Page 106 - Cyber Defense eMagazine September 2022
P. 106

— either by being stored on removable drives, protected in hardened repositories, secured with end-to-
            end encryption or safeguarded by ransomware remediation capabilities.

            Without full visibility into the software supply chain, it may be difficult to identify vulnerabilities. While
            efforts to secure the software supply chain are ongoing, having an expansive data protection strategy
            across on-prem, in the cloud and within other software-based systems is a critical failsafe and therefore
            the most comprehensive form of protection.

            Zero  trust  remains  an  important  strategy  in  helping  defeat  potential  cyberattacks,  but  it  is  only  one
            strategy to be deployed against increasingly sophisticated adversaries. To help ensure that government
            is resilient in the face of such threats, it is imperative that it has at its bedrock a strong data protection
            strategy.





            About the Author

                                                Rick Vanover  is  an  expert  in  intelligent  data  management  and
                                                backup. In his role at Veeam, Rick sits at the crossroads of many
                                                types of storage. Whether it is storage systems, critical application
                                                data,  data  in  the  cloud  or  data  anywhere  in  between, Rick has
                                                experience  in  the  data  management  practice  as  IT  practices
                                                change     with   new    technologies.   Follow Rick on   Twitter
                                                @RickVanover.





































            Cyber Defense eMagazine – September 2022 Edition                                                                                                                                                                                                         106
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   101   102   103   104   105   106   107   108   109   110   111