Tape Media

Tape Drives

Ethernet LTO Tape Drives

Tandberg Data RDX QuikStor

Tandberg Data RDX QuikStation

HP RDX Removable Disk

Quantum SuperLoader 3

Quantum Scalar i3 LTO

Qualstar LTO Tape Libraries

Qualstar Q8 Tape Autoloader

Qualstar Q24 Tape Autoloader

Qualstar Q48 Tape Autoloader

Qualstar Q40 Tape Library

Qualstar Q80 Tape Library

Qualstar Tape Libraries

Overland NEO Tape Libraries

Overland NEOs StorageLoader

Overland NEOs T24 Loader

Overland NEOs T48 Library

Overland NEOxl 40 Series

Overland NEOxl 80 Series

Tape Drive Autoloaders

HP StoreEver Tape Libraries

HP StoreEver MSL3040

Archiware P5 Software

XenData LTO Archive

Facilis Technology

SnapServer XSR NAS Series

Nexsan Storage

ATTO SAS / Thunderbolt

Cables & Terminators

Barcode Labels

Turtle Storage Cases

Quantum Scalar i3 Warranty

Removable Disk Storage

Imation RDX

Imation RDX Bundles

Tandberg RDXLock WORM

Quantum RDX

HP RDX+ Bundles


Dell RD1000

Reconditioned Tape Drives

Custom Sequence Barcode Labels for all your Tape Media - DLT, SDLT AIT and LTO FREE LTO BARCODE LABELS

LTO-9 Tape Drives LTO-9 Tape Libraries Now Available

SymplyPro LTO Archiving Solutions LTO-8 and LTO-9

Browse by Manufacturer
Mailing Lists

Ransomware Attacks - On the Rise Again

In a recent report by Enterprise Strategy Group, ransomware attacks have been found to be on an upward spiral.

learn how you can defend your organization against the latest trend of severe cloud attacks. As IT executives manage storage resources and access to data the ever present threat of a cyberattack on the infrastructure looms heavy on their minds. Cyberattacks are not only back, they never left and are on the rise. As reported by the Enterprise Strategy Group ransomware attacks affected 79% of respondent organizations. We will examine this menacing trend beginning with a severe cloud attack and how you can defend against it with help from LTO technology.

Cloud Attack

A cloud host service provider was hit hard by a ransomware attack that affected almost all of their clients. A recent Yahoo Finance article described the incident stating that “The Denmark-based cloud company said the ransomware attack began Friday, during which cybercriminals shut down all systems, including its website and email, and encrypted customer systems and websites.” The victim stated that, “The attackers succeeded in encrypting all servers’ disks, as well as on the primary and secondary backup system, whereby all machines crashed and we lost access to all data.” Apparently the attackers gained access to nearly all online primary and backup disk systems. Could offline secure backup have helped this unfortunate victim and their clients to regain access to their data? Read on.

Attacks are on the Rise

Ransomware attacks increased by 37%, with the average ransomware payment at over $800K (USD), a nearly 5X increase over the previous year. The report notes that, “On average, organizations that suffered attacks in the last year took one month to recover from the most significant attack – a long time for most companies.” The attack on the Danish CSP is a trend seen more and more, which are attacks on supply chains, that is, attacks that widen the net. A TechTarget article explains that, “Instead of attacking a single victim, supply chain attacks extend the blast radius. A prime example of [this type of] a ransomware attack is the 2021 attack [on a software firm], which affected at least 1,500 of its managed service provider customers.”

Proactive Defense is the Key

Organizations that make themselves difficult targets have the best chance of forcing the cybercriminals to just move on.” IDC elaborates that a number of crucial defensive strategies should be employed including:

  • Encryption – Data should be encrypted at rest on primary storage and in flight when being sent over a network and when stored in a backup data set.
  • Air gap – Air gap is a means of taking a data copy, usually a backup copy, offline so that it is physically disconnected from any network and therefore inaccessible to cybercriminals.
  • 3-2-1-1 backup strategy – 3-2-1-1 is an update to the old 3-2-1 strategy. This means three copies of the data on two different types of media, with one copy onsite and offline and one copy offsite and offline.

LTO technology can address each of these defense strategies: “LTO tape drives have government-grade encryption built in. Because this encryption is at the hardware level, it can be implemented without performance penalty. Encrypted tapes will be useless to anyone without the encryption key.” LTO tapes can support air gap strategies; “The removal of tapes from a library eliminates the physical connectivity needed to access, modify, or delete the data on the cartridges.” And, to support a solid backup strategy, “Tape can serve as the second media type, the onsite/offline copy as well as the offsite/offline copy of data (the 2-1-1 part of the strategy). Cybercrime, especially ransomware attacks, are prevalent. Be prepared, be proactive, protect your data and your organization – use LTO technology.


Contact your BackupWorks Account Rep today and Ask about LTO Tape Technology at 866 801 2944

Shopping Cart
Your cart is empty.

Tandberg Data RDX Quikstor Removable Disk Cartridges

RDX 10 Pack Promotion - celebrating 10 Years of RDX Technology

SnapSever XSR120 and XSR40 Available

Quantum Scalar i3 LTO-9 Now Available and Shipping

Free Shipping UPS Ground - $500 min. order

Repair Services - 6 Month Warranty Fast Turnaround

Outlet Center - Refurbished Tape Drives - 6 Month Warranty