Story image

What disaster recovery will look like in 2019

Disaster recovery is undeniably an essential part of modern business planning, as it can make or break a business when something goes wrong. DRaaS provider Zerto recently announced their predictions for the market in 2019.

According to Zerto A/NZ country manager, Sean Abbott organisations will have to rethink their strategy.

1. Converging infrastructure

Abbott says, “In 2019 organisations will rethink what converged solutions mean. As IT professionals increasingly look for out-of-the-box ready solutions to simplify operations, technology vendors work together to bring more vendor-agnostic, comprehensive converged systems to market.”

2. Hybrid Cloud

He continues, “In 2018, we saw organisations dreaming about making new services “born in the cloud”, but facing challenges getting the data there with minimal disruption. In 2019, we’ll see more business begin to make this dream a reality.”

Protecting workloads once they’re in a public or multi-cloud environment can often be a big challenge. There’s also the misconception that once your data is out there, it’s already safe, and the platform won’t go down. 

However, this isn’t the case. Businesses need to actively protect and monitor data wherever it is and understand what role mobility can play in this. As workload needs change, businesses need to make sure they have a way to move data to, from and between different infrastructures without interruption, to ensure the organisation is able to seamlessly adapt and protect itself.

It is important not to make downtime vulnerability an ‘acceptable’ risk, in order to focus on continuous development, speed and performance. 

3. Backup

Abbott says, “With nearly half of all businesses experiencing an unrecoverable data event in the last three years, current backup solutions are no longer fit for purpose. However, preventing data loss requires constant, second by second backup.

“The big challenge for backup vendors is how to minimise the impact such frequent backups can have on production. The race is still on to find a way to eliminate the impact entirely.”

To overcome this, the fundamentals of backup are supposedly going to have to change. In 2019, whether businesses want to roll back seven seconds, or seven days, their backup system should let them do this quickly and easily – minimising the disruption of data loss from any cause.

4. Ransomware

Abbott concludes, “In 2019 we can expect ransomware attacks to get bigger and more dangerous and it’s crucial that businesses don’t let this overwhelm them, but continue to do everything they can to prepare. 

“If as much time went into ransomware protection and recovery as people spend talking about the dangers of attacks, businesses would find themselves much better prepared overall!”

To stay protected and competitive, organisations need to focus on remaining ‘always on’ – weathering the disruption and getting back online within seconds. 

Reliable data availability will allow businesses to breathe easy and let concerns about ransomware take a back seat to a more positive focus on digital transformation.

Attacks targeting Cisco Webex extension explode in popularity - WatchGuard
WatchGuard's Internet Security Report for Q4 2018 also finds growing use of a new sextortion phishing malware customised to individual victims.
Developing APAC countries most vulnerable to malware - Microsoft
“As cyberattacks continue to increase in frequency and sophistication, understanding prevalent cyberthreats and how to limit their impact has become an imperative.”
Worldwide spending on security to reach $103.1bil in 2019 - IDC
Managed security services will be the largest technology category in 2019.
Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.