Business Continuity Management / Disaster Recovery , Data Loss Prevention (DLP) , Endpoint Security

Backing Up Data: How to Prepare for Disaster

Peter Marelas of Dell Technologies Says Don't Take Backups for Granted
Peter Marelas, CTO, data protection solutions, APJ, Dell Technologies

If an organization fails to stop ransomware, how does it recover that data? Backups are essential, of course, but not all backup strategies are equal.

Many organizations take their backup environments for granted, thinking those will save them, says Peter Marelas, CTO for Data Protection Solutions, APJ, for Dell Technologies. But that’s increasingly not the case.

“The adversaries have realized that they actually need to go and compromise those backup copies as well,” Marelas says. “That’s kind of unexpected for many.”

Marelas says enterprises need to ensure they’re not complacent about backups when plotting their incident response plan. “The thing that runs businesses today is the data,” he says. “Without that data, business stop functioning.”

In this video interview preview of a virtual executive roundtable with Information Security Media Group, Marelas discusses:

  • Why organizations need to invest in recovery plans;
  • Why backups of backups are needed in case malware has also reached that environment;
  • How to limit the attack surface of backup data.

Marelas is CTO of data protection solutions, APJ, for Dell Technologies. He previously was principal systems engineer for EMC, lead storage architect for Telstra and lead technical architect for Symantec.


About the Author

Jeremy Kirk

Jeremy Kirk

Executive Editor, Security and Technology, ISMG

Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.