{"id":523096,"date":"2024-08-06T05:06:27","date_gmt":"2024-08-06T09:06:27","guid":{"rendered":"https:\/\/www.commvault.com\/?p=523096"},"modified":"2024-08-14T13:05:16","modified_gmt":"2024-08-14T17:05:16","slug":"enhancing-cyber-resilience-in-hybrid-work-environments","status":"publish","type":"post","link":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments","title":{"rendered":"Expert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments"},"content":{"rendered":"\n

How do you take an hour\u2019s worth of viewpoints from a panel of leading experts and condense it into a 5-minute read, designed to provide actionable advice you can immediately use?<\/strong> That\u2019s the challenge I posed to myself as I prepared to write this blog, so let me know if I delivered. As moderator of the panel, I will share that this group laid out sound guidance based on fresh research and 60+ combined years of data industry experience. You can listen to the full panel discussion here<\/a>.<\/p>\n\n\n\n

The panel:<\/strong> Ken Malcolmson, Chief Security Advisor at Microsoft; Tony Palmer, Principal Validation Analyst at Enterprise Strategy Group (ESG); and Dalton Hirst, Senior Sales Engineer at Commvault.<\/p>\n\n\n\n

Their goal:<\/strong> Provide proven recommendations and guidance on how to better prepare for the next cyberattack. What immediate steps can you take to avoid disruption and chaos when it takes place? Although there was a wealth of knowledge and experience shared, here are some highlights:<\/p>\n\n\n\n

Cyber recovery is not the same as disaster recovery<\/strong><\/p>\n\n\n\n

Tony shared ESG\u2019s research validating that \u201c89% of those interviewed ranked ransomware as a top 5 threat to their organization, and that the ability to recover to a clean environment is essential to cyberattack recovery \u2013 and that cyber recovery is not the same as disaster recovery, so you need an entirely new plan and process. What you did for disaster recovery will not work when a cyberattack hits.\u201d<\/p>\n\n\n\n

In a nutshell, a new approach and plan is needed if you are going to be successful at protecting your business when the next attack targets your organization.<\/p>\n\n\n\n

You have to be able to trust your backups \u2013 and restore to a clean environment<\/strong><\/p>\n\n\n\n

Ken emphasized the importance, when it comes to recovery after a cyber incident, of knowing that you have a trusted clean environment and that you have a process in place to restore your clean data to clean infrastructure. <\/p>\n\n\n\n

Ken shared that \u201cyou must have backups, you must test your backups, and you must trust your backups.\u201d He added, \u201cthat\u2019s where I see the value in both Commvault Cloud and Cleanroom Recovery come into play. If I\u2019m in a panic and trying to recover, I want to be 100% sure the data I\u2019m recovering is trustworthy, and that\u2019s where the Commvault piece comes in, and I want to make sure that where I\u2019m restoring to is also trustworthy, and that\u2019s the Commvault Cleanroom Recovery solution. That\u2019s it.\u201d <\/p>\n\n\n\n

Simplified protection for Microsoft 365 is essential to productivity<\/strong><\/p>\n\n\n\n

Microsoft 365 is central to the productivity of most organizations, and enhancing its protection is crucial. Dalton discussed the simplicity of Commvault\u2019s M365 cyber resilience solution. With it, he shared that customers \u201ccan now go in, select the data they need to restore, and restore it as needed.\u201d This capability is crucial for responding to user requests efficiently, particularly under the stress of potential data loss scenarios.<\/p>\n\n\n\n

After the live demo, Ken added, \u201cI love the simplicity [of the Commvault] approach. When customers are panicking and trying to recover their data [in M365], they don\u2019t want to have to click through menus and different options … there\u2019s my recovery point, that\u2019s the data that\u2019s in there, go. I love that!\u201d<\/p>\n\n\n\n

Plan, test \u2013 and when you need to recover, it\u2019s got to be clean<\/strong><\/p>\n\n\n\n

As the session wrapped up, Tony provided his closing advice: \u201cIn a nutshell, cyber resilience really requires a detailed and secure cyber recovery plan, and you need to do that regular, auditable testing to ensure that you can recover quickly and more importantly, into a clean environment that’s free from infection. In our testing and our research and our analysis, Enterprise Strategy Group confirmed very clearly that Commvault Cleanroom Recovery delivers what\u2019s needed to accomplish all this. You can literally, with a click, recover into an assured clean environment.\u201d<\/p>\n\n\n\n

Watch the webinar on-demand here<\/a>, and learn more about our solutions – request a demo<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"

Microsoft, ESG experts share their knowledge.<\/p>\n","protected":false},"author":164,"featured_media":523097,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_custom_css":"","_custom_js_footer":"","_page_background_color":"","_remove_from_search":false,"_dark_mode":false,"_light_footer_mode":false,"_sidebar_form":{"id":"","name":"","cta":"","redirect":""},"_alert_notification_bar":{"show":true,"bg_color":"","content":"","call_to_action_label":"","call_to_action_link":""},"_footer_cta":{"show":false,"title":"","subtitle":"","cta_text":"","cta_link":"","background":{"id":0,"url":""}},"_cmv_customer_logo":{"id":0,"url":""},"_jetpack_memberships_contains_paid_content":false,"i18n_hreflangs":"","footnotes":""},"categories":[1446],"tags":[],"cmv_author":[877],"class_list":{"0":"post-523096","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-resilience","8":"cmv_author-bill-byron-concevitch","9":"entry"},"yoast_head":"\nExpert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments | Blog<\/title>\n<meta name=\"description\" content=\"Microsoft, Enterprise Strategy Group experts share their knowledge and guidance on how to better prepare for the next cyberattack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments\" \/>\n<meta property=\"og:description\" content=\"Microsoft, Enterprise Strategy Group experts share their knowledge and guidance on how to better prepare for the next cyberattack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments\" \/>\n<meta property=\"og:site_name\" content=\"Commvault - English - United States\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Commvault\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-06T09:06:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-14T17:05:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ESG-Blog_BBC.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1042\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"rijnashpk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@commvault\" \/>\n<meta name=\"twitter:site\" content=\"@commvault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"rijnashpk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments | Blog","description":"Microsoft, Enterprise Strategy Group experts share their knowledge and guidance on how to better prepare for the next cyberattack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments","og_locale":"en_US","og_type":"article","og_title":"Expert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments","og_description":"Microsoft, Enterprise Strategy Group experts share their knowledge and guidance on how to better prepare for the next cyberattack.","og_url":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments","og_site_name":"Commvault - English - United States","article_publisher":"https:\/\/www.facebook.com\/Commvault\/","article_published_time":"2024-08-06T09:06:27+00:00","article_modified_time":"2024-08-14T17:05:16+00:00","og_image":[{"width":1042,"height":543,"url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ESG-Blog_BBC.png","type":"image\/png"}],"author":"rijnashpk","twitter_card":"summary_large_image","twitter_creator":"@commvault","twitter_site":"@commvault","twitter_misc":{"Written by":"rijnashpk","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments#article","isPartOf":{"@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments"},"author":{"name":"rijnashpk","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/e8397b26dc620551baacfb35c66ec01d"},"headline":"Expert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments","datePublished":"2024-08-06T09:06:27+00:00","dateModified":"2024-08-14T17:05:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments"},"wordCount":675,"publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ESG-Blog_BBC.png","articleSection":["Cyber Resilience"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments","url":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments","name":"Expert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments | Blog","isPartOf":{"@id":"https:\/\/commvault-new.go-vip.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments#primaryimage"},"image":{"@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments#primaryimage"},"thumbnailUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ESG-Blog_BBC.png","datePublished":"2024-08-06T09:06:27+00:00","dateModified":"2024-08-14T17:05:16+00:00","description":"Microsoft, Enterprise Strategy Group experts share their knowledge and guidance on how to better prepare for the next cyberattack.","breadcrumb":{"@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments#primaryimage","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ESG-Blog_BBC.png","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ESG-Blog_BBC.png","width":1042,"height":543},{"@type":"BreadcrumbList","@id":"https:\/\/www.commvault.com\/blogs\/enhancing-cyber-resilience-in-hybrid-work-environments#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.commvault.com\/"},{"@type":"ListItem","position":2,"name":"Expert Panel Wrap-up: Enhancing Cyber Resilience in Hybrid Work Environments"}]},{"@type":"WebSite","@id":"https:\/\/commvault-new.go-vip.net\/#website","url":"https:\/\/commvault-new.go-vip.net\/","name":"Commvault - English - United States","description":"","publisher":{"@id":"https:\/\/commvault-new.go-vip.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/commvault-new.go-vip.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/commvault-new.go-vip.net\/#organization","name":"Commvault","url":"https:\/\/commvault-new.go-vip.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","contentUrl":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/03\/logo-commvault-horizontal.jpg?quality=80","width":1200,"height":628,"caption":"Commvault"},"image":{"@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Commvault\/","https:\/\/x.com\/commvault","https:\/\/www.instagram.com\/commvault\/","https:\/\/www.linkedin.com\/company\/commvault","https:\/\/www.youtube.com\/user\/commvault","https:\/\/en.wikipedia.org\/wiki\/Commvault"]},{"@type":"Person","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/e8397b26dc620551baacfb35c66ec01d","name":"rijnashpk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/commvault-new.go-vip.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/37c838d5879db9a6fc3632ac17fcc4a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/37c838d5879db9a6fc3632ac17fcc4a8?s=96&d=mm&r=g","caption":"rijnashpk"}}]}},"jetpack_featured_media_url":"https:\/\/www.commvault.com\/wp-content\/uploads\/2024\/08\/ESG-Blog_BBC.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/523096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/comments?post=523096"}],"version-history":[{"count":2,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/523096\/revisions"}],"predecessor-version":[{"id":523843,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/posts\/523096\/revisions\/523843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media\/523097"}],"wp:attachment":[{"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/media?parent=523096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/categories?post=523096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/tags?post=523096"},{"taxonomy":"cmv_author","embeddable":true,"href":"https:\/\/www.commvault.com\/wp-json\/wp\/v2\/cmv_author?post=523096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}