The State of Data Security in 2025
A Distributed
Crisis
But as the following data from Rubrik telemetry and Wakefield Research shows, hybrid environments have also created unprecedented hazards:
As a result,
86%
of companies surveyed facing extortion demands report paying a ransom.
Nearly three-quarters say attackers were able to reach and hurt their data.
It doesn't have to be like this.
Companies must
by thinking like them:
Threat actors want to find and control the most valuable data, so they can stop operations. If they can do it, companies can too.
It begins with a focus on regaining control, through system awareness, then a plan of protection, defense, and recovery that prioritizes sensitive data and continuous operations.
Sensitive data can be located and classified in categories such as personal information, financial details, and technical capabilities. This identifies targets before treat actors get there, asserting knowledge and control in the cloud.
A process of continuous backup and restoration should become part of the security process, as rigorously in the cloud as on premises.