Intelligent CXO Issue 49 | Page 17

TECH TRENDS
Chad Chiang, Managing Director, Synology UK
This reality underscores why organisations can no longer rely solely on conventional backup methods. Having an immutable or offline backup, along with zero error verification, ensures businesses can restore operations swiftly without negotiating with cybercriminals.
How organisations can implement 3-2-1-1-0
For organisations looking to implement a 3-2-1-1- 0 strategy, it’ s important to look for enterprisegrade solutions designed to support this principle, including a centralised solution to back up endpoints, servers and virtual machines with
built-in deduplication and integrity checks.
Enabling immutable backups that cannot be altered or deleted by ransomware, having offsite and offline backup options with encryption and automated verification and cloud-based solutions ensuring remote data protection with multi-version backups and zero-error guarantees are also critical.
However, according to Gartner, cost remains a primary concern for CIOs. As such when looking for storage solutions, organisations should look for devices which allow the partitioning of storage into a performance tier and a capacity tier, eliminating operational costs and reducing storage costs, while still delivering enhanced data security.
At Synology, these are all learnings we’ ve taken from our existing customer base, which is why we know the 3-2-1-1-0 backup rule is not just an enhancement to traditional methods, it is a necessity for any organisation serious about securing its future. These learnings have been key to the development of our unified ActiveProtect solution.
By incorporating an immutable or offline backup and ensuring zero errors, IT teams can rest assured that their data remains accessible, intact and resilient against cyberthreats. As cybercriminals continue to evolve their tactics, organisations must evolve their defences accordingly. Because when disaster strikes, being prepared is the only option. x
THE MODERN ERA OF AI-POWERED CYBERTHREATS, PARTICULARLY AROUND RANSOMWARE AND DATA CORRUPTION, REQUIRES A MORE ROBUST APPROACH TO DATA PROTECTION. www. intelligentcxo. com
17