Close Menu
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    TIMES24H
    • Hot!
      1. Vietnam
      2. Asia
      3. Video
      Featured
      Hai Sau Sau (266) Partners with Samsung to Drive “One Samsung” Strategy in Vietnam

      Hai Sau Sau (266) Partners with Samsung to Drive “One Samsung” Strategy in Vietnam

      By Mike HarrisonNovember 13, 20250
      Recent
      Hai Sau Sau (266) Partners with Samsung to Drive “One Samsung” Strategy in Vietnam

      Hai Sau Sau (266) Partners with Samsung to Drive “One Samsung” Strategy in Vietnam

      November 13, 2025
      TechTimes Editors’ Choice 2024: 9Fit eBiz Mag Stand NFC Wallet – The Most Unique Mobile Accessory

      TechTimes Editors’ Choice 2024: 9Fit eBiz Mag Stand NFC Wallet – The Most Unique Mobile Accessory

      January 8, 2025

      BCP Vietnam and Vitalify Asia Launch the First A.I-Powered Business Matching Platform

      December 20, 2024
    • World
      • PR Newswire
      • Media Outreach
      • GLOBENEWSWIRE
    • Business
      Taiwan: The Global Powerhouse Shaping the Future of AI

      Taiwan: The Global Powerhouse Shaping the Future of AI

      August 29, 2025
      MEGA US EXPO 2025: A Hub for Innovation and Business Collaboration Between Vietnam and Korea

      MEGA US EXPO 2025: A Hub for Innovation and Business Collaboration Between Vietnam and Korea

      July 31, 2025
      Vietnamese Enterprises Engage with Global AI Innovations at COMPUTEX TAIPEI 2025

      Vietnamese Enterprises Engage with Global AI Innovations at COMPUTEX TAIPEI 2025

      May 19, 2025

      BCP Vietnam and Vitalify Asia Launch the First A.I-Powered Business Matching Platform

      December 20, 2024

      POPS Reaches Huge Milestone with 10,000 Enrolled Students

      December 16, 2021
    • Life
      1. Lifestyle
      2. Recipes
      3. Fashion
      4. View All
      China Unicom and Huawei Elevate Beijing E-Town Race-Day Experiences with 5G-A GigaUplink

      China Unicom and Huawei Elevate Beijing E-Town Race-Day Experiences with 5G-A GigaUplink

      April 20, 2026
      ESG Achievement Awards 2025/2026 Open for Applications, Championing Human Capital and ESG Excellence to Shape a Resilient Future

      ESG Achievement Awards 2025/2026 Open for Applications, Championing Human Capital and ESG Excellence to Shape a Resilient Future

      April 20, 2026
      Ascott Records Strongest-ever Southeast Asia Signings in 2025, Powering Multi-typology Growth

      Ascott Records Strongest-ever Southeast Asia Signings in 2025, Powering Multi-typology Growth

      April 20, 2026
      Empowering the Digital Future: CUKTECH 10 Ultra Charger Officially Launches in the Philippines

      Empowering the Digital Future: CUKTECH 10 Ultra Charger Officially Launches in the Philippines

      April 20, 2026

      Cooking tips for a smaller Thanksgiving celebration

      November 18, 2020

      Hanoi: A capital, and a kingdom of egg coffee shops

      November 16, 2020

      4 must-try recipes when you travel to Vietnam

      November 7, 2020

      Cutting-Edge Technology for Top Dentists

      December 24, 2021

      H&M faces boycott in Vietnam over “problematic map”

      April 7, 2021
      Pierre Cardin

      Ground-breaking French designer Pierre Cardin dies aged 98

      December 30, 2020
      JESSICA SIMPSON

      #HealthGoals: Jessica Simpson shows off 100 lbs weight loss in Christmas pajamas

      December 27, 2020

      Plane captain dies during Miami-Chile flight

      August 17, 2023

      French paintings of Vietnamese life a century ago exhibited in HCMC

      August 17, 2023

      Judge says accused TV contest not rigged

      August 17, 2023

      I don’t know how to tell my Christian parents-in-law I want a divorce

      August 17, 2023
    • Sport
    • Tech
      1. Gadgets
      2. View All
      9Fit and DTR Launch Vietnam’s First Smart Ring: A Leap Towards the Future of Wearable Technology

      9Fit and DTR Launch Vietnam’s First Smart Ring: A Leap Towards the Future of Wearable Technology

      December 12, 2024

      “Stupid windman” PC assembly experience based on Newegg ChatGPT

      March 29, 2023

      The value of the industrial cloud as an example of “the power of ecosystem, the power of expertise”

      March 29, 2023

      Machbase Releases Open Source Structured Time Series Database “Macbase Neo”

      March 28, 2023
      Taiwan Digital Day 2025

      Taiwan Digital Day 2025: Driving Vietnam-Taiwan Tech Collaboration in Ho Chi Minh City

      July 30, 2025
      Vietnamese Enterprises Engage with Global AI Innovations at COMPUTEX TAIPEI 2025

      Vietnamese Enterprises Engage with Global AI Innovations at COMPUTEX TAIPEI 2025

      May 19, 2025
      9Fit and DTR Launch Vietnam’s First Smart Ring: A Leap Towards the Future of Wearable Technology

      9Fit and DTR Launch Vietnam’s First Smart Ring: A Leap Towards the Future of Wearable Technology

      December 12, 2024

      “Stupid windman” PC assembly experience based on Newegg ChatGPT

      March 29, 2023
    Media Outreach Newswire
    TIMES24H
    Home»Application»“Average 14 vulnerabilities in enterprise storage and backup devices… Similar to last year” Continuity Report
    Application

    “Average 14 vulnerabilities in enterprise storage and backup devices… Similar to last year” Continuity Report

    Jack NguyenBy Jack NguyenMarch 23, 2023No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    On average, enterprise storage and backup devices have around 14 vulnerabilities. Three of them were critical vulnerabilities that could cause serious damage if exploited.

    © Getty Images Bank

    According to the 2023 State of Storage and Backup Security Report from cybersecurity firm Continuity, the security gap for enterprise storage/backup devices compared to other IT and network security layers is rather important. Continuity based its report on an assessment of 245 environments with 8,589 storage and backup devices from major vendors including Dell, NetApp, Veritas and Hitachi Vantara.

    Most of the companies Continuity surveyed were from the financial sector, but also included companies in the healthcare, telecommunications and IT services sectors. Given the growing reliance on data backups in enterprise ransomware recovery plans, the evidence of proliferating vulnerabilities affecting storage and backup devices is significant.

    Companies that fail to manage vulnerabilities

    According to the report, Continuity detected a total of 9,996 individual security issues (vulnerabilities and security misconfigurations). There were over 270 security principles that these security issues did not properly adhere to. Additionally, the statistic of an average of 14 vulnerabilities in enterprise storage/backup devices (with an average of 3 rated high or severe) was nearly identical to last year’s survey. This means that little corrective action has been taken.

    The report writing team noted that while unpatched vulnerabilities in storage/backup systems are a primary attack point for most ransomware, existing vulnerability management tools ignore that these systems are not well. Covered.

    “Securing enterprise storage and backup systems is an important part of a company’s cyber resilience strategy,” said Dennis Han, principal analyst at Omdia. Business continuity is just as important as rapid data recovery in the event of data loss or theft. “It is therefore even more important to protect data wherever it exists and to ensure that storage and backup systems do not become an entry point for attacks.”

    Top 5 Storage/Backup Device Security Risks

    The top 5 storage/backup device security risks detected by Continuity are:

    1. Insecure network settings (weak protocols or encryption)
    2. Unresolved CVEs
    3. Access rights problem (overexposure)
    4. Insecure user management and authentication
    5. Insufficient logging and auditing

    Other less common but higher risk factors included software supply chain management vulnerabilities, misconfigurations, failure to use anti-ransomware features, and undocumented and insecure API/CLIs. Factors such as the Russian-Ukrainian dispute, compliance and insurance issues, and the separation between IT infrastructure and security teams contribute to the risk, Continuity added.

    How to Manage Storage/Backup Device Security Risks

    In its report, Continuity outlines the business impact of the five most common security risks to storage/backup devices and how to mitigate them.

    Hackers can exploit insecure network settings to retrieve and alter configuration information and stored data. To address these risks, Continuity reduces knowledge gaps on security concepts, risks, and best practices for storage/backup networks, organizes internal requirements to enforce industry recommendations, and identifies gaps between requirements and actual parameters, and to review and implement a process to effectively and continuously assess your level of storage/backup security.

    Unresolved CVEs can lead to file exfiltration, DoS attacks, and file and block device takeover. It is therefore a good idea to scan your storage/backup environment to identify and fix critical vulnerabilities with high CVSS scores as soon as possible. Continuity recommends improving the CVE identification and remediation system with tools that provide this capability.

    Access rights issues put companies, their data and their copies at risk. In some cases, the operating system of the host using the storage may also be damaged. Continuity highlighted the need to implement a management and control plan and a least privilege access model to audit as often as possible and resolve issues as quickly as possible.

    Hackers can take full control of storage/backup systems by exploiting incorrect and insecure configurations to exfiltrate and destroy data and copies. Mitigation methods include locking or renaming (or deleting if possible) master user accounts, deleting local user accounts, segregating responsibilities and access roles for copies of primary and secondary data and multi-factor authentication (MFA).

    Insufficient logging/auditing can mask malicious activities from cybercriminals and hamper the ability of core security tools to detect anomalies. To minimize this risk, logs should be written to external repositories. At this point, redundant logging targets for each device and external time spikes using at least two NTP sources should be configured, authentication failures, management/security configuration events, and storage access events for sensitive data all must be logged, and logging must be subdivided.
    editor@itworld.co.kr





    Source: Internet

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Taiwan Digital Day 2025

    Taiwan Digital Day 2025: Driving Vietnam-Taiwan Tech Collaboration in Ho Chi Minh City

    July 30, 2025
    Vietnamese Enterprises Engage with Global AI Innovations at COMPUTEX TAIPEI 2025

    Vietnamese Enterprises Engage with Global AI Innovations at COMPUTEX TAIPEI 2025

    May 19, 2025
    9Fit and DTR Launch Vietnam’s First Smart Ring: A Leap Towards the Future of Wearable Technology

    9Fit and DTR Launch Vietnam’s First Smart Ring: A Leap Towards the Future of Wearable Technology

    December 12, 2024
    Leave A Reply Cancel Reply

    Latest News

    Gastops Launches FluidSIGHT™ Real-Time Oil Condition Monitoring System

    April 20, 2026
    AI DESIGN WORKFLOW

    Sunvega Advances Vertical AI for the Home Sector:

    April 20, 2026

    Ancestral worship ceremony in the hometown of the Yellow Emperor in the year Bingwu (2026): Chinese people around the world pay homage to Xuanyuan, the Yellow Emperor

    April 20, 2026
    China Unicom and Huawei Elevate Beijing E-Town Race-Day Experiences with 5G-A GigaUplink

    China Unicom and Huawei Elevate Beijing E-Town Race-Day Experiences with 5G-A GigaUplink

    April 20, 2026
    DMCA.com Protection Status
    Facebook X (Twitter) Instagram Pinterest

    © 2026 TIMES24H. All rights reserved

    TIMES24H is a global news platform delivering timely, reliable, and insightful coverage across technology, business, lifestyle, and current affairs. Our mission is to provide readers with clear perspectives and trusted information to navigate a fast-changing world.

    Type above and press Enter to search. Press Esc to cancel.