Page 106 - Cyber Defense eMagazine September 2022
P. 106
— either by being stored on removable drives, protected in hardened repositories, secured with end-to-
end encryption or safeguarded by ransomware remediation capabilities.
Without full visibility into the software supply chain, it may be difficult to identify vulnerabilities. While
efforts to secure the software supply chain are ongoing, having an expansive data protection strategy
across on-prem, in the cloud and within other software-based systems is a critical failsafe and therefore
the most comprehensive form of protection.
Zero trust remains an important strategy in helping defeat potential cyberattacks, but it is only one
strategy to be deployed against increasingly sophisticated adversaries. To help ensure that government
is resilient in the face of such threats, it is imperative that it has at its bedrock a strong data protection
strategy.
About the Author
Rick Vanover is an expert in intelligent data management and
backup. In his role at Veeam, Rick sits at the crossroads of many
types of storage. Whether it is storage systems, critical application
data, data in the cloud or data anywhere in between, Rick has
experience in the data management practice as IT practices
change with new technologies. Follow Rick on Twitter
@RickVanover.
Cyber Defense eMagazine – September 2022 Edition 106
Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.