Page 124 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 124
Zero Access in Action
In a ransomware attack on a global company, hackers used stolen credentials to compromise more than
1,000 systems. Because the company’s backup solution implemented the zero-access approach, its
backups were completely protected. The company recovered without engaging with the hackers.
More attacks came weeks later and caused additional damage [maybe we add here “that was once again
recovered with clean, untouched backups” or something to that effect]. The attackers threatened to target
the company's backups, but because zero-access architecture eliminates the typical vulnerabilities found
in backup environments, the hackers gave up and went away. This incident demonstrates the superior
protection zero access offers compared to traditional zero-trust approaches.
Zero access represents a paradigm shift in backup security, offering a robust solution against cyber
threats by redesigning how we manage and protect backup environments. By prioritizing automation,
comprehensive protection, and stringent access controls, zero access is a new standard for securing
critical backup data in an increasingly hostile digital landscape.
About the Author
By Robert Marett, Chief Technology Officer, Cobalt Iron. Robert can be
reached online at https://www.linkedin.com/in/robmarett/ and at our
company website www.cobaltiron.com
124