Market Research
Veeam Research Finds Organizations are Increasing Modern Data Protection for Cloud Workloads to Reduce Cyber Security Risks

Veeam Software has released the findings of the company’s Cloud Protection Trends Report 2023, covering four key “as a Service” scenarios: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Backup and Disaster Recovery as a Service (BaaS/DRaaS). The survey found that companies are recognizing the increasing need to protect their SaaS environments. For example, nearly 90% of Microsoft® 365 customers surveyed use supplemental measures rather than relying solely on built-in recovery capabilities. Preparing for a rapid recovery from cyber and ransomware attacks was the top cited reason for this backup, with regulatory compliance as the next most popular business driver.
Highlights of the report:
- While new IT workloads are launching in the cloud at far faster rates than old workloads are being decommissioned in the data center, a surprising 88% brought workloads from the cloud back to their data center for one or more reasons, including development, cost/performance optimization, and disaster recovery.
- With cybersecurity (including ransomware) continuing to be a critical concern, data protection strategies have evolved, and most organizations are delegating backup responsibilities to specialists, instead of requiring each workload (IaaS, SaaS, PaaS) owner to protect their own data. The majority of backups of cloud workloads are now being done by the backup team and no longer require the specialized expertise or added burden of cloud administrators.
- Today, 98% of organizations utilize a cloud-hosted infrastructure as part of their data protection strategy. DRaaS is perceived as surpassing the tactical benefits of BaaS by providing expertise around Business Continuity and Disaster Recovery(BCDR) planning, implementation, and testing. Expertise is recognized as a primary differentiator by subscribers choosing their BaaS/DRaaS provider, based on business acumen, technical IT recovery architects, and operational assistance in planning and documentation of BCDR strategies.
- Unfortunately, as is often the case for new cloud-hosted architectures, some PaaS administrators are incorrectly presuming that the native durability of cloud-hosted services relieves the need for backup: 34% of organizations do not yet back up their cloud-hosted file shares, and 15% do not back up their cloud-hosted databases.
“The growing adoption of cloud-powered tools and services, escalated by the massive shift to remote work and current hybrid work environments, put a spotlight on hybrid IT and data protection strategies across industries,” said Danny Allan, CTO and Senior Vice President of Product Strategy at Veeam. “As cybersecurity threats continue to increase, organizations must look beyond traditional backup services and build a purposeful approach that best suits their business needs and cloud strategy. This survey shows that workloads continue to fluidly move from data centers to clouds and back again, as well as from one cloud to another — creating even more complexity in data protection strategy. The results of this survey show that while modern IT enterprises have made significant strides in cloud and data protection, there is still work to be done.”
The Veeam Cloud Protection Trends Report 2023 findings include:
Software as a Service (SaaS):
- 90% of organizations realize they need to back up Microsoft 365. The report revealed only 1 in 9 (11%) organizations do not protect their Microsoft 365 data — a promising majority of 89% use third-party backups/BaaS or enhanced tiers of Microsoft 365 for legal hold, or both.
- As data protection strategies have evolved and ransomware continues to be a top concern, most organizations are delegating backup responsibilities to backup specialists, instead of requiring each workload (IaaS, SaaS, PaaS) owner to protect their own data. This fuels the progression of backup becoming a conventional component tasked to the traditional backup admin versus the application team.
Infrastructure as a Service (IaaS): While organizations of all sizes now embrace hybrid-cloud architectures, it is not a one-way journey to the cloud that reduces the importance of the modern data center.
- 30% of cloud-hosted workloads were from “cloud first” strategies, whereby new workloads are starting in clouds at far faster rates than old workloads are being decommissioned in the data center.
- 98% of organizations utilize a cloud-hosted infrastructure as part of their data protection strategy, including cloud-storage tiers, cloud infrastructure as their disaster recovery site, or the use of BaaS/DRaaS providers.
- 88% of organizations brought workloads from the cloud back to their data center for one or more reasons (development, cost/performance optimization, or disaster recovery) — highlighting a need for 2023 data protection strategies to ensure consistent protection and the ability to migrate, as workloads move from the data center to cloud, cloud to the data center, or from one cloud to another cloud.
- The majority of backups of cloud workloads are now being done by the backup team and no longer require the specialized expertise or added burden of cloud administrators. However, while nearly every organization acknowledged having long-term regulatory mandates, only half of organizations retain backups of their cloud data for even one year.
Platform as a Service (PaaS): While most organizations initially “lift and shift” servers from the data center to IaaS, most agree that running foundational IT scenarios, such as file shares or databases, as native cloud services is the future for mature IT workloads:
- 76% run file services within cloud-hosted servers and 56% run managed file shares from AWS or Microsoft Azure
- 78% run databases within cloud-hosted servers and 65% run managed databases from AWS or Microsoft Azure
Backup and Disaster Recovery as a Service (BaaS/DRaaS): Nearly every IaaS/SaaS environment also utilizes cloud services as part of its data protection strategy in some form.
- 58% of organizations utilize managed backup (BaaS) compared to the 42% that utilize cloud storage as part of their self-managed data protection solution. Of special interest, nearly half(48%) started with self-managed cloud storage but eventually switched to BaaS.
- Nearly every organization (98%) claims to use cloud services as part of their data protection strategy, though that varies from cloud storage as a repository to full-fledged BaaS or DRaaS services.
- BaaS is predominantly sought for gaining operational and economic efficiencies, as well as assuring data survivability from disasters and ransomware attacks. It is notable that BaaS is no longer seen as the “tape killer” that early pundits offered, with organizations stating that nearly 50% of their data is still stored on tape during its lifecycle, regardless of their use of cloud-based data protection services.
- DRaaS is perceived as surpassing the tactical benefits of BaaS by providing expertise around BCDR planning, implementation, and testing. Expertise is perceived as a primary differentiator by subscribers choosing their BaaS/DRaaS provider, based on business acumen, technical IT recovery architects, and operational assistance in planning and documentation of BCDR strategies.
This year’s report showed a significant shift from last year as customers are increasingly interested in outsourcing their backups and gaining a “turnkey” or “white-glove” level of management service instead of the internal IT staff continuing to manage BaaS-delivered infrastructure. This shift indicates that experience and trust in providers are increasing and could also point to challenges over the past year with the IT talent supply chain.
The Veeam Cloud Protection Trends Report 2023, born from the annual Veeam Data Protection Trends Report, is the result of a third-party research firm that surveyed 1,700 unbiased IT leaders from 7 countries (US, UK, France, Germany, Japan, Australia, New Zealand) on their use of cloud services in both production and protection scenarios to deliver the largest single view into the trajectory of hybrid strategies across the modern IT enterprise in today’s cloud-first digital landscape. The broad-based market study was conducted to understand the various perspectives on responsibilities and methodologies related to operating and protecting cloud-hosted workloads, and considerations when using cloud-powered data protection.
Cyber Security
Kaspersky Reports Growth in Gamer Cyberattacks in 2023

The global gaming community, which currently accounts for nearly half of the world’s population, has found itself increasingly under fire by cybercriminals, according to a comprehensive investigation by Kaspersky. In the period spanning from July 2022 to July 2023, the cybersecurity company discovered the growing vulnerability of the gaming user base. Cybercriminals exploited this vast community to access personal data, launching a range of attacks, including web vulnerabilities, Distributed Denial of Service (DDoS) attacks, cryptocurrency mining, and complex Trojan or phishing campaigns.
In the period from July 1, 2022, to July 1, 2023, Kaspersky’s solutions detected a substantial 4,076,530 attempts to download 30,684 unique files masked as popular games, mods, cheats, and other game-related software. These incidents affected 192,456 users worldwide. These files – primarily classified as unwanted software and often labelled as not-a-virus:Downloader (89.7%), – are not innately perilous, but they are capable of downloading various other programs, even malicious ones, onto the user’s device. Adware (5.3%) and Trojans (2.4%) were also noteworthy threats to desktop gamers.
Minecraft emerged as the favoured target among cybercriminals, responsible for triggering 70.3% of all alerts. The threats using Minecraft as bait impacted 130,619 players across the globe during the reporting period. Roblox was the second most targeted game title, contributing to 20.4% of all alerts affecting 30,367 users. Counter-Strike: Global Offensive (4.8%), PUBG (2.9%), Hogwarts Legacy (0.6%), DOTA 2 (0.5%), and League of Legends (0.3%) were also among the prominent games subjected to cyber threats.
The mobile gaming community, which, according to the Newzoo 2023 report consists of over three billion gamers or nearly 40% of the world’s population, is characterized by its significant growth and accessibility and has become an enticing target for cybercriminals. Between July 1, 2022, and July 1, 2023, Kaspersky documented 436,786 attempts to infect mobile devices, impacting 84,539 users.
Various game titles were employed as bait to target mobile gamers. Minecraft enthusiasts once again were the primary targets, as 90.4% of attacks focused on the 80,128 gamers who fell victim. Indonesian users in particular faced exploitation through Minecraft, resulting in a Trojan.AndroidOS.Pootel.a attack, discreetly registering mobile subscriptions. Iran witnessed the highest prevalence of these attacks, with 140,482 alerts impacting 54,467 Minecraft players.
PUBG: Battlegrounds Battle Royale, was the second most exploited mobile game among cybercriminals, accounting for 5.09% of all alerts, with the majority of incidents originating from Russian Federation users. Roblox (3.33%) ranked third in terms of detections but second in the number of affected users.
A noteworthy discovery involves the emergence of SpyNote, a spy Trojan distributed among Roblox users on the Android mobile platform under the guise of a mod. This Trojan exhibits various spying capabilities, including keylogging, screen recording, video streaming from phone cameras, and the ability to impersonate Google and Facebook applications to deceive users into divulging their passwords.
Phishing and counterfeit distribution pages continue to pose a significant threat to gamers. Malicious and undesired software often masquerades as popular games, disseminated through third-party websites offering pirated versions. These deceptive pages typically display inflated download counts, potentially misleading users into a false sense of security. Nonetheless, clicking the download button typically results in an archive that may contain harmful or unrelated elements, diverging from the promised content.
“In the dynamic gaming industry, which hosts a wealth of personal and financial data, cybercriminals are seizing enticing opportunities. They exploit gaming accounts by pilfering in-game assets, and virtual currency, and selling compromised gaming accounts, often with real-world value. The relentless pursuit of personal data has led to a surge in ransomware attacks, even affecting professional gamers who depend on uninterrupted play. This underscores the critical need for enhanced cybersecurity awareness within the gaming community,” comments Vasily Kolesnikov, a cybersecurity expert at Kaspersky.
To stay safe while gaming, here are some recommendations:
- It is safer to download your games from official stores like Steam, Apple App Store, Google Play or Amazon Appstore only. Games from these markets are not 100 % secure, but at least they are checked by store representatives and there is some kind of screening process: not every app can be made available in these stores.
- If you wish to buy a game that is not available through the main stores, purchase it from the official website only. Double-check the URL of the website and make sure it is authentic.
- Beware of phishing campaigns and unfamiliar gamers. Do not open links received by email or in a game chat unless you trust the sender. Do not open files you get from strangers.
- Do not download pirated software or any other illegal content, even if you are redirected to it from a legitimate website.
- A strong, reliable security solution will be a great help to you, especially if it will not slow down your computer while you are playing, but at the same time, it will protect you from all possible cyber threats.
- Use a robust security solution to protect yourself from malicious software and its activity on mobile devices.
Cyber Security
The Average Time to Investigate a Cybersecurity Incident is Around 26.1 Days, says Binalyze

With the intricacies of the digital world growing exponentially, the relevance of effective and timely Digital Forensics and Incident Response (DFIR) cannot be overstated. Recognising this need for insight, Binalyze, in collaboration with the global market intelligence firm IDC, is excited to publish a compelling new report: “The State of Digital Forensics and Incident Response 2023”.
Based on an extensive survey conducted in June 2023, the study brings into focus the perspectives of over 100 cybersecurity professionals from five Middle Eastern countries. This diverse respondent pool consists of individuals directly influencing the cybersecurity functions within their organizations, with roles spanning SOC analysts, DFIR professionals, Incident responders, Threat hunters, SOC managers, and Directors.
The key findings of the report are critical for anyone involved in DFIR, from SOC teams to individual analysts and investigators. Report highlights include:
- According to the research and subsequent analysis, the average time to investigate an incident is approximately 26.1 days, and the time to resolve incidents is an additional 17.1 days.
- The importance of reducing “detection-to-resolution” times for efficient incident management.
- The ongoing skills shortage: 81% of respondents identified this as a major challenge.
“Our world thrives on digital connections, but with this connectivity comes vulnerabilities. As the frequency and intensity of cyber threats surge, the importance of DFIR in understanding, mitigating, and learning from these threats is paramount. There is a real and urgent need for forensic visibility at speed and scale. AIR is a game changer here and should be at the centre of all SOCs DFIR effort,” says Ahmet Öztoprak, Senior Sales Director of META at Binalyze.
This report serves as both a wake-up call and a guide. By leveraging the insights from the top cybersecurity professionals in the Middle East, ‘The State of Digital Forensics and Incident Response 2023’ aims to provide companies with the knowledge and solutions they need to combat emerging cyber threats effectively and maintain resiliency.
Cyber Security
Cybercriminals Used Malware in 7 Out of 10 Attacks on Individuals in the Middle East

Positive Technologies analyzed attacks on individuals in Middle Eastern countries between 2022 and 2023. Malware was used in 70% of successful attacks. More than half of these attacks involved spyware. The vast majority of attacks used social engineering techniques. In 20% of phishing campaigns, the attack was multi-pronged, exploiting multiple social engineering channels simultaneously.
“According to our data, cybercriminals employed malware in 7 out of 10 successful attacks on individuals in the Middle East region. More often than not, the attackers infected users’ devices with spyware (three out of five malware attacks). This type of malware collects information from the infected device and then passes it on to the attacker. Depending on the task, spyware can steal personal and financial data, user credentials, as well as files from the device’s memory,” the company said.
Positive Technologies Information Security Research Analyst Roman Reznikov said, “By using spyware, attackers can compromise not only personal and payment information and personal accounts, but also corporate credentials, network connection information, and other sensitive data. The stolen data is then offered for sale on the dark web forums. As a result, a skilled attacker can gain access to an organization and carry out a successful attack, leading to non-tolerable consequences: disruption of technological and business processes, theft of funds, leakage of confidential information, attacks on customers and partners.”
In the vast majority (96%) of successful attacks on individuals in Middle Eastern countries, social engineering techniques were employed. Most often, these were mass attacks in which the criminals aimed to reach the maximum number of victims. To achieve this, they actively leveraged current news about significant global and regional events, including the 2022 FIFA World Cup Qatar.
In every fifth (20%) phishing campaign, the attack was multi-pronged, exploiting multiple social engineering channels simultaneously. Criminals led the victims through a series of steps until the device was infected and data stolen. For instance, users could be lured through social media accounts that contained links to a messenger channel from which the victim would install a malicious application.
One of the reasons for the success of social engineering is the numerous data leaks from various organizations. “According to our research on the cybersecurity threatscape in the Middle East, 63% of successful attacks on individuals in the region resulted in leaks of confidential information. The majority of stolen information consisted of personal data (30%) and account credentials (30%). Cybercriminals were also interested in payment card data (10%) and user correspondence (8%).” the company added.
On the dark web, malicious actors sell information about users and also provide stolen data archives for free. Criminals use the compromised information in subsequent attacks on users. For example, a successful attack on a bank could result in fraudulent actions against its customers. Cybersecurity experts recommend that users follow cyber-hygiene rules.
Companies also need to ensure the security of employee and customer data. Data breaches cause reputational and financial damage and put at risk users whose information has been compromised. To maintain cyber-resilience, it’s essential to regularly assess the effectiveness of security measures and pay special attention to the verification of non-tolerable events.
-
Cyber Security4 days ago
Databases Are the Black Boxes for Most Organisations
-
News5 days ago
Proofpoint Appoints Sumit Dhawan as Chief Executive Officer
-
News1 week ago
SonicWall Acquires Solutions Granted Inc.
-
Cyber Security6 days ago
Cybersecurity on a Budget: Affordable Cybersecurity Strategies for Small Businesses
-
Cyber Security5 days ago
ManageEngine Intros Enhanced SIEM with Dual-Layered System for Better Precision in Threat Detection
-
Cloud5 days ago
Google Clarifies the Cause of Missing Google Drive Files