banner-why-daymark.jpg

Information Technology Navigator

Tips, Advice & Insights from Technology Pros

Sean Gilbride

Recent Posts

Portworx: A Kubernetes Gold Standard

Pure Storage Portworx has established itself as the gold standard for cloud-native Kubernetes data storage, offering scalable persistent storage, multi-cloud data mobility and zero RPO data protection and disaster recovery. At Daymark, we have been impressed with Portworx and view it as being in a class of its own when compared to other suppliers of storage for Kubernetes-orchestrated container apps. Once you transition from development to production with Kubernetes, persistent storage and enterprise data services become critical components of your Kubernetes environment.

A recent report by research house GigaOm concurs, recognizing Portworx as an “Outperformer” — the only product with that designation in the report. The GigaOm Radar for Kubernetes Data Storage Report reviewed nine vendors in the Kubernetes data storage space, down from twenty-two vendors in 2021.

Read More
Wed, Jul 24, 2024
Share:   

5 Ways to Increase Your Ransomware Resilience

 

The risk of a ransomware attack continues to increase at a frightening triple-digit annual growth rate. How bad is it? Bad, really bad. Businesses based in the U.S. face an 80% chance of an attack, compared to 31% chance in EMEA and 9% in the Asia-Pack region. As the attackers’ sophistication increases and cybergangs are forming, it is important to understand what the attackers are going after and how to increase your ransomware resilience.

 

Ransomware Demand and Payment Trends

  •  In 2022, companies with $10 million in revenue or less had an average payout of $690,9961
  • Large enterprises (revenue of $5 billion plus) took a bigger hit, with an average $2,464,3392 ransom payout
  • Recent ransom demands have been as high as $30 million with payouts that have exceeded $8 million
  • Threat actors are increasingly focused on extortion techniques—often layering them on top of each other
  • Harassment is another extortion tactic being used in more ransomware cases. Ransomware threat actor groups will target specific individuals in the organization, often in the C-suite, with threats and unwanted communications3
  • Cybercriminals threatened to leak stolen data in about 70% of ransomware cases involving negotiation in late 20224
  • The United States is still the most severely impacted, accounting for 42% of the observed leaks in 20225
  • As of late 2022, threat actors engaged in data theft in about 70% of cases compared to 40% in mid-20216 

Don’t Count on the Government for Help

Read More
Thu, Oct 26, 2023
Share:   

Cyber Recovery Meets Cyber Posture

Ensuring cybersecurity for an enterprise is a job that is never done. It’s a challenge that requires constant vigilance and, in recent years, has been exacerbated by low visibility into highly distributed and dynamic cloud data spread across increasingly fragmented environments. Our trusted cybersecurity partner, Rubrik, has taken another step to enhance cyber security by acquiring Laminar, a leading data security posture management (DSPM) platform. It’s a strategic move that results in Rubrik’s ability to offer customers a complete cyber resilience offering that reduces weaknesses in an organization’s security strategy.

Securing cloud data is different from securing your infrastructure. Businesses have innovated the way they use cloud data, but not the way they secure it. Not only do you need a data-centric tool for the job, you also need an agile, cloud-based approach to keep up with the dramatic expansion and replication of data manipulated by developers and data scientists so that they can leverage data for innovation without increasing exposure or data protection risks.

Read More
Wed, Sep 06, 2023
Share:   

Increase Your Ransomware Resilience

The risk of a ransomware attack continues to increase at a frightening triple-digit annual growth rate. How bad is it? Bad, really bad. Businesses based in the U.S. face a 60% chance of an attack, compared to 31% chance in EMEA and 9% in the Asia-Pack region. As the attackers’ sophistication increases and cybergangs are forming, it is important to understand what the attackers are going after and how to increase your ransomware resilience.

Ransomware Demand and Payment Trends

Read More
Thu, Nov 10, 2022
Share:   

What’s Holding You Back from the Cloud?

What’s holding you back from the cloud? For many organizations it’s the need for a new set of operational knowledge for IT staff. Cloud solutions can alleviate many of the operational aspects of maintaining infrastructure, but can also bring many of the same traditional requirements for designing connectivity, data availability, performance, and security. This knowledge requirement is exacerbated in hybrid-cloud models where one set of operational tools is maintained on-premises, while another set is required in the cloud. For IT teams who are already stretched thin, these challenges can lead to stalled adoption, increased costs, and other difficulties.

4 Key Hybrid Cloud Operational Challenges

Read More
Wed, Jun 29, 2022
Share:   

Key Takeaways on Infinidat InfiniGuard

On February 9, 2020, Infinidat rolled out some major enhancements to its InfiniGuard enterprise data protection platform. The announcement themes revolved around enhanced data protection, faster recovery and overall cyber resilience.

Here are some key takeaways and features worth noting:

Read More
Tue, Feb 15, 2022
Share:   

Data Protection, The Last Line of Defense Against Ransomware

Ransomware has rapidly become the single largest cyber threat we face today and if the first half of 2021 was any indication, things are only going to get worse. Colonial Pipeline, Kia Motors, JBS Foods, Kaseya and CNA Financial have been some of the more notable, high-profile attacks this year. In the case of the Colonial Pipeline, the attack impacted over a dozen U.S. states and cost the company $5 million. Colonial Pipeline was able to recover ~$2.3M of the ransom, but that is often not the case. CNA Financial was not as fortunate and needed to pay an estimated $40 million to retrieve the encryption keys for their data. And ransom from the Kaseya attack, which impacted an estimated 800 to 1,500 businesses, is said to be in the range of $70M which would make it the largest ransom ever paid (should Kaseya decide to pay).

Read More
Thu, Aug 19, 2021
Share:   

Storage Implications of SIEM

Every IT professional already knows that the proliferation of log files generated by Security Information and Event Management (SIEM) solutions can be overwhelming to manage. There are multiple SIEM tools that analyze and automate this tremendous amount of data to provide alerts that help troubleshoot network issues, quickly remediate threats, and identify potential non-compliance vulnerabilities.

Read More
Thu, Mar 19, 2020
Share:   

Is a Data Center Assessment in Your Future?

“Do more with less” has become the mantra folks in IT have come to live by. It is the reality we live with every day. We must be as efficient and effective as possible to be able to compete in today’s market. We must find a way to be viewed as an innovation center, and not a cost center to the business.

How we go about enabling the enterprise to innovate is what sets us apart. It all starts with a good plan and to have a good plan, you must understand the strengths and more importantly, the weaknesses in your IT environment.

Read More
Thu, Oct 08, 2015
Share:   

When is All-Flash Storage Better than Hybrid Flash?

As the cost of solid-state technology decreases and its capacity increases, flash technology has steadily been making inroads into the enterprise storage architecture, to the point where flash has become a standard component of most storage solutions. Just how much flash is necessary, however, is the question confronted by directors of infrastructure who are trying to balance cost with their companies’ needs for high performance.

Read More
Thu, Mar 26, 2015
Share: