Ransomware hackers today are getting smarter and more sophisticated. The new object of their desire is often your backups, and the only way to protect them is to keep them inherently secure. This is why security must begin at the point of data.
As detailed in our previous blog, a Zero Trust Architecture (ZTA) trusts nothing and assumes that all users, devices, and applications are untrustworthy and may have already been compromised. Trust nothing. Verify everything. The strategy is to reduce the risk of intrusion and limit the ability of hackers to remove your last line of defense, your backup data.