{"id":65708,"date":"2022-07-20T16:00:00","date_gmt":"2022-07-20T20:00:00","guid":{"rendered":"http:\/\/74d2948405.nxcli.io\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/"},"modified":"2025-07-01T16:50:00","modified_gmt":"2025-07-01T20:50:00","slug":"nutanix-weekly-immutable-backup-the-best-defense-against-ransomware","status":"publish","type":"post","link":"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/","title":{"rendered":"56: Nutanix Weekly: Immutable Backup: The Best Defense Against Ransomware"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/www.buzzsprout.com\/1577275\/episodes\/11000130-nutanix-weekly-immutable-backup-the-best-defense-against-ransomware?iframe=true\" scrolling=\"no\" width=\"100%\" height=\"200\" frameborder=\"0\" style=\"width: 100%;height: 200px\"><\/iframe><\/p>\n<p>Data is the lifeblood of today\u2019s enterprises, and an extremely lucrative target for attackers. Ransomware, which essentially holds data \u201chostage\u201d by encrypting it until a ransom is paid by the company, is increasingly common and becoming more advanced every day.\u00a0<\/p>\n<p>In fact, some estimates say that a ransomware attack occurs every 11 seconds. These attacks can cripple an organization, causing unexpected downtime and wreaking havoc on an enterprise\u2019s operations, production, customer service, and even future reputation.\u00a0<\/p>\n<p>It can cost a lot of time, effort, and money to recover from a ransomware attack. Simply having a backup of your data is no longer sufficient, because attackers can now infiltrate backups as well.\u00a0<\/p>\n<p>In addition to practicing \u201cdefense in depth,\u201d IT professionals are now beginning to see the critical need for immutable backups as a last line of defense from ransomware and other attacks\u2014and a smart way to maintain a successful strategy for <a href=\"https:\/\/www.nutanix.com\/solutions\/data-protection-disaster-recovery\">business continuity and disaster recovery<\/a>.<\/p>\n<p>Animateur : Andy Whiteside<br \/>Coanimateur : Harvey Green<br \/>Co-animatrice : Jirah Cox<\/p>\n<div class=\"transcript\">\n<p><!--block-->WEBVTT<\/p>\n<p>1<br \/>00:00:02.460 &#8211;&gt; 00:00:16.470<br \/>Andy Whiteside: Hello everyone, welcome to episode 56 I think I just looked and then I can&#8217;t remember 36 of mechanics weekly i&#8217;m your host Andy white so i&#8217;ve got Harvey and jarrod on with me I guess we&#8217;re, to the point where you don&#8217;t need introductions anymore.<\/p>\n<p>2<br \/>00:00:19.140 &#8211;&gt; 00:00:23.160<br \/>Jirah Cox: But, again, I think it&#8217;s been a little while, since all three of us actually we&#8217;re on the same episode same time.<\/p>\n<p>3<br \/>00:00:23.340 &#8211;&gt; 00:00:24.480<br \/>Oui.<\/p>\n<p>4<br \/>00:00:25.620 &#8211;&gt; 00:00:30.300<br \/>Andy Whiteside: I think i&#8217;ve been jumping on and saying we are doing great have fun bye and i&#8217;ll go.<\/p>\n<p>5<br \/>00:00:32.520 &#8211;&gt; 00:00:34.830<br \/>Andy Whiteside: Today I am I am here.<\/p>\n<p>6<br \/>00:00:36.000 &#8211;&gt; 00:00:38.010<br \/>Jirah Cox: I get it that&#8217;s, all I can say all any of us can say.<\/p>\n<p>7<br \/>00:00:38.610 &#8211;&gt; 00:00:42.390<br \/>Andy Whiteside: i&#8217;m here I got up i&#8217;m good I got new ideal stickers.<\/p>\n<p>8<br \/>00:00:44.070 &#8211;&gt; 00:00:45.360<br \/>Jirah Cox: cool is that a.<\/p>\n<p>9<br \/>00:00:46.680 &#8211;&gt; 00:00:47.280<br \/>Jirah Cox: beaver.<\/p>\n<p>10<br \/>00:00:48.150 &#8211;&gt; 00:00:48.900<br \/>Andy Whiteside: And what is it that we.<\/p>\n<p>11<br \/>00:00:50.160 &#8211;&gt; 00:00:52.140<br \/>Andy Whiteside: are so disconnected from our world.<\/p>\n<p>12<br \/>00:00:54.150 &#8211;&gt; 00:00:55.020<br \/>Andy Whiteside: As a hedgehog.<\/p>\n<p>13<br \/>00:00:55.260 &#8211;&gt; 00:01:06.870<br \/>Jirah Cox: is, I think I mean the audience i&#8217;m so sorry audience for not painting a good word picture here, I think I can be forgiven for mistaking a beaver and a hedgehog like a big miss on my part yeah and i&#8217;m seeing a.<\/p>\n<p>14<br \/>00:01:06.870 &#8211;&gt; 00:01:15.930<br \/>Andy Whiteside: hard time that&#8217;s like conversation number one we introduce somebody to I was like, why is it called I Joe and I gel is pronounced eagle in German, and he Gal in German, is a head talk.<\/p>\n<p>15<br \/>00:01:16.770 &#8211;&gt; 00:01:17.250<br \/>Jirah Cox: There you go.<\/p>\n<p>16<br \/>00:01:17.970 &#8211;&gt; 00:01:24.120<br \/>Andy Whiteside: Closer and I think he gail is like the abbreviations for the company that started them and that&#8217;s how they ended up is.<\/p>\n<p>17<br \/>00:01:24.480 &#8211;&gt; 00:01:34.320<br \/>Jirah Cox: That totally totally cool company name I i&#8217;m legitimately just passed wondering about how to drink nobody&#8217;s getting named because I just I just assume we&#8217;re running out of good names, so you can get.<\/p>\n<p>18<br \/>00:01:34.650 &#8211;&gt; 00:01:34.980<br \/>oui.<\/p>\n<p>19<br \/>00:01:36.240 &#8211;&gt; 00:01:37.410<br \/>Andy Whiteside: yep INTEGRA.<\/p>\n<p>20<br \/>00:01:42.120 &#8211;&gt; 00:01:44.550<br \/>Andy Whiteside: it&#8217;s become an icon oh yes.<\/p>\n<p>21<br \/>00:01:45.720 &#8211;&gt; 00:01:48.600<br \/>Jirah Cox: I agree exes are cool more x&#8217;s and your name.<\/p>\n<p>22<br \/>00:01:48.960 &#8211;&gt; 00:01:53.340<br \/>Andy Whiteside: so bad, to remind me of the day, well how we got the day and I was like oh that&#8217;s right, that is where it came from.<\/p>\n<p>23<br \/>00:01:54.690 &#8211;&gt; 00:01:57.870<br \/>Andy Whiteside: It came from where I thought it came from, but I forgot who it came from.<\/p>\n<p>24<br \/>00:01:59.370 &#8211;&gt; 00:02:06.690<br \/>Harvey Green: Oh, I don&#8217;t know if I know the WHO it came from I bought the who was that guy and i&#8217;m looking at right now.<\/p>\n<p>25<br \/>00:02:07.080 &#8211;&gt; 00:02:08.700<br \/>Andy Whiteside: know somebody else came up with the name.<\/p>\n<p>26<br \/>00:02:10.740 &#8211;&gt; 00:02:15.720<br \/>Andy Whiteside: yeah true true story I won&#8217;t call it on the podcast because they might not be proud of it, or they might be proud of it.<\/p>\n<p>27<br \/>00:02:18.690 &#8211;&gt; 00:02:22.080<br \/>Andy Whiteside: there&#8217;s a chance they might be listening, because they are involved in new tannic swirl.<\/p>\n<p>28<br \/>00:02:23.010 &#8211;&gt; 00:02:31.440<br \/>Andy Whiteside: whoa they took my ideas and made it a name made a name out of it and, to be honest, I love the logo, because I love it&#8217;s flatten the way it looks.<\/p>\n<p>29<br \/>00:02:32.160 &#8211;&gt; 00:02:44.790<br \/>Andy Whiteside: Just depends like reason, if you say rural southern you say it like with a Latin accent or maybe put an exact a game of the body or whatever, when the Latin guy says INTEGRA I really like it.<\/p>\n<p>30<br \/>00:02:46.740 &#8211;&gt; 00:02:50.130<br \/>Andy Whiteside: When my country friends says INTEGRA I don&#8217;t like it so much.<\/p>\n<p>31<br \/>00:02:50.640 &#8211;&gt; 00:02:55.980<br \/>Jirah Cox: I mean i&#8217;m not sure I can&#8217;t think of any type of tech company name it would just work really well in that context.<\/p>\n<p>32<br \/>00:02:58.650 &#8211;&gt; 00:03:00.540<br \/>Andy Whiteside: Microsoft didn&#8217;t work.<\/p>\n<p>33<br \/>00:03:02.040 &#8211;&gt; 00:03:05.010<br \/>Andy Whiteside: yeah Amazon aws.<\/p>\n<p>34<br \/>00:03:05.460 &#8211;&gt; 00:03:06.300<br \/>Andy Whiteside: comes along.<\/p>\n<p>35<br \/>00:03:06.600 &#8211;&gt; 00:03:08.010<br \/>Andy Whiteside: yeah no I don&#8217;t even have to try.<\/p>\n<p>36<br \/>00:03:08.070 &#8211;&gt; 00:03:10.080<br \/>Andy Whiteside: Like that accent i&#8217;ll have to try lily comes out.<\/p>\n<p>37<br \/>00:03:10.110 &#8211;&gt; 00:03:11.010<br \/>It literally comes up.<\/p>\n<p>38<br \/>00:03:12.300 &#8211;&gt; 00:03:15.000<br \/>Harvey Green: into your presence was definitely missed Sir.<\/p>\n<p>39<br \/>00:03:16.800 &#8211;&gt; 00:03:18.960<br \/>Andy Whiteside: If you can&#8217;t laugh at yourself even left.<\/p>\n<p>40<br \/>00:03:21.270 &#8211;&gt; 00:03:21.750<br \/>Jirah Cox: volunteer.<\/p>\n<p>41<br \/>00:03:28.890 &#8211;&gt; 00:03:29.340<br \/>Andy Whiteside: work.<\/p>\n<p>42<br \/>00:03:31.800 &#8211;&gt; 00:03:32.280<br \/>Jirah Cox: fancy.<\/p>\n<p>43<br \/>00:03:33.480 &#8211;&gt; 00:03:34.890<br \/>Jirah Cox: yeah and then didn&#8217;t catch fire.<\/p>\n<p>44<br \/>00:03:35.580 &#8211;&gt; 00:03:38.520<br \/>Andy Whiteside: No, it did not catch fire i&#8217;ve got the newest latest greatest when all the bugs.<\/p>\n<p>45<br \/>00:03:39.270 &#8211;&gt; 00:03:40.230<br \/>Jirah Cox: Okay, there you go.<\/p>\n<p>46<br \/>00:03:43.350 &#8211;&gt; 00:03:46.470<br \/>Andy Whiteside: by car, but it wasn&#8217;t that close oh my wife&#8217;s not listen.<\/p>\n<p>47<br \/>00:03:47.550 &#8211;&gt; 00:03:48.690<br \/>Jirah Cox: there&#8217;s no firmware fix for that.<\/p>\n<p>48<br \/>00:03:50.310 &#8211;&gt; 00:03:52.830<br \/>Andy Whiteside: Not for that one that one&#8217;s that&#8217;s called look both ways.<\/p>\n<p>49<br \/>00:03:55.170 &#8211;&gt; 00:04:03.420<br \/>Andy Whiteside: All right, so guys for jumped on you guys were chit chatting about what the cover today and we came up with the always relevant talk at topic.<\/p>\n<p>50<br \/>00:04:04.230 &#8211;&gt; 00:04:21.450<br \/>Andy Whiteside: Of immutable backup immutable backup the best Defense against ransomware I feel like we&#8217;ve covered this, but you can never cover this enough, and maybe there&#8217;s something beyond what we&#8217;ve covered that we&#8217;re going to talk about here.<\/p>\n<p>51<br \/>00:04:23.370 &#8211;&gt; 00:04:28.020<br \/>Andy Whiteside: Well, maybe it&#8217;s just like you know, like your mom brush your teeth brush you tell me all the time, I know I keep telling you brush teeth.<\/p>\n<p>52<br \/>00:04:29.070 &#8211;&gt; 00:04:29.490<br \/>Harvey Green : Oui.<\/p>\n<p>53<br \/>00:04:29.580 &#8211;&gt; 00:04:30.270<br \/>Jirah Cox: I mean, I guess.<\/p>\n<p>54<br \/>00:04:30.810 &#8211;&gt; 00:04:44.070<br \/>Jirah Cox: If you if a customer was listening in like was 100% sure that their backups were completely recoverable couldn&#8217;t be attacked we&#8217;re going to be there when they need them, I guess, they can soliciting now for everybody else, maybe there&#8217;s something for them, and the rest of this episode.<\/p>\n<p>55<br \/>00:04:47.070 &#8211;&gt; 00:04:51.600<br \/>Harvey Green: And we assume 99% of people are still listening at this point.<\/p>\n<p>56<br \/>00:04:53.310 &#8211;&gt; 00:04:56.640<br \/>Andy Whiteside: it&#8217;s like if you try to think about that right for you go to bed every night whatever.<\/p>\n<p>57<br \/>00:05:00.000 &#8211;&gt; 00:05:01.080<br \/>Harvey Green: You dream about.<\/p>\n<p>58<br \/>00:05:02.610 &#8211;&gt; 00:05:10.350<br \/>Andy Whiteside: Like right before bed last night right for me to sleep last night, my wife gave me like two or three things she would like to have done like honey do things Marty exhausted from the weekend.<\/p>\n<p>59<br \/>00:05:11.550 &#8211;&gt; 00:05:13.170<br \/>Andy Whiteside: took me a little bit to go to sleep after that.<\/p>\n<p>60<br \/>00:05:14.250 &#8211;&gt; 00:05:17.550<br \/>Andy Whiteside: I just want to get I just want to get into Monday Monday to start that&#8217;s all.<\/p>\n<p>61<br \/>00:05:18.510 &#8211;&gt; 00:05:23.910<br \/>Jirah Cox: In a professional context you want to be like, can you please open a ticket, but I probably can&#8217;t do it at home.<\/p>\n<p>62<br \/>00:05:25.020 &#8211;&gt; 00:05:28.320<br \/>Andy Whiteside: Now that&#8217;s not a bad idea to they make they make service now home edition.<\/p>\n<p>63<br \/>00:05:31.740 &#8211;&gt; 00:05:34.080<br \/>Jirah Cox: Yes, results, probably not guaranteed.<\/p>\n<p>64<br \/>00:05:35.700 &#8211;&gt; 00:05:37.290<br \/>Harvey Green: That would be frowned upon.<\/p>\n<p>65<br \/>00:05:39.630 &#8211;&gt; 00:05:41.760<br \/>Andy Whiteside: What it that&#8217;s not a bad idea.<\/p>\n<p>66<br \/>00:05:41.880 &#8211;&gt; 00:05:43.890<br \/>Jirah Cox: My users, without feedback.<\/p>\n<p>67<br \/>00:05:47.280 &#8211;&gt; 00:05:48.420<br \/>Andy Whiteside: there&#8217;s a product there somewhere.<\/p>\n<p>68<br \/>00:05:50.940 &#8211;&gt; 00:05:53.460<br \/>Andy Whiteside: The honey do ticketing system.<\/p>\n<p>69<br \/>00:05:55.830 &#8211;&gt; 00:05:56.820<br \/>Andy Whiteside: Well okay so.<\/p>\n<p>70<br \/>00:05:58.020 &#8211;&gt; 00:06:06.720<br \/>Andy Whiteside: jarrod Harvey started gyro what&#8217;s a why cover this, I think we just covered while cover this, but is it truly just a matter of.<\/p>\n<p>71<br \/>00:06:08.160 &#8211;&gt; 00:06:12.780<br \/>Andy Whiteside: Making sure everybody just though doesn&#8217;t forget how important this topic is.<\/p>\n<p>72<br \/>00:06:15.240 &#8211;&gt; 00:06:16.320<br \/>Jirah Cox: I think it&#8217;s a pretty good reason yeah.<\/p>\n<p>73<br \/>00:06:19.260 &#8211;&gt; 00:06:24.660<br \/>Jirah Cox: it&#8217;s evergreen right like as long as about technology we&#8217;ve had a need for good backup so that technology right like they.<\/p>\n<p>74<br \/>00:06:25.260 &#8211;&gt; 00:06:26.130<br \/>Jirah Cox: saw him.<\/p>\n<p>75<br \/>00:06:26.580 &#8211;&gt; 00:06:29.490<br \/>Andy Whiteside: So I think the main topic here right is about immutable backup.<\/p>\n<p>76<br \/>00:06:30.480 &#8211;&gt; 00:06:37.260<br \/>Andy Whiteside: And so Okay, and I had this conversation a week ago with somebody I forget what was what is immutable backup.<\/p>\n<p>77<br \/>00:06:40.020 &#8211;&gt; 00:06:44.670<br \/>Jirah Cox: So the immutability there would imply that you know can&#8217;t be.<\/p>\n<p>78<br \/>00:06:46.170 &#8211;&gt; 00:06:51.300<br \/>Jirah Cox: tacked can&#8217;t be modified makes it more resilient against loss.<\/p>\n<p>79<br \/>00:06:53.190 &#8211;&gt; 00:06:58.320<br \/>Jirah Cox: You know and there&#8217;s certain ways that you could get there with with crucial backup technology right with like file permissions.<\/p>\n<p>80<br \/>00:06:58.770 &#8211;&gt; 00:07:11.490<br \/>Jirah Cox: access control lists, but that&#8217;s still you configuring a platform to add that versus the immutability being actually intrinsic aspect of the medium you&#8217;re writing your backups to so.<\/p>\n<p>81<br \/>00:07:11.520 &#8211;&gt; 00:07:19.560<br \/>Andy Whiteside: Let me ask you this, I didn&#8217;t understand what ransomware worked until a couple days ago and somebody so what happens is it makes a copy of your data encrypts that copy and then deletes your copy.<\/p>\n<p>82<br \/>00:07:20.730 &#8211;&gt; 00:07:23.850<br \/>Jirah Cox: yeah it&#8217;s probably yeah, broadly speaking, you have pretty fair.<\/p>\n<p>83<br \/>00:07:24.090 &#8211;&gt; 00:07:26.340<br \/>Andy Whiteside: So then, just put it all in one big massive zip file.<\/p>\n<p>84<br \/>00:07:26.790 &#8211;&gt; 00:07:27.870<br \/>Harvey Green: hmm no.<\/p>\n<p>85<br \/>00:07:28.080 &#8211;&gt; 00:07:35.490<br \/>Andy Whiteside: Copies encrypts while you know, during the copy process or afterwards and then delete yours and then your your data is gone.<\/p>\n<p>86<br \/>00:07:37.620 &#8211;&gt; 00:07:40.320<br \/>Andy Whiteside: And the only thing you do is get it back from the last time, so in this case.<\/p>\n<p>87<br \/>00:07:40.680 &#8211;&gt; 00:07:53.850<br \/>Andy Whiteside: We want that data to be sitting there, I guess, with ransomware it&#8217;s going to it&#8217;s going to encrypt and do this to your backups as well that are sitting there unprotected, and this This creates a scenario where that copy delete you might get a copy, but you can&#8217;t delete.<\/p>\n<p>88<br \/>00:07:54.750 &#8211;&gt; 00:08:03.090<br \/>Jirah Cox: Right well that&#8217;s that&#8217;s the that&#8217;s part of the threat model right that yeah that&#8217;s what address as well as let&#8217;s say it does whatever basketballs do on the workstation on the endpoint.<\/p>\n<p>89<br \/>00:08:03.690 &#8211;&gt; 00:08:17.100<br \/>Jirah Cox: Right let&#8217;s make sure that that my backup data which is like my last resort right like the lifeboat there is not something that can do that too right like it let&#8217;s make sure it can&#8217;t touch our backup systems yeah.<\/p>\n<p>90<br \/>00:08:17.820 &#8211;&gt; 00:08:22.740<br \/>Andy Whiteside: And to be clear when you say what it does on the workstation I know you know you&#8217;re talking about, but let me just walk through this with you.<\/p>\n<p>91<br \/>00:08:23.100 &#8211;&gt; 00:08:31.320<br \/>Andy Whiteside: If my workstation has access to a network drive where I have the ability to copy and delete stuff it&#8217;s going to do that bad stuff over there to.<\/p>\n<p>92<br \/>00:08:32.190 &#8211;&gt; 00:08:44.340<br \/>Jirah Cox: You anywhere, yes, all the above, but yeah basically ransomware can do bad things to anything that you can do as a end user right so local drives network drives shares anything above.<\/p>\n<p>93<br \/>00:08:45.060 &#8211;&gt; 00:08:49.770<br \/>Harvey Green: yeah and anything that you have access to modify.<\/p>\n<p>94<br \/>00:08:50.880 &#8211;&gt; 00:09:03.810<br \/>Harvey Green: You will have potentially have have spread it in that way because it&#8217;s it&#8217;s kind of using you and your permissions and your locations to go in and do its work.<\/p>\n<p>95<br \/>00:09:05.280 &#8211;&gt; 00:09:07.380<br \/>Andy Whiteside: yeah that you, you are the key.<\/p>\n<p>96<br \/>00:09:07.440 &#8211;&gt; 00:09:09.240<br \/>Harvey Green: So he&#8217;s got take away all your power, the key.<\/p>\n<p>97<br \/>00:09:10.770 &#8211;&gt; 00:09:15.570<br \/>Andy Whiteside: Like if I just lock you down, but then you can&#8217;t do that right, because the people got to get stuff done.<\/p>\n<p>98<br \/>00:09:15.840 &#8211;&gt; 00:09:17.820<br \/>Harvey Green: that&#8217;s right yeah.<\/p>\n<p>99<br \/>00:09:19.410 &#8211;&gt; 00:09:25.200<br \/>Andy Whiteside: All right, so let&#8217;s see what is immutable backups How does it work, did we cover how it works and that dialogue.<\/p>\n<p>100<br \/>00:09:28.620 &#8211;&gt; 00:09:35.010<br \/>Jirah Cox: so well, we can we can go a little bit deeper right, so the fundamentally right we want, we want to throw backups that a system where.<\/p>\n<p>101<br \/>00:09:35.970 &#8211;&gt; 00:09:46.920<br \/>Jirah Cox: If we&#8217;ve told the system this data should be immutable then we allow new data to be generated right we&#8217;re going to write our our nightly backups sets or whatever your interval is right, could be hourly could be weekly.<\/p>\n<p>102<br \/>00:09:49.830 &#8211;&gt; 00:10:00.600<br \/>Jirah Cox: Maybe one a little bit of a cool down timer where they can be maybe change for the first 10 minutes or first hour, but once the period of of immutability has started, then.<\/p>\n<p>103<br \/>00:10:02.130 &#8211;&gt; 00:10:18.960<br \/>Jirah Cox: Normally the functionality is shouldn&#8217;t ever be able to be deleted, they can only just expire on a plan retention cycle right So if you tell it keep this data for three years or five years, then you can&#8217;t delete it sooner than three years or five years, whatever your policy is set to.<\/p>\n<p>104<br \/>00:10:21.180 &#8211;&gt; 00:10:29.460<br \/>Jirah Cox: So that&#8217;s that&#8217;s what we, we should level set on as what we what we mean by when we say hey your backups relating to land on some kind of immutable data platform.<\/p>\n<p>105<br \/>00:10:31.260 &#8211;&gt; 00:10:47.430<br \/>Andy Whiteside: and going back to the conversation around Okay, so you got the stuff that gets backed up from the system in theory that stuff&#8217;s, not even if it&#8217;s not immutable in theory that user doesn&#8217;t have access to, or if you&#8217;re the right user with the right credentials, you do have access to it.<\/p>\n<p>106<br \/>00:10:49.200 &#8211;&gt; 00:11:02.640<br \/>Jirah Cox: So for this kind of definition right for middle of backups I would, I would say that actually even even the admin right shouldn&#8217;t able to touch those right because we&#8217;ve set a policy right as an organization to say this data can&#8217;t be deleted sooner than X, Y Z.<\/p>\n<p>107<br \/>00:11:04.350 &#8211;&gt; 00:11:04.620<br \/>Jirah Cox: Right.<\/p>\n<p>108<br \/>00:11:06.630 &#8211;&gt; 00:11:12.450<br \/>Jirah Cox: So, then, I can&#8217;t think of a reason why an admin right should be able to to override that.<\/p>\n<p>109<br \/>00:11:12.690 &#8211;&gt; 00:11:20.340<br \/>Jirah Cox: Well i&#8217;m sorry because it gives you might have like legal you know you can you can have a business justification for new that retention employees right so so it would need to.<\/p>\n<p>110<br \/>00:11:21.030 &#8211;&gt; 00:11:33.150<br \/>Andy Whiteside: Well i&#8217;m talking about if it&#8217;s not immutable, in other words it&#8217;s the network share all the backups go and Tommy that men surf the Internet or does whatever he needs with his admin credentials and next thing you know he&#8217;s you know wiping out the system.<\/p>\n<p>111<br \/>00:11:35.310 &#8211;&gt; 00:11:47.820<br \/>Jirah Cox: Totally yeah then you&#8217;re just hope you&#8217;re relying on the fact that, hopefully, like, I guess, I would hope that on privileged users can&#8217;t do a delete but yeah nothing&#8217;s enforcing that like a privilege admin right or compromised accounts or.<\/p>\n<p>112<br \/>00:11:48.930 &#8211;&gt; 00:11:56.190<br \/>Jirah Cox: You know malware on his workstation yeah totally with his permission could do bad things to the data because he&#8217;s got he has permissions to do things to the data right.<\/p>\n<p>113<br \/>00:11:56.310 &#8211;&gt; 00:12:00.210<br \/>Harvey Green: And, and that goes back to you know, one of the things that we.<\/p>\n<p>114<br \/>00:12:01.290 &#8211;&gt; 00:12:14.310<br \/>Harvey Green: We talked about all time has been a topic for a long time, is making sure that your your end users only have access to the things that you need them to have access to I can&#8217;t tell you how many times i&#8217;ve looked.<\/p>\n<p>115<br \/>00:12:15.840 &#8211;&gt; 00:12:24.450<br \/>Harvey Green: As a you know, a quote unquote normal user right and then have access to shares that I shouldn&#8217;t have access to because.<\/p>\n<p>116<br \/>00:12:25.800 &#8211;&gt; 00:12:40.980<br \/>Harvey Green: Security by obscurity doesn&#8217;t work you can&#8217;t just hide access to the files or to the server shares and things like that, if your users have permission to it, you know that that&#8217;s how things get through yeah.<\/p>\n<p>117<br \/>00:12:41.610 &#8211;&gt; 00:12:42.120<br \/>Jirah Cox: I would say.<\/p>\n<p>118<br \/>00:12:42.240 &#8211;&gt; 00:12:45.450<br \/>Jirah Cox: Harvey and we&#8217;re now we&#8217;re seeing right the sort of the.<\/p>\n<p>119<br \/>00:12:45.930 &#8211;&gt; 00:12:56.490<br \/>Jirah Cox: Best practices, the leading leading edge of it administers practices we see admins right saying how little access Do I need to do my job right like if I don&#8217;t need this on a day to day basis.<\/p>\n<p>120<br \/>00:12:57.330 &#8211;&gt; 00:13:09.390<br \/>Jirah Cox: i&#8217;m not gonna have this version of myself either right because that&#8217;s that&#8217;s a liability right philosophy, if I have what I need you to do my job because, beyond just end users into anybody right it&#8217;s touching the technology.<\/p>\n<p>121<br \/>00:13:11.190 &#8211;&gt; 00:13:11.520<br \/>Oui.<\/p>\n<p>122<br \/>00:13:14.400 &#8211;&gt; 00:13:20.190<br \/>Andy Whiteside: So okay so gyro what is the key technology behind immutable data storage.<\/p>\n<p>123<br \/>00:13:21.630 &#8211;&gt; 00:13:29.880<br \/>Jirah Cox: um so yeah I mean the way this article would get to is where nutrients can act as an immediate backup provider right.<\/p>\n<p>124<br \/>00:13:31.680 &#8211;&gt; 00:13:37.080<br \/>Jirah Cox: The through as a platform right and then and then, specifically through object storage.<\/p>\n<p>125<br \/>00:13:38.580 &#8211;&gt; 00:13:39.420<br \/>Jirah Cox: As a backup target.<\/p>\n<p>126<br \/>00:13:44.130 &#8211;&gt; 00:13:55.140<br \/>Andy Whiteside: So what does that mean there there&#8217;s like I want to say Amazon invented this or maybe they didn&#8217;t somebody else did it but they made a big deal out of it in their aws platform for very cost effective storage what&#8217;s.<\/p>\n<p>127<br \/>00:13:55.590 &#8211;&gt; 00:14:00.180<br \/>Andy Whiteside: amazon&#8217;s is called s3 what&#8217;s the actual encryption what&#8217;s the concept tenement call.<\/p>\n<p>128<br \/>00:14:01.260 &#8211;&gt; 00:14:01.560<br \/>Andy Whiteside : Vous savez.<\/p>\n<p>129<br \/>00:14:01.650 &#8211;&gt; 00:14:07.830<br \/>Jirah Cox: um yeah s3 yeah right as the product that about evolved into becoming the protocol.<\/p>\n<p>130<br \/>00:14:09.480 &#8211;&gt; 00:14:19.620<br \/>Jirah Cox: Generic would refer to as like just object storage right so that&#8217;s that&#8217;s the the capability to you know place data retrieve data reads and writes.<\/p>\n<p>131<br \/>00:14:20.730 &#8211;&gt; 00:14:26.880<br \/>Jirah Cox: And it&#8217;s you can you can think of it as not being you know kind of the oldest older school SMB or nfl space storage.<\/p>\n<p>132<br \/>00:14:28.260 &#8211;&gt; 00:14:34.020<br \/>Jirah Cox: That, in the past has been what we&#8217;ve presented to backup systems right like a vm server semantic server.<\/p>\n<p>133<br \/>00:14:36.330 &#8211;&gt; 00:14:46.890<br \/>Jirah Cox: You know backup, whatever your whatever you&#8217;re using you&#8217;d give it some kind of some kind of bulk storage that would only be SMB and fs s3 is the newer variant of that and because it comes with some.<\/p>\n<p>134<br \/>00:14:48.030 &#8211;&gt; 00:14:58.800<br \/>Jirah Cox: benefits in the Protocol one of them being that ability to say the Protocol itself the platform itself is enforcing the immutability right sometimes called worm right so right once read many.<\/p>\n<p>135<br \/>00:14:59.880 &#8211;&gt; 00:15:08.790<br \/>Jirah Cox: But that ability to say once i&#8217;ve written this it it, it should not be deleted by any human until it it hits a retention policy that i&#8217;ve set as an organization.<\/p>\n<p>136<br \/>00:15:10.140 &#8211;&gt; 00:15:10.470<br \/>Jirah Cox : Oui.<\/p>\n<p>137<br \/>00:15:11.580 &#8211;&gt; 00:15:16.020<br \/>Andy Whiteside: Well then, the article goes on to talk about other reasons other than ransomware.<\/p>\n<p>138<br \/>00:15:17.700 &#8211;&gt; 00:15:24.990<br \/>Andy Whiteside: assured data integrity simplified compliance and elimination of accidental data changes.<\/p>\n<p>139<br \/>00:15:26.190 &#8211;&gt; 00:15:27.090<br \/>Andy Whiteside: i&#8217;ve probably.<\/p>\n<p>140<br \/>00:15:28.320 &#8211;&gt; 00:15:32.460<br \/>Andy Whiteside: been been the culprit for multiple of those things along the way.<\/p>\n<p>141<br \/>00:15:33.960 &#8211;&gt; 00:15:40.440<br \/>Jirah Cox: we&#8217;re going to have right like this, this is sort of building the argument around like Why would you use the sort of a target for your backups right, and of course yeah like.<\/p>\n<p>142<br \/>00:15:41.130 &#8211;&gt; 00:15:46.980<br \/>Jirah Cox: Data integrity is a huge one right if you&#8217;re gonna write it and it&#8217;s that important to you, there should be really no question about is it going to be there when you go to do a read.<\/p>\n<p>143<br \/>00:15:47.520 &#8211;&gt; 00:15:56.160<br \/>Jirah Cox: operation on it or use it for store compliance yeah if your backups are subject to compliance requirements, then for sure that&#8217;d be a no brainer to say.<\/p>\n<p>144<br \/>00:15:56.550 &#8211;&gt; 00:16:03.480<br \/>Jirah Cox: let&#8217;s let the technology implement that versus automation scripting human compliance all all things that could have variance or drift on them.<\/p>\n<p>145<br \/>00:16:04.350 &#8211;&gt; 00:16:17.370<br \/>Jirah Cox: Right and then yeah like the entire reason you would adopt this right is to have that avoidance of accidental data changes and let&#8217;s let&#8217;s be honest accidental or even a malicious right like no changes means no changes, no matter what the goal is.<\/p>\n<p>146<br \/>00:16:19.290 &#8211;&gt; 00:16:27.000<br \/>Andy Whiteside: Right, you know, we had a situation not too long ago where somebody went in and deleted a bunch of data tried to we saw that it was happening, how to turn them off in the cloud.<\/p>\n<p>147<br \/>00:16:29.070 &#8211;&gt; 00:16:40.110<br \/>Andy Whiteside: How does ransomware impact cloud based storage is it fair to say that it doesn&#8217;t or does it, am I just in my way often thinking that it&#8217;s that storage is immutable.<\/p>\n<p>148<br \/>00:16:41.580 &#8211;&gt; 00:16:41.910<br \/>Jirah Cox: Okay.<\/p>\n<p>149<br \/>00:16:42.720 &#8211;&gt; 00:16:45.600<br \/>Jirah Cox: Jason picture I could picture ransomware you know.<\/p>\n<p>150<br \/>00:16:47.400 &#8211;&gt; 00:17:00.990<br \/>Jirah Cox: we&#8217;ve seen we&#8217;ve seen more and more sophisticated ransomware in the wild right to where have ransomware now speak supervisors ransomware can speak saying right, so if we haven&#8217;t already I think it&#8217;s only a matter of time that we see cloud cloud aware of ransomware.<\/p>\n<p>151<br \/>00:17:02.190 &#8211;&gt; 00:17:03.570<br \/>Jirah Cox: Which is also terrifying to think about.<\/p>\n<p>152<br \/>00:17:04.200 &#8211;&gt; 00:17:04.650<br \/>It is.<\/p>\n<p>153<br \/>00:17:06.720 &#8211;&gt; 00:17:11.640<br \/>Jirah Cox: yeah i&#8217;ve got to think if it&#8217;s if it&#8217;s something that a human can do right and it&#8217;s something that ransomware can probably do to do as well.<\/p>\n<p>154<br \/>00:17:12.060 &#8211;&gt; 00:17:12.330<br \/>Oui.<\/p>\n<p>155<br \/>00:17:13.350 &#8211;&gt; 00:17:16.470<br \/>Andy Whiteside: Okay, so i&#8217;m not wrong in the thinking that&#8217;s a whole different conversation but.<\/p>\n<p>156<br \/>00:17:17.640 &#8211;&gt; 00:17:19.560<br \/>Andy Whiteside: It is going to happen someday.<\/p>\n<p>157<br \/>00:17:20.400 &#8211;&gt; 00:17:35.940<br \/>Jirah Cox: I mean what a terrifying thought like what if ransomware read your browser cookies and scraped out you&#8217;re going to be as credentials, I mean i&#8217;m sure I didn&#8217;t just give anybody an idea but that&#8217;s truly terrifying stuff you know you&#8217;re you&#8217;re in an authenticated browser session.<\/p>\n<p>158<br \/>00:17:39.570 &#8211;&gt; 00:17:46.560<br \/>Andy Whiteside: You think at that point they&#8217;re just attacking one person versus a whole team of people and a whole company&#8217;s worth of data and less valuable.<\/p>\n<p>159<br \/>00:17:48.360 &#8211;&gt; 00:17:51.090<br \/>Harvey Green: It depends on whether one person has access to.<\/p>\n<p>160<br \/>00:17:51.120 &#8211;&gt; 00:17:52.800<br \/>Jirah Cox: I mean it does this person work in an MSP.<\/p>\n<p>161<br \/>00:17:53.190 &#8211;&gt; 00:17:59.790<br \/>Harvey Green: Unfortunately right, this is kind of describing the same business model just in a different place yeah.<\/p>\n<p>162<br \/>00:18:01.140 &#8211;&gt; 00:18:01.380<br \/>C'est vrai.<\/p>\n<p>163<br \/>00:18:03.480 &#8211;&gt; 00:18:11.250<br \/>Andy Whiteside: Ah, OK, so how to implement a minimal backup is this specifically as it relates to new tactics or is it just industry wide.<\/p>\n<p>164<br \/>00:18:12.270 &#8211;&gt; 00:18:14.040<br \/>Jirah Cox: This is pretty sure what actually right, this is a pretty.<\/p>\n<p>165<br \/>00:18:15.180 &#8211;&gt; 00:18:17.340<br \/>Jirah Cox: Broadly, educating article.<\/p>\n<p>166<br \/>00:18:18.510 &#8211;&gt; 00:18:23.220<br \/>Jirah Cox: But yeah some things things to keep in mind key requirements to strive for right so.<\/p>\n<p>167<br \/>00:18:24.450 &#8211;&gt; 00:18:31.530<br \/>Jirah Cox: Of course, we talked about pick a platform that makes it easy by as a platform and as a protocol enforcing that.<\/p>\n<p>168<br \/>00:18:32.910 &#8211;&gt; 00:18:38.040<br \/>Jirah Cox: The immutability the worm functionality right that it can&#8217;t change or drift over time.<\/p>\n<p>169<br \/>00:18:40.500 &#8211;&gt; 00:18:42.420<br \/>Jirah Cox: The zero trust right so.<\/p>\n<p>170<br \/>00:18:43.530 &#8211;&gt; 00:18:46.500<br \/>Jirah Cox: Enforcing in authentication to the environment.<\/p>\n<p>171<br \/>00:18:47.610 &#8211;&gt; 00:18:50.760<br \/>Jirah Cox: You know the Council uses stuff like MFA to factor, you know.<\/p>\n<p>172<br \/>00:18:51.960 &#8211;&gt; 00:19:05.910<br \/>Jirah Cox: Things are harder for ransomware to steal right like more than just a username password you know if ransomware hopefully can&#8217;t steal your one time code or you know push notification to group, yes, as me logging in as the admin.<\/p>\n<p>173<br \/>00:19:08.250 &#8211;&gt; 00:19:14.250<br \/>Jirah Cox: Understanding, of course, the backups are not silver bullet right like advanced monitoring data protection.<\/p>\n<p>174<br \/>00:19:15.600 &#8211;&gt; 00:19:22.890<br \/>Jirah Cox: are also key there right like I always tell customers like let&#8217;s also talk about the edge, because now we&#8217;re has to get in and then memoirs to call out.<\/p>\n<p>175<br \/>00:19:23.280 &#8211;&gt; 00:19:29.280<br \/>Jirah Cox: to really be effective right ransomware has to be able to phone home in order to get instructions and to do the data encryption.<\/p>\n<p>176<br \/>00:19:30.150 &#8211;&gt; 00:19:42.030<br \/>Jirah Cox: So we want resilient backups, but we also want to start stop it earlier than needing to restore from backup as well, so understanding that of course is just one tool in the toolbox around having strong backups.<\/p>\n<p>177<br \/>00:19:43.050 &#8211;&gt; 00:19:48.510<br \/>Jirah Cox: yeah detect early right that gets into workstation level and point monitoring.<\/p>\n<p>178<br \/>00:19:50.040 &#8211;&gt; 00:19:50.790<br \/>Jirah Cox: and enforcement.<\/p>\n<p>179<br \/>00:19:52.170 &#8211;&gt; 00:20:06.450<br \/>Jirah Cox: alerts mitigation responses right so as as we&#8217;re trying to spot stuff earlier recover from infections faster, especially off hours right now almost anything off hours is possibly even more important, of an alert than that during work hours.<\/p>\n<p>180<br \/>00:20:08.280 &#8211;&gt; 00:20:10.440<br \/>Jirah Cox: type of alert in your event monitoring.<\/p>\n<p>181<br \/>00:20:16.380 &#8211;&gt; 00:20:27.600<br \/>Jirah Cox: there&#8217;s a great call out here that i&#8217;ll even expand into say you know remediation policies and so forth responses to what do we do when we believe we&#8217;ve found a ransomware event or a malware event occurring on the network.<\/p>\n<p>182<br \/>00:20:28.650 &#8211;&gt; 00:20:31.470<br \/>Jirah Cox: And I would say, actually, like the in sort of the way that.<\/p>\n<p>183<br \/>00:20:32.670 &#8211;&gt; 00:20:40.680<br \/>Jirah Cox: The way that most Dr failures are like failures like imagination right Oh, we didn&#8217;t think this could happen, or that it would take this kind of path of failure.<\/p>\n<p>184<br \/>00:20:42.600 &#8211;&gt; 00:20:53.370<br \/>Jirah Cox: I think that you can make a fair case that most ransomware escalations are sort of a failure to empower people to respond faster right like i&#8217;m going to authorize my.<\/p>\n<p>185<br \/>00:20:54.030 &#8211;&gt; 00:21:10.170<br \/>Jirah Cox: Service desk just to you know disable anyone any ad account that gets this kind of behavioral learning I don&#8217;t care if they&#8217;re a C level executive right if that if this if this is the alert disable first apologize, and ask questions later right versus versus you know don&#8217;t.<\/p>\n<p>186<br \/>00:21:10.320 &#8211;&gt; 00:21:21.210<br \/>Jirah Cox: don&#8217;t respond to like VIP alerts so so have have policies that have teeth that say if we see this kind of behavior from workstation we&#8217;re gonna cut you off for the good of the company and then help you get it cleaned up and read and respond.<\/p>\n<p>187<br \/>00:21:22.080 &#8211;&gt; 00:21:25.380<br \/>Andy Whiteside: yeah so funny you talk about like the executive conversation I.<\/p>\n<p>188<br \/>00:21:26.010 &#8211;&gt; 00:21:32.280<br \/>Andy Whiteside: I got several stories I could tell but one is I was doing patches on a weekend in my corporate gig way back when and.<\/p>\n<p>189<br \/>00:21:32.700 &#8211;&gt; 00:21:44.460<br \/>Andy Whiteside: got a help desk call I was like why somebody called me now and they called and it was executive, because his daughter was in to do her book report or something, and he needed me to reset his password so she could get in.<\/p>\n<p>190<br \/>00:21:45.210 &#8211;&gt; 00:21:51.780<br \/>Andy Whiteside: wow yeah that&#8217;s 15 years ago, plus maybe 20 i&#8217;m getting old but still.<\/p>\n<p>191<br \/>00:21:52.860 &#8211;&gt; 00:21:54.030<br \/>Andy Whiteside: I bet it still happens.<\/p>\n<p>192<br \/>00:21:55.140 &#8211;&gt; 00:21:57.000<br \/>Harvey Green: i&#8217;m sure it is.<\/p>\n<p>193<br \/>00:21:58.740 &#8211;&gt; 00:21:58.980<br \/>Harvey Green : Tr\u00e8s bien.<\/p>\n<p>194<br \/>00:22:00.600 &#8211;&gt; 00:22:04.770<br \/>Andy Whiteside: So Jared did we cover all these, and then we walk through some are most of them that.<\/p>\n<p>195<br \/>00:22:05.040 &#8211;&gt; 00:22:14.250<br \/>Jirah Cox: The last to be the article gives guidance to say you know avoid reinfection by scanning your backups for signs of tampering and malware before you restore it that&#8217;s that&#8217;s pretty smart right.<\/p>\n<p>196<br \/>00:22:15.150 &#8211;&gt; 00:22:20.280<br \/>Jirah Cox: same thing goes to the endpoints right like I would say, most people don&#8217;t even scan endpoints anymore if it if it has.<\/p>\n<p>197<br \/>00:22:22.020 &#8211;&gt; 00:22:25.350<br \/>Jirah Cox: Evidence of compromise on there that things getting formatted and reinstalled.<\/p>\n<p>198<br \/>00:22:25.470 &#8211;&gt; 00:22:26.850<br \/>Harvey Green: You know, was absolutely.<\/p>\n<p>199<br \/>00:22:27.000 &#8211;&gt; 00:22:27.390<br \/>Totally.<\/p>\n<p>200<br \/>00:22:30.810 &#8211;&gt; 00:22:43.560<br \/>Jirah Cox: And then, this is, I think, pretty important right impact analysis that that that we generate it helps with both recovery efforts right like this happened it caused X amount of team time to be spent on doing recoveries and restores.<\/p>\n<p>201<br \/>00:22:44.850 &#8211;&gt; 00:22:59.670<br \/>Jirah Cox: and verifying things were clean because that&#8217;s that I think is an important stats roll up to the business around you know this this link that took five seconds to click an email generated 50 hours of lost productivity right for for a certain other teams time.<\/p>\n<p>202<br \/>00:23:01.530 &#8211;&gt; 00:23:07.500<br \/>Jirah Cox: But that that kind of data when you roll it up right can help any multiply it times number of attacks that people recover from all the time.<\/p>\n<p>203<br \/>00:23:09.390 &#8211;&gt; 00:23:12.450<br \/>Jirah Cox: Help gives teeth to more stronger policies right around like.<\/p>\n<p>204<br \/>00:23:13.650 &#8211;&gt; 00:23:26.310<br \/>Jirah Cox: You know, do we need to only whitelist email from known business partners do we need to do, stronger scanning or URL URL rewriting or like not allowed downloads or you know block block pdfs or block attachments you know that kind of stuff.<\/p>\n<p>205<br \/>00:23:27.390 &#8211;&gt; 00:23:35.340<br \/>Jirah Cox: When you know what your users are vulnerable to you can write better policies to help spend the company&#8217;s time and money more wisely right.<\/p>\n<p>206<br \/>00:23:39.150 &#8211;&gt; 00:23:42.330<br \/>Andy Whiteside: And overall all that adds up and it becomes.<\/p>\n<p>207<br \/>00:23:43.530 &#8211;&gt; 00:23:45.690<br \/>Andy Whiteside: Almost a profit Center but it saves you bacon.<\/p>\n<p>208<br \/>00:23:47.310 &#8211;&gt; 00:24:03.540<br \/>Jirah Cox: It really does right like I think I think back to the earlier parts of my career where it seemed like like malware or ransomware is sort of like rampant and I, you know, in the business, I was in I kind of kept getting called by customers to say hey help help fix this help fix that.<\/p>\n<p>209<br \/>00:24:04.800 &#8211;&gt; 00:24:10.530<br \/>Jirah Cox: And let&#8217;s say 10 years ago it was kind of more assumed like well we can&#8217;t just not do our jobs without email.<\/p>\n<p>210<br \/>00:24:11.160 &#8211;&gt; 00:24:19.380<br \/>Jirah Cox: But actually can think of like actually a number of roles, nowadays, where you might not even need to be able to receive an email externally right like you can still be pretty functional pretty effective.<\/p>\n<p>211<br \/>00:24:21.000 &#8211;&gt; 00:24:29.880<br \/>Jirah Cox: As an employee, I wonder if we&#8217;ll see more rationalization around hey do you actually need external email accessibility right for your job role job function.<\/p>\n<p>212<br \/>00:24:30.390 &#8211;&gt; 00:24:40.020<br \/>Jirah Cox: Because there&#8217;s real time and money behind these kind of attacks and if that&#8217;s an easy nope don&#8217;t need that well great now i&#8217;m just you know, limiting my my attack surface area.<\/p>\n<p>213<br \/>00:24:40.800 &#8211;&gt; 00:24:42.930<br \/>Andy Whiteside: yeah I could check an email weeks ago.<\/p>\n<p>214<br \/>00:24:43.950 &#8211;&gt; 00:24:46.050<br \/>Jirah Cox: But you go so you&#8217;re you&#8217;re already more security.<\/p>\n<p>215<br \/>00:24:49.530 &#8211;&gt; 00:24:58.980<br \/>Andy Whiteside: So i&#8217;m intentionally showing you guys my screen, this is my virtual desktop, which is a non persistent virtual desktops let&#8217;s not have me immutable because it does change while i&#8217;m using it.<\/p>\n<p>216<br \/>00:24:59.310 &#8211;&gt; 00:25:04.500<br \/>Andy Whiteside: But when I rebooted it reboots back to gold image everything, but my user profile that&#8217;s a whole nother conversation.<\/p>\n<p>217<br \/>00:25:06.720 &#8211;&gt; 00:25:20.790<br \/>Andy Whiteside: But you know, in theory, that&#8217;s one evidence or immutability that we&#8217;ve had in our virtual desktop worlds for long time and virtual APP world and then you take your your data, make it as secure as possible, but the backups of it, make it unchangeable.<\/p>\n<p>218<br \/>00:25:22.380 &#8211;&gt; 00:25:34.560<br \/>Andy Whiteside: And then you throw in what i&#8217;m doing on this screen where it&#8217;s a you know the eye gel read only Linux thin client now the lower my attack vector I mean it takes all of this, plus antivirus plus.<\/p>\n<p>219<br \/>00:25:35.370 &#8211;&gt; 00:25:42.810<br \/>Andy Whiteside: Detection in DR solutions, plus intelligence to make to have a fighting chance and today&#8217;s it.<\/p>\n<p>220<br \/>00:25:43.230 &#8211;&gt; 00:25:44.610<br \/>Jirah Cox: Totally totally and.<\/p>\n<p>221<br \/>00:25:46.140 &#8211;&gt; 00:25:54.720<br \/>Jirah Cox: And I can picture you know the the parts that do present right like your profile data you&#8217;re you&#8217;re like redirect file share data, you know.<\/p>\n<p>222<br \/>00:25:55.860 &#8211;&gt; 00:26:03.990<br \/>Jirah Cox: needs to think kind of like burgeoning easy roll back like if you if you call to help us and said hey my profile, you know needs to get rolled back to 72 hours ago that needs to be.<\/p>\n<p>223<br \/>00:26:05.160 &#8211;&gt; 00:26:15.330<br \/>Jirah Cox: A well exercised script or code path or unknown procedure right you don&#8217;t want them fumbling around like oh whoops I don&#8217;t roll back to that point in time, you know, like you want that to be a boring operation.<\/p>\n<p>224<br \/>00:26:16.470 &#8211;&gt; 00:26:26.010<br \/>Andy Whiteside: And I don&#8217;t know how to do it, but in our one drive and other solutions we have real time SAS SAS backups and I could restore my files.<\/p>\n<p>225<br \/>00:26:26.250 &#8211;&gt; 00:26:26.520<br \/>Jirah Cox: Oh yeah.<\/p>\n<p>226<br \/>00:26:26.970 &#8211;&gt; 00:26:39.510<br \/>Andy Whiteside: Nobody showed me how to do it, yet, but I know it exists, I know I paid for it every month and somebody said it up, but it goes back it&#8217;s a very much a layered approach with some common sense thinking on the front end.<\/p>\n<p>227<br \/>00:26:39.810 &#8211;&gt; 00:26:46.770<br \/>Jirah Cox: Oh yeah absolutely required right like assuming that a SAS services need a backup is sort of mistake number one right now.<\/p>\n<p>228<br \/>00:26:47.460 &#8211;&gt; 00:26:52.380<br \/>Andy Whiteside: That well I did that for like five years I assumed, it was backed up by my friends at Microsoft.<\/p>\n<p>229<br \/>00:26:55.380 &#8211;&gt; 00:26:57.840<br \/>Harvey Green: Only for a very short period of time.<\/p>\n<p>230<br \/>00:26:59.430 &#8211;&gt; 00:27:05.940<br \/>Jirah Cox: Right it really gets into like what do you define a backup and like who&#8217;s allowed to do the restore who&#8217;s it a backup for right, you know yeah.<\/p>\n<p>231<br \/>00:27:06.930 &#8211;&gt; 00:27:10.890<br \/>Andy Whiteside: Well guys, I appreciate it always good to talk immutable backups.<\/p>\n<p>232<br \/>00:27:12.390 &#8211;&gt; 00:27:16.200<br \/>Andy Whiteside: Now really it&#8217;s one of those things you can&#8217;t you can&#8217;t stress it enough.<\/p>\n<p>233<br \/>00:27:17.640 &#8211;&gt; 00:27:26.010<br \/>Andy Whiteside: That know having that in your Oh, I did want to Oh, we didn&#8217;t get to the in the article i&#8217;m new tannic, this is a feature of mine correct.<\/p>\n<p>234<br \/>00:27:27.210 &#8211;&gt; 00:27:30.150<br \/>Jirah Cox: A camera yeah feature of objects right which powers mine yeah.<\/p>\n<p>235<br \/>00:27:31.050 &#8211;&gt; 00:27:40.530<br \/>Andy Whiteside: So it&#8217;s a feature of objects so help me understand this of objects powers mine mine is a which one do you pay for which which one do you pay for.<\/p>\n<p>236<br \/>00:27:42.060 &#8211;&gt; 00:28:01.290<br \/>Jirah Cox: All of it mine is the mind is the combination of the backup tech, along with the backup the backup storage, along with the backup solution right so like a like a haiku like a beam like a calm vault running on the cluster That then is both the backup appliance as well as the storage.<\/p>\n<p>237<br \/>00:28:01.920 &#8211;&gt; 00:28:05.220<br \/>Andy Whiteside: Okay, so mine enables that object level backup.<\/p>\n<p>238<br \/>00:28:06.660 &#8211;&gt; 00:28:15.600<br \/>Jirah Cox: right, the right yeah my mind includes the storage and the application right, whereas where you also just run objects and not even bring your own application right something else spoke s3.<\/p>\n<p>239<br \/>00:28:15.660 &#8211;&gt; 00:28:17.160<br \/>Andy Whiteside: And then, a haiku would be the.<\/p>\n<p>240<br \/>00:28:17.700 &#8211;&gt; 00:28:20.910<br \/>Andy Whiteside: Management of that system leveraging those.<\/p>\n<p>241<br \/>00:28:21.120 &#8211;&gt; 00:28:25.950<br \/>Andy Whiteside: capable yeah you could just run mine, if you want it or you need something like a third party haiku or being.<\/p>\n<p>242<br \/>00:28:26.820 &#8211;&gt; 00:28:32.850<br \/>Harvey Green: So that that third party comes with mine as a part of the solution so.<\/p>\n<p>243<br \/>00:28:32.940 &#8211;&gt; 00:28:38.730<br \/>Harvey Green: That you can think of mine as objects and a solution like you&#8217;re speaking.<\/p>\n<p>244<br \/>00:28:39.570 &#8211;&gt; 00:28:44.490<br \/>Andy Whiteside: Okay, so when I buy haiku I got in my mind, so that can leverage the haiku they come together.<\/p>\n<p>245<br \/>00:28:44.670 &#8211;&gt; 00:28:47.310<br \/>Harvey Green: know if you bought objects only.<\/p>\n<p>246<br \/>00:28:47.730 &#8211;&gt; 00:28:53.040<br \/>Harvey Green: And then bought haiku you could do it that way, or you could buy mine that would have haiku.<\/p>\n<p>247<br \/>00:28:53.160 &#8211;&gt; 00:28:54.420<br \/>Harvey Green: Already in it.<\/p>\n<p>248<br \/>00:28:54.570 &#8211;&gt; 00:28:55.320<br \/>Andy Whiteside: Oh, I gotta.<\/p>\n<p>249<br \/>00:28:55.380 &#8211;&gt; 00:28:56.430<br \/>Harvey Green: Have a full solution.<\/p>\n<p>250<br \/>00:28:56.580 &#8211;&gt; 00:29:01.110<br \/>Jirah Cox: yeah you&#8217;d set mine off to the side and say this is my backup cluster it holds the backups and it takes all the backups.<\/p>\n<p>251<br \/>00:29:01.410 &#8211;&gt; 00:29:10.290<br \/>Jirah Cox: Yes, right or but, and that would be super valid use case right s3 itself is just a web protocol so you use it for anything right you use it for application data.<\/p>\n<p>252<br \/>00:29:11.580 &#8211;&gt; 00:29:24.840<br \/>Jirah Cox: You know uploads you can power power website right, so you can have a separate cluster running objects that wasn&#8217;t used for backups right, what if you&#8217;re using it for for backups then you&#8217;d have your backup cluster that runs the backups holds the backup stores have backups.<\/p>\n<p>253<br \/>00:29:26.310 &#8211;&gt; 00:29:31.260<br \/>Andy Whiteside: So So where do I put my tape robot library and what times the iron mountain got coming.<\/p>\n<p>254<br \/>00:29:32.130 &#8211;&gt; 00:29:32.520<br \/>Jirah Cox: You put it.<\/p>\n<p>255<br \/>00:29:32.580 &#8211;&gt; 00:29:33.450<br \/>Jirah Cox: In a museum.<\/p>\n<p>256<br \/>00:29:35.010 &#8211;&gt; 00:29:39.510<br \/>Jirah Cox: and iron mountain guy comes by for lunch when we invite him yeah.<\/p>\n<p>257<br \/>00:29:41.580 &#8211;&gt; 00:29:44.550<br \/>Andy Whiteside: 15 years ago that that thing and the tape library and the.<\/p>\n<p>258<br \/>00:29:44.580 &#8211;&gt; 00:29:46.020<br \/>Andy Whiteside: That was, like the coolest thing.<\/p>\n<p>259<br \/>00:29:46.350 &#8211;&gt; 00:29:49.500<br \/>Harvey Green: The the iron mountain guy can still come shared your paper okay.<\/p>\n<p>260<br \/>00:29:51.570 &#8211;&gt; 00:29:57.360<br \/>Jirah Cox: So I i&#8217;ve been watching this a computer archive History project on YouTube.<\/p>\n<p>261<br \/>00:29:58.320 &#8211;&gt; 00:30:03.060<br \/>Jirah Cox: And they just do everything like, if you want just sales marketing video for like a mainframe from like the 16th.<\/p>\n<p>262<br \/>00:30:03.510 &#8211;&gt; 00:30:12.390<br \/>Jirah Cox: They have it um it&#8217;s it&#8217;s really cool stuff I watched one last night about you know just like typing broadly right it&#8217;s like a almost like a extended.<\/p>\n<p>263<br \/>00:30:12.900 &#8211;&gt; 00:30:22.800<br \/>Jirah Cox: magical world of Disney about typewriters from like the 60s and it talked about how you know these folks that you know run offices and so forth, would lay out like a bar chart.<\/p>\n<p>264<br \/>00:30:23.400 &#8211;&gt; 00:30:36.180<br \/>Jirah Cox: In a typewriter right with like tab stops and and here&#8217;s the sales figures for this month and it&#8217;s like all done with nothing but a manual typewriter like absolutely wild stuff look at the look at the computer archive History project on on YouTube.<\/p>\n<p>265<br \/>00:30:37.410 &#8211;&gt; 00:30:40.980<br \/>Andy Whiteside: yeah i&#8217;m definitely not do that your wife sits down and watches that we did.<\/p>\n<p>266<br \/>00:30:43.050 &#8211;&gt; 00:30:45.570<br \/>Jirah Cox: No, no, no, she does not.<\/p>\n<p>267<br \/>00:30:47.070 &#8211;&gt; 00:30:50.040<br \/>Andy Whiteside: i&#8217;m going to get that I gotta share with my kids my son and my.<\/p>\n<p>268<br \/>00:30:51.090 &#8211;&gt; 00:30:54.120<br \/>Andy Whiteside: My adopted son, which is chasing money partner account manager.<\/p>\n<p>269<br \/>00:30:55.830 &#8211;&gt; 00:30:56.490<br \/>Andy Whiteside: that&#8217;s that&#8217;d be great.<\/p>\n<p>270<br \/>00:30:58.440 &#8211;&gt; 00:30:59.160<br \/>Andy Whiteside: I love that.<\/p>\n<p>271<br \/>00:31:01.170 &#8211;&gt; 00:31:06.330<br \/>Andy Whiteside: kind of like binge watching right, and do you find yourself binge watching and come and tell the truth.<\/p>\n<p>272<br \/>00:31:07.530 &#8211;&gt; 00:31:08.520<br \/>Jirah Cox: yeah I do I.<\/p>\n<p>273<br \/>00:31:08.760 &#8211;&gt; 00:31:09.270<br \/>Jirah Cox: don&#8217;t like.<\/p>\n<p>274<br \/>00:31:09.990 &#8211;&gt; 00:31:13.230<br \/>Andy Whiteside: I will i&#8217;m gonna be like oh I can&#8217;t go see what God wants one more here we go so.<\/p>\n<p>275<br \/>00:31:15.510 &#8211;&gt; 00:31:18.210<br \/>Andy Whiteside: that&#8217;s pretty sad but I like can you download them.<\/p>\n<p>276<br \/>00:31:18.990 &#8211;&gt; 00:31:20.040<br \/>Jirah Cox: it&#8217;s YouTube so.<\/p>\n<p>277<br \/>00:31:21.840 &#8211;&gt; 00:31:23.100<br \/>Andy Whiteside: I don&#8217;t know that means he download them.<\/p>\n<p>278<br \/>00:31:23.220 &#8211;&gt; 00:31:26.280<br \/>Jirah Cox: that&#8217;s a yes, if you have the right tools and know how to download from YouTube.<\/p>\n<p>279<br \/>00:31:28.380 &#8211;&gt; 00:31:29.280<br \/>Andy Whiteside: I have to ask my kids out.<\/p>\n<p>280<br \/>00:31:30.240 &#8211;&gt; 00:31:30.690<br \/>Jirah Cox: There you go.<\/p>\n<p>281<br \/>00:31:31.650 &#8211;&gt; 00:31:34.260<br \/>Jirah Cox: So that we probably shouldn&#8217;t legally talk about how to do on the podcast.<\/p>\n<p>282<br \/>00:31:36.150 &#8211;&gt; 00:31:38.940<br \/>Andy Whiteside: Alright guys appreciate it good topic will hit you again next week.<\/p>\n<p>283<br \/>00:31:40.080 &#8211;&gt; 00:31:40.350<br \/>Jirah Cox: cool.<\/p>\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Data is the lifeblood of today\u2019s enterprises, and an extremely lucrative target for attackers. Ransomware, which essentially holds data \u201chostage\u201d by encrypting it until a ransom is paid by the &hellip;<\/p>","protected":false},"author":7,"featured_media":65766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":""},"categories":[5],"tags":[122],"class_list":["post-65708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-podcast","tag-nutanix-weekly"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Nutanix Weekly: The Best Defense Against Ransomware<\/title>\n<meta name=\"description\" content=\"Your data is the #1 target for attackers. Ensure Business continuity and data recovery with immutable backups.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Nutanix Weekly: The Best Defense Against Ransomware\" \/>\n<meta property=\"og:description\" content=\"Your data is the #1 target for attackers. Ensure Business continuity and data recovery with immutable backups.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"XenTegra\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XenTegra\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-20T20:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-01T20:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chase Newmyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xentegra\" \/>\n<meta name=\"twitter:site\" content=\"@xentegra\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chase Newmyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"31 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/\"},\"author\":{\"name\":\"Chase Newmyer\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\"},\"headline\":\"56: Nutanix Weekly: Immutable Backup: The Best Defense Against Ransomware\",\"datePublished\":\"2022-07-20T20:00:00+00:00\",\"dateModified\":\"2025-07-01T20:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/\"},\"wordCount\":6892,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"keywords\":[\"Nutanix Weekly\"],\"articleSection\":[\"Podcast\"],\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/\",\"name\":\"Nutanix Weekly: The Best Defense Against Ransomware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"datePublished\":\"2022-07-20T20:00:00+00:00\",\"dateModified\":\"2025-07-01T20:50:00+00:00\",\"description\":\"Your data is the #1 target for attackers. Ensure Business continuity and data recovery with immutable backups.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Nutanix-Weekly.png\",\"width\":1100,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/resources\\\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xentegra.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"56: Nutanix Weekly: Immutable Backup: The Best Defense Against Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#website\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"name\":\"XenTegra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xentegra.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#organization\",\"name\":\"XenTegra\",\"url\":\"https:\\\/\\\/xentegra.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"contentUrl\":\"https:\\\/\\\/xentegra.com\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/1519903807641-min.jpg\",\"width\":200,\"height\":200,\"caption\":\"XenTegra\"},\"image\":{\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XenTegra\\\/\",\"https:\\\/\\\/x.com\\\/xentegra\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xentegra-llc\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xentegra.com\\\/#\\\/schema\\\/person\\\/84736408f096bfd92b80305aea8846a7\",\"name\":\"Chase Newmyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g\",\"caption\":\"Chase Newmyer\"},\"url\":\"https:\\\/\\\/xentegra.com\\\/fr\\\/resources\\\/author\\\/chasenewmyer\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Nutanix Weekly: The Best Defense Against Ransomware","description":"Your data is the #1 target for attackers. Ensure Business continuity and data recovery with immutable backups.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/","og_locale":"fr_CA","og_type":"article","og_title":"Nutanix Weekly: The Best Defense Against Ransomware","og_description":"Your data is the #1 target for attackers. Ensure Business continuity and data recovery with immutable backups.","og_url":"https:\/\/xentegra.com\/fr\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/","og_site_name":"XenTegra","article_publisher":"https:\/\/www.facebook.com\/XenTegra\/","article_published_time":"2022-07-20T20:00:00+00:00","article_modified_time":"2025-07-01T20:50:00+00:00","og_image":[{"width":1100,"height":600,"url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","type":"image\/png"}],"author":"Chase Newmyer","twitter_card":"summary_large_image","twitter_creator":"@xentegra","twitter_site":"@xentegra","twitter_misc":{"\u00c9crit par":"Chase Newmyer","Estimation du temps de lecture":"31 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#article","isPartOf":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/"},"author":{"name":"Chase Newmyer","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7"},"headline":"56: Nutanix Weekly: Immutable Backup: The Best Defense Against Ransomware","datePublished":"2022-07-20T20:00:00+00:00","dateModified":"2025-07-01T20:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/"},"wordCount":6892,"commentCount":0,"publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","keywords":["Nutanix Weekly"],"articleSection":["Podcast"],"inLanguage":"fr-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/","url":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/","name":"Nutanix Weekly: The Best Defense Against Ransomware","isPartOf":{"@id":"https:\/\/xentegra.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","datePublished":"2022-07-20T20:00:00+00:00","dateModified":"2025-07-01T20:50:00+00:00","description":"Your data is the #1 target for attackers. Ensure Business continuity and data recovery with immutable backups.","breadcrumb":{"@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#primaryimage","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2024\/03\/Nutanix-Weekly.png","width":1100,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/xentegra.com\/resources\/nutanix-weekly-immutable-backup-the-best-defense-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xentegra.com\/"},{"@type":"ListItem","position":2,"name":"56: Nutanix Weekly: Immutable Backup: The Best Defense Against Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/xentegra.com\/#website","url":"https:\/\/xentegra.com\/","name":"XenTegra","description":"","publisher":{"@id":"https:\/\/xentegra.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xentegra.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/xentegra.com\/#organization","name":"XenTegra","url":"https:\/\/xentegra.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/","url":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","contentUrl":"https:\/\/eadn-wc05-13529174.nxedge.io\/wp-content\/uploads\/2023\/06\/1519903807641-min.jpg","width":200,"height":200,"caption":"XenTegra"},"image":{"@id":"https:\/\/xentegra.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XenTegra\/","https:\/\/x.com\/xentegra","https:\/\/www.linkedin.com\/company\/xentegra-llc"]},{"@type":"Person","@id":"https:\/\/xentegra.com\/#\/schema\/person\/84736408f096bfd92b80305aea8846a7","name":"Chase Newmyer","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d46cd44f0bd433dc5a386cbac549c62fd92266e3951669c705b347be2130cca3?s=96&d=mm&r=g","caption":"Chase Newmyer"},"url":"https:\/\/xentegra.com\/fr\/resources\/author\/chasenewmyer\/"}]}},"_links":{"self":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/65708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/comments?post=65708"}],"version-history":[{"count":1761,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/65708\/revisions"}],"predecessor-version":[{"id":716398,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/posts\/65708\/revisions\/716398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media\/65766"}],"wp:attachment":[{"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/media?parent=65708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/categories?post=65708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xentegra.com\/fr\/wp-json\/wp\/v2\/tags?post=65708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}