager of IBM storage, to unravel the importance of a proper cyber resilience strategy, data backups, and tackling ransomware head-on.
Highlights
“The key point I want to make is, you’ve really got to start thinking about that business risk in a more a planned way. To really think about, “what am I going to do in each of those phases?” Because it comes back to the point I am saying: hope is not a method. Hoping the breach won't happen is one approach, right, but it's not a very good approach.”
RELATED RESOURCE
 
Learn about the business and personal implications of ransomware, as well as how organizations are defending against attacks today.
“You’ve got to think that what you're dealing with here is engineered for maximum impact, you really can’t trust any data set anywhere, right? Because the chances of it being infected are extremely high. And in fact, I think in this another IDC stat, in terms of backup corruption 17% of ransomware attacks actually corrupt the backup itself.”
“Traditionally, we all assume once you have a backup it’s good. In the current climate, you can’tt assume that at all, so you have to make sure everything is 100% scanned for ransomware infection. And then as you start to recover, you have to make sure you have a what I call a virtual cleanroom environment for everything that you're recovering back into including things like network connections.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Footnotes
- What is ransomware?
 - What is cloud ransomware and how can you avoid attacks?
 - Weekly cyber attacks reach two-year high amid ransomware resurgence
 - Ransomware profits reach "staggering" levels as businesses fail to implement MFA properly
 - The rise of double extortion ransomware
 - Business email compromise attack costs far exceeding ransomware losses
 - Cyber attacks on UK organisations surged 77% in 2022, new research finds
 
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
 - Subscribe to The IT Pro Podcast on Google Podcasts
 - Subscribe to The IT Pro Podcast on Spotify
 - Subscribe to the IT Pro newsletter
 - Subscribe to IT Pro 20/20
 

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
- 
Tired of legal AI tools that overpromise but underdeliver? The secret to success is in your firm’s dataSponsored Don't let legal AI tools overpromise and underdeliver: the secret to success isn't the software, but building a secure, stable, and connected data foundation that transforms your firm's complex, siloed information into structured knowledge.
 - 
Cisco wants to take AI closer to the edgeNews The new “integrated computing platform” from Cisco aims to support AI workloads at the edge
 
- 
Getting a grip on digital identityITPro Podcast As AI agent adoption explodes, security leaders will need better identity controls than ever before
 - 
Let’s talk about digital sovereigntyIn the age of AI and cloud, where data resides is a key consideration
 - 
Can cyber group takedowns last?ITPro Podcast Threat groups can recover from website takeovers or rebrand for new activity – but each successful sting provides researchers with valuable data
 - 
July rundown: Salt Typhoon and SharePoint scaresITPro Podcast US public sector organizations are under serious threat from the state-backed hacking group
 - 
Can the UK ban ransomware payments?ITPro Podcast Attempts to cut off ransomware group profits could instead harm businesses
 - 
We need to talk about operational technologyITPro Podcast Groups like Volt Typhoon are abusing poor hygiene in critical infrastructure to pre-position for attacks
 - 
RSAC Conference 2025: The front line of cyber innovationITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
 - 
April rundown: MITRE frights and Microsoft launches Recall (again)ITPro Podcast As CISA delivered an eleventh-hour reprieve for the CVE database, AWS reportedly began to pause some data center leases