Data resiliency in the face of ransomware
Backups on their own are not enough


Businesses with an online presence have to deal with the constant threat of cyber attacks, and ransomware stands out as one of the most disruptive threats a company can face.
The malware costs an average of $4 million to remedy, and while it can be detected or tackled with the right tools and backups, neither are silver bullets.
Cyber criminals want to get at sensitive data, and they’re ramping up their efforts. Check Point Research has found that weekly cyber attacks reached a two-year high last quarter at an average of 1,258 attacks per organization, per week.
In this episode, Rory and Jane are joined by Denis Kennelly, general manager of IBM storage, to unravel the importance of a proper cyber resilience strategy, data backups, and tackling ransomware head-on.
Highlights
“The key point I want to make is, you’ve really got to start thinking about that business risk in a more a planned way. To really think about, “what am I going to do in each of those phases?” Because it comes back to the point I am saying: hope is not a method. Hoping the breach won't happen is one approach, right, but it's not a very good approach.”
RELATED RESOURCE
Learn about the business and personal implications of ransomware, as well as how organizations are defending against attacks today.
“You’ve got to think that what you're dealing with here is engineered for maximum impact, you really can’t trust any data set anywhere, right? Because the chances of it being infected are extremely high. And in fact, I think in this another IDC stat, in terms of backup corruption 17% of ransomware attacks actually corrupt the backup itself.”
“Traditionally, we all assume once you have a backup it’s good. In the current climate, you can’tt assume that at all, so you have to make sure everything is 100% scanned for ransomware infection. And then as you start to recover, you have to make sure you have a what I call a virtual cleanroom environment for everything that you're recovering back into including things like network connections.”
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Footnotes
- What is ransomware?
- What is cloud ransomware and how can you avoid attacks?
- Weekly cyber attacks reach two-year high amid ransomware resurgence
- Ransomware profits reach "staggering" levels as businesses fail to implement MFA properly
- The rise of double extortion ransomware
- Business email compromise attack costs far exceeding ransomware losses
- Cyber attacks on UK organisations surged 77% in 2022, new research finds
Subscribe
- Subscribe to The IT Pro Podcast on Apple Podcasts
- Subscribe to The IT Pro Podcast on Google Podcasts
- Subscribe to The IT Pro Podcast on Spotify
- Subscribe to the IT Pro newsletter
- Subscribe to IT Pro 20/20

Rory Bathgate is Features and Multimedia Editor at ITPro, overseeing all in-depth content and case studies. He can also be found co-hosting the ITPro Podcast with Jane McCallion, swapping a keyboard for a microphone to discuss the latest learnings with thought leaders from across the tech sector.
In his free time, Rory enjoys photography, video editing, and good science fiction. After graduating from the University of Kent with a BA in English and American Literature, Rory undertook an MA in Eighteenth-Century Studies at King’s College London. He joined ITPro in 2022 as a graduate, following four years in student journalism. You can contact Rory at rory.bathgate@futurenet.com or on LinkedIn.
-
Podcast Transcript: Are reasoning models fundamentally flawed?
ITPro Podcast A report from Apple has cast significant doubts on the efficacy of reasoning models, going as far as to suggest that when a problem is too complex, they simply give up
-
Are reasoning models fundamentally flawed?
ITPro Podcast A report from Apple has cast significant doubts on the efficacy of reasoning models, going as far as to suggest that when a problem is too complex, they simply give up
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
April rundown: MITRE frights and Microsoft launches Recall (again)
ITPro Podcast As CISA delivered an eleventh-hour reprieve for the CVE database, AWS reportedly began to pause some data center leases
-
The new era of cyber threats
ITPro Podcast With AI-powered attacks and state-backed groups, security teams face face a new wave of sophisticated threats
-
Supply chain scares and Google’s AI code
ITPro Podcast As the ransomware attack on Blue Yonder disrupts a wide range of firms, Google moves to lead by example on internal AI code
-
Halloween special: Cybersecurity horror stories
Podcast Join us for three terrifying tales sure to chill any IT professional to the core
-
Securing your business with education and training
ITPro Podcast Keeping your workforce updated on the latest threats requires a cohesive cyber skills strategy
-
Cracking open insider threats
ITPro Podcast Leaders need to perform strict identity measures on would-be hires – and ensure employees who leave have access promptly removed
-
Protecting the public sector from hackers
ITPro Podcast With the public sector facing increasingly sophisticated threat actors, leaders need centralized security plans and better communication