{"id":46201,"date":"2021-09-14T02:39:03","date_gmt":"2021-09-14T06:39:03","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46201"},"modified":"2021-09-14T02:39:03","modified_gmt":"2021-09-14T06:39:03","slug":"majority-of-organizations-uncertain-they-can-recover-from-a-ransomware-attack","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2021\/09\/14\/majority-of-organizations-uncertain-they-can-recover-from-a-ransomware-attack\/","title":{"rendered":"Majority of Organizations Uncertain They Can Recover from a Ransomware Attack&#8230;"},"content":{"rendered":"<p>No matter what and\/or who you employ to help protect your organization and it&#8217;s data from the pirates you have to do something.\u00a0 Otherwise the odds are against your companies survival.\u00a0 It&#8217;s that important.<\/p>\n<p><span class=\"tnt-byline\">By Dell Technologies &#8211;\u00a0<\/span>The Dell Technologies (NYSE:DELL) 2021 Global Data Protection Index (GDPI) findings reveal organizations are facing several data protection challenges driven by the constant threat of<strong> ransomware<\/strong> and the consumption of emerging technologies\u00a0such as cloud-native applications, Kubernetes containers\u00a0and artificial intelligence.<\/p>\n<p>According to a\u00a0recent IDC survey, more than one-third of organizations worldwide have experienced a <strong>ransomware<\/strong> attack or breach that blocked access to systems or data in the previous 12 months.<sup>i<\/sup>\u00a0To help address these rising \u2013 and seemingly inevitable \u2013 issues, Dell Technologies is introducing new software and services to accelerate virtual machine (VM) backup data availability, simplify management of large data sets, and maintain business continuity while alleviating dependencies on day-to-day cyber recovery operations.<\/p>\n<p>&#8220;While<strong> ransomware<\/strong> attacks can be devastating for people and businesses, accepting defeat as a foregone conclusion is not the answer,&#8221; said\u00a0<span class=\"xn-person\">Jeff Boudreau<\/span>, president and general manager, Infrastructure Solutions Group, Dell Technologies. &#8220;We understand the stakes have never been higher, and the task of protecting data has never been more complex. As the leading provider of data protection hardware and software, our portfolio addresses this growing challenge by helping customers adopt a holistic cybersecurity and data protection strategy to identify, protect, detect, respond and recover from <strong>ransomware<\/strong> and other cyberattacks.&#8221;\u00a0\u00a0<a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.inforney.com\/texas\/majority-of-organizations-uncertain-they-can-recover-from-a-ransomware-attack-says-new-dell-technologies\/article_d0461c8a-5548-50d6-8a7b-29024dee5e14.html&amp;ct=ga&amp;cd=CAEYByoUMTM0NTE1OTY2MTUwODI1NzE0OTgyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNGzVNWeElNuVmd8AyN7j3kDPmJ0vg\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No matter what and\/or who you employ to help protect your organization and it&#8217;s data from the pirates you have to do something.\u00a0 Otherwise the odds are against your companies survival.\u00a0 It&#8217;s that important. By Dell Technologies &#8211;\u00a0The Dell Technologies <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2021\/09\/14\/majority-of-organizations-uncertain-they-can-recover-from-a-ransomware-attack\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46202,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-46201","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46201","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46201"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46201\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46201"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46201"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}