Page 124 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 124

Zero Access in Action

            In a ransomware attack on a global company, hackers used stolen credentials to compromise more than
            1,000 systems. Because the company’s backup solution implemented the zero-access approach, its
            backups were completely protected. The company recovered without engaging with the hackers.

            More attacks came weeks later and caused additional damage [maybe we add here “that was once again
            recovered with clean, untouched backups” or something to that effect]. The attackers threatened to target
            the company's backups, but because zero-access architecture eliminates the typical vulnerabilities found
            in backup environments, the hackers gave up and went away. This incident demonstrates the superior
            protection zero access offers compared to traditional zero-trust approaches.

            Zero access represents a paradigm shift in backup security, offering a robust solution against cyber
            threats by redesigning how we manage and protect backup environments. By prioritizing automation,
            comprehensive protection, and stringent access controls, zero access is a new standard for securing
            critical backup data in an increasingly hostile digital landscape.





            About the Author

            By Robert Marett, Chief Technology Officer, Cobalt Iron. Robert can be
            reached  online  at  https://www.linkedin.com/in/robmarett/  and  at  our
            company website www.cobaltiron.com






































                                                                                                            124
   119   120   121   122   123   124   125   126   127   128   129