Macrium Software
US Customer Sales: (347)-565-5912
UK Customer Sales: 0330 380 0615
  • Products
    Standalone
    • Buy Now
    • Workstation
    • Server
    • Server Plus
    Site Backup
    • Buy Now
    • Site Manager
    • MultiSite
    • Workstation
    • Server
    • Starter Pack
    • Virtual Server
    Technicians
    • Buy Now
    • Technicians License
    • SiteDeploy
    Personal
    • Macrium Reflect Home
    Upgrade Products
    • Upgrade License
    • Renew Support
    Business
    Standalone
    Buy Now
    Workstation
    Server
    Server Plus
    Site Backup
    Buy Now
    Site Manager
    MultiSite
    Workstation
    Server
    Starter Pack
    Virtual Server
    Technicians
    Buy Now
    Technicians License
    Deployment Kit
    SiteDeploy
    Misc (invisible parent)
    Personal
    Macrium Reflect Home
    Reflect Free
    Upgrade Products
    Upgrade License
    Renew Support
  • Solutions
    Disaster Recovery Ransomware Protection Scalable Backup
  • Support
    Submit a Ticket
    My Order History Upgrades Renewals
    Forum Knowledgebase
  • Partners
    Find a Reseller Find a Distributor
    Become a Partner Become an MSP
    Reseller Log In Reseller Registration
  • Company
    Contact Us Our Story Resources Media Pack Careers and Culture Blog
UK Customer Sales: 0330 380 0615
US Customer Sales: (347)-565-5912

Macrium Software

Blog

Review of the trends in the second half of 2018

Posted at Jun 19, 08:41h in ransomware Adriana Rocha Ceres, Marketing Categories: ransomware, cybersecurity, backup-software, macrium, backup

Recently, Macrium Software participated in different events where we presented some predictions about the future of IT trends, focused on data protection and security.

Business Trends 2018:

To begin the analysis, we looked at the top 5 business trends and influences for 2018:

  1. Collaboration & Prosperity — despite what seems like constant negative news, 2017 was the best year ever for humanity (UN)*.
  2. Automation — humans or robots?*
  3. Consumption habits — how our customers’ habits evolve*
  4. The growth of data and the use of it will accelerate — increases risk**
  5. Technology — continues to play a growing part in all aspects of the business — benefit and a risk**

No real surprise with the inclusion of automation, technology, data and consumption habits. The fact that 2017 was the most prosperous year ever for humanity based on; health, wealth and wars is not something you see in the headline news. Nevertheless, it is a breath of fresh air from the relentless negativity we usually hear from our politicians and media!

The top 5 IT Security Threats:

We want to look at the top IT security threats as ranked by IDG for 2018:***

1. Crime-as-a-service (CaaS) will expand available tools and services.

2. The internet of things (IoT) will further add unmanaged risks.

3. The Supply Chain will remain the weakest link in risk management.

4. Layers of Regulation will add to the complexity of critical asset management.

5. Unmet board expectations (allocated budget) will be exposed to significant incidents.

CaaS is not a surprising development given the global nature of, and ease of access to, the necessary tools if cybercrime is the desired outcome. The enhancement and implementation of new regulations such as GDPR, and the security exposure through supply chains is familiar to most IT professionals. Expectations from senior executives that money will solve all the problems and protect their company from exposure and public embarrassment will on occasion not be met. The point is that money cannot solve the problem but analysis of the threats, detection of threats, prevention and rapid recovery.

2018 and the Future:

As part of the analysis it was important to consider the areas that most concern IT professionals and how these have changed in the past 12 months. We identify four areas that changed in the trends from 2017 to 2018:

1. Risk perception — Country of origin of commercial software is becoming more of a concern when assessing the level of risk. Rightly or wrongly some countries are regarded with greater suspicion and software from these countries is being removed from the US and some European government agencies.

2. Visibility — The vast amount of coverage of ransomware and data security issues for the number of companies, coupled with the implementation of GDPR means visibility and awareness are at an all-time high.

3. Accountability — Senior executives are held accountable for failures and breaches irrespective of whether they were an external attack or failure of responsibility by a junior technician.

4. The scope of threat — with the advent of CaaS and the ease of access, the age and vulnerability of many IT infrastructures, the number and type of risks are at an all-time high.

Threat Mitigation and Macrium Solutions:

When considering the threats and solutions to data protection, the model used is CIA: Confidentiality, Integrity, and Availability. The needs are, firstly around controlling access to data, then ensuring information is fit for purpose and finally, making sure it is available to those people and system who need access.

At Macrium we regard our solutions help to address the Integrity and Availability needs. Detection is the first line of defence for data, and there are many outstanding and feature-rich solutions for edge security, access control, malware and virus protection, and update management. All companies and individuals should take this seriously and get expert help if they are unsure of their needs.

Prevention of threats is the next step, and while there are many solutions for blocking detected threats, sometimes this is not enough. Therefore at Macrium Software, we have implemented solutions such as Macrium Image Guardian that prevents backups from being encrypted. It is an extra layer that compliments other dedicated security systems.

The ability to quickly recover from an attack or data loss is the final and crucial layer. Macrium Software has many fast and reliable backup tools, as well as, viBoot. The ability to very quickly booting a previous backup as a Hyper-V virtual machine ensures that business can continue operating and minimise the impact of system failure and malicious activity.

In summary, IT security threats are many and varied, with an ever-expanding opportunity for companies to become the victims of malicious activity. At Macrium Software we believe in the layered approach to protection and recovery, using the best of breed tools to detect, prevent and recover from data loss events.

Find out more by taking a look or trialling our solutions here:

  • Macrium Software | Workstation
  • Macrium Software | Home Edition

Sources:

*https://www.unilever.com/news/news-and-features/Feature-article/2018/what-are-the-trends-driving-the-future-of-business.html

**https://about.futurelearn.com/blog/the-future-of-business

***CIO (IDG) https://www.cio.com/article/3237784/security/5-information-security-threats-that-will-dominate-2018.html


Previous Post

How Many Backups Are Needed to Secure Business Continuity and Data Availability?

Next Post

Macrium Site Manager

Recent Posts

  • Introducing Macrium Site Manager 8.1
  • How to Create Strong Passwords and Remember Them
  • Macrium awarded UK’s Best Workplaces™ recognition!
  • World Backup Day 2023
  • Macrium Software is officially one of the UK's Best Workplaces™ for Wellbeing!

Popular Posts

  • Cloning a disk with Macrium Reflect 8 (129093)
  • The Macrium Rescue Environment (70426)

Tags

All Tags
backup
macrium-reflect
product
cybersecurity
company
macrium
microsoft
infosec
techie-tuesday

Archive

All >
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012

Latest Blog Posts


Introducing Macrium Site Manager 8.1
09-Jun-2023
The latest version of our sitewide backup system, Macrium Site Manager 8.1, is...

How to Create Strong Passwords and Remember Them
04-May-2023
Using passwords is a flawed system. But until something better comes along,...

Macrium awarded UK’s Best Workplaces™ recognition!
26-Apr-2023
Macrium has been recognised as one of the UK’s Best Workplaces™ (2023) today by...

Latest Videos


"A Competitive Edge Unheard of in Our Industry" - Sysmex on Macrium's Backup and Recovery Solution
12-Mar-2025
Hear directly from Sysmex America's leadership team about the transformative impact Macrium Reflect has had on their service...

Sysmex Reduces Labor Costs by 75% with Macrium Backup and Recovery | Healthcare OEM Case Study
12-Mar-2025
Discover how Sysmex America, a leading provider of healthcare diagnostic equipment, transformed their service delivery with...

See what simple Windows deployment looks like - Macrium SiteDeploy
10-Feb-2025
Are you struggling with time-consuming Windows deployments? Are you trying to migrate users to Windows 11 or roll out...

Latest Tweets


Subscribe to our Newsletter


Loading...

You can unsubscribe at any time. We respect your privacy, details here.

Copyright © Paramount Software UK Limited 2025 Macrium Reflect® is a registered trademark of Paramount Software UK Limited
Contact | Terms & Privacy Policy