CloudFirst

  • 631.608.1200
  • Request A Quote
  • Support
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
MENUMENU
  • Solutions
    • All OS

      • ezHost
      • ezProtect
      • ezSecurity
      • Systems Management
    • IBM i

      • ezHost
      • ezVault
      • ezAvailability
      • ezRecovery
    • AIX

      • ezHost
      • ezVault
      • ezAvailability
      • ezRecovery
    • Intel: Windows/Linux

      • ezHost
      • ezVault
      • ezAvailability
      • ezRecovery
  • Services
    • Disaster Recovery
    • IBM Cloud Support
    • IBM Power VS
    • IBM Power on AWS
    • Voice & Data
  • Security & Automation
      • Overview
      • ezAutomate
      • ezProtect
      • AI for Business
  • Resources
    • Blog
    • White Papers
    • Case Studies
    • Glossary
  • About Us
    • Company Overview
    • Data Centers
    • Management Bios
    • Testimonials
    • Careers
    • Investor Relations
  • Contact
  • Partner Program
    • Partner Overview
    • Become a Partner
    • Partner Deal Registration
Ensuring Data Resiliency with Laurie LeBlanc

Ensuring Data Resiliency with CloudFirst’s Laurie LeBlanc

Data is your most valuable asset. Without it, your applications are useless. That’s why it’s a prime target for bad actors looking to cash in. They know that if they can encrypt your data with ransomware, you’re likely to pay the ransom if you have no alternative.

Today’s companies need to do everything they can to protect their data. That’s why, at the COMMON POWERUp 2025 conference in Anaheim, California, CloudFirst’s Laurie LeBlanc presented an insightful session on ensuring data resiliency for IBM i.

This is what you need to know.

 

Why act now on data resiliency?

Why act now on data resiliency?

Cyber threats and ransomware are top of mind for virtually every CTO and CIO. This is true even on the IBM i platform, which is known for its stability and security. According to Forta’s 2025 IBM i Marketplace Survey, cybersecurity is the #1 concern across the board, with 77% of respondents citing it as a major issue.

When you look at what’s going on in the world, it makes sense to worry. We’ve seen a doubling of cyber attacks year-over-year, and 17% of those attacks are ransomware that goes after a company’s valuable data. The worst part is that, even if you pay the ransom, there’s no guarantee you’ll get your data back—26% of clients who pay still can’t recover their data.

If you can’t access your data, you stand a good chance of going out of business. Even for those who can recover, the average recovery period is 23 days—that’s over three weeks of IT downtime that leads to lost revenue, inflated costs, and reputational damage.

The picture gets even more complicated when you take into account the fact that 21% of threats are dormant, a 5% year over year increase. This essentially means there’s a bomb in your data, and you don’t know when it was planted or when it’s going to explode.

 

You need data resiliency to protect against ransomware

Data Security detects and prevents attacks but does not help recovery. Data protection does not help avoid attacks and is reactionary. Together data protection and security = data resiliency

The only way to protect yourself against the worst-case scenario is with data resiliency. But what exactly does that mean?

Data resiliency is a combination of data security and data protection. There’s a fine distinction between the two, and only by combining them can you achieve what the NIST Cyber-Resilient Systems Framework recommends as a best practice.

Data security detects and prevents attacks, but it does not help with recovery. This branch of data resiliency includes things like automated patch management, a 24/7 security operations center, and endpoint security. Data security is how you prevent hackers from gaining access to your IT systems in the first place and how you know when they’re trying to break in.

Data protection, on the other hand, is reactionary. It doesn’t help you prevent attacks, but it helps you recover after something does go wrong. This could take the form of cyber incident response or business continuity planning.

Separately, data security and data protection are valuable but incomplete solutions. Only by combining them can you achieve true data resiliency.

 

Disaster recovery vs. cyber recovery

Disaster recovery vs. cyber recovery. Data resiliency requires both.

Looking specifically at data protection, you also need to understand the difference between disaster recovery and cyber recovery. You need both in order to make sure you have complete data resiliency.

The main difference is what kind of event you’re recovering from. If it’s a fire, a flood, or something similar, it’s disaster recovery. If it’s a ransomware attack or virus, then it’s cyber recovery.

The distinct nature of these events means they call for different approaches to recovery. For instance, a disaster happens at an identifiable point in time: you know exactly when the fire or flood occurred. But in the case of a cyber event, it can be hard to tell exactly when your systems were compromised.

First off, this means that in order to even get started with backups, you need to be sure you can trust and verify those backups. The last thing you want to do is reinstall the same virus that took you down. During disaster recovery, you don’t have to worry about your backups being infected, but that’s a real concern with cyber recovery.

Second, a disaster is usually a regional event. This limits the overall scope of the recovery. A cyber recovery usually takes place on a global scale.

If you want to know that your business can recover from any IT challenge, be sure to invest in both disaster recovery and cyber recovery.

 

The importance of immutable backups

Immutability and data isolation chart, showing policy-goverend immutable snapshots and the bottom and cold data vault with air gap at the top

As part of your long-term backup plan, especially for cyber recovery, it’s crucial to ensure that you’ve configured your backups to be immutable. This means they are impossible to delete or change.

One concerning thing we see is that bad actors will often go after backups before infecting a system with ransomware. Their goal is to make sure you have to pay the ransom; they want it to be impossible to restore the system without their key.

If your backups aren’t immutable, they’re basically useless for cyber recovery.

There are different types of immutable backups, ranging from policy-governed immutable snapshots to air-gapped cold data vaults, a.k.a. tapes. Your company’s approach to immutable backups ultimately circles back to a business discussion about what makes the most sense, especially when it comes to costs.

Recommendations to improve data resiliency

Laurie LeBlanc gives a presentation about data resiliency at COMMON POWERUp2025 in Anaheim, California

The first thing you need to understand is that data resiliency isn’t just about IBM i. It both affects and is affected by your entire IT environment, from networking to user endpoints. The challenges of data resiliency are magnified by the size of your environment; a bigger, more complex IT environment is harder to secure and protect.

One of the best things you can do to improve data resiliency is to replace aging hardware. If you’re stuck on old Power Systems, especially if they’ve reached end-of-life, then you’re basically a sitting duck. You may not be able to upgrade your operating system, which means you can’t update or patch your software applications.

As time goes on, more vulnerabilities are identified on those systems, and they stop receiving patches. Bad actors know about those vulnerabilities, and that’s the first place they’re going to look when trying to break in. Don’t make it easy on them!

Second, you need immutable backups for all the reasons we covered above. We can’t understate the importance of the word immutable here. If hackers can delete your backups, then they won’t do you any good.

Third, make sure you have both disaster and cyber recovery plans in place, and that both IT and business leadership are brought into the process. Remember, disaster and cyber recovery are not the same, and you need distinct plans for these different types of catastrophes.

Finally, do everything you can to harden your security. That could be as simple as tightening user access by not using default passwords or by making sure users don’t have too much authority. Way too often while CloudFirst is doing security scans for our clients, we find hundreds of users with all-object authority, the IBM i equivalent to root access. This is a huge vulnerability.

There’s so much more we could go into about cybersecurity, from mandating multi-factor authentication to realtime monitoring. Because there’s so much to address, we recommend doing a little at a time, putting one foot in front of the other. Then over time you can put it all together.

If you’re concerned about the cybersecurity of your IBM i, get in touch with CloudFirst today. We’ll run a security scan and provide you with a report to help you create a timeline for implementing a data resiliency strategy of your own.

May 22, 2025

Filed Under: Business Continuity, Data Protection and Recovery, Data Recovery, Disaster Recovery, High Availability, Security

Primary Sidebar

Search

Recent Posts

  • Ensuring Data Resiliency with CloudFirst’s Laurie LeBlanc
  • COMMON POWERUp2025 Keynote Takeaways: Get Ready for Power11
  • How PowerVS and AI Work Together: What You Need to Know
  • The Pros and Cons of IBM PowerVS (and How to Sidestep the Cons)
  • PowerVS 101: Everything You Need to Know

Categories

  • AIX
  • Backup
  • Business Continuity
  • Cloud Computing
  • Cloud Hosting
  • Compliance
  • Data Privacy
  • Data Protection and Recovery
  • Data Recovery
  • Data Storage
  • Disaster Recovery
  • Featured Articles
  • High Availability
  • IaaS
  • IBM i
  • IBM Services
  • Information Technology
  • Managed Services
  • Resources
  • Security
  • Tech Tips
  • Uncategorized

Do You Need More Information?

Contact Us
  • 631.608.1200
  • Request A Quote
  • Support

Solutions

  • ezHost
  • ezVault
  • ezAvailability
  • ezRecovery
  • Systems Management

Support Services

  • Support Services

Partner

  • Partner Program
  • Become a Partner

Resources

  • Blog
  • White Papers
  • Glossary

About Us

  • Company Overview
  • Data Centers
  • Management Team
  • Careers
  • Investor Relations
  • Contact
ISO 27001 Certified