{"id":246285,"date":"2023-01-16T14:22:46","date_gmt":"2023-01-16T13:22:46","guid":{"rendered":"https:\/\/4itsolutions.com\/?p=246285"},"modified":"2024-02-13T09:31:38","modified_gmt":"2024-02-13T08:31:38","slug":"cyber-recovery-the-strategy-to-defend-against-cyber-attacks","status":"publish","type":"post","link":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/","title":{"rendered":"Cyber Recovery: the strategy to defend against cyber attacks"},"content":{"rendered":"<h2><strong>Cyber Recovery: what is it and how does it work?<\/strong><\/h2>\n<p>It is important to make a distinction between Cyber Recovery and Disaster Recovery: both protect data, but in different ways and from different threats.<\/p>\n<p>If Disaster Recovery involves measures to restore access and functionality of the IT infrastructure following natural events or human error, <a href=\"https:\/\/4itsolutions.com\/en\/cyber-recovery-how-it-works-and-how-to-apply-it\/\">the Cyber Recovery solution<\/a> aims to make data more resilient, enabling fast recovery after sophisticated cyber attacks. Indeed, by protecting critical applications and data in an isolated, immutable and intelligent vault, Cyber Recovery is the recovery solution that minimizes downtime and lost revenue by providing a resilient data backup and recovery path.<\/p>\n<p>How?<\/p>\n<p>Thanks to 3 features:<\/p>\n<ol>\n<li><strong>Isolation<\/strong>: data inside in the vault are physically and logically isolated through an &#8220;air gap&#8221; created with cloud or on-premise solutions.<\/li>\n<li><strong>Immutability<\/strong>: all data must be protected in such a way as to prohibit its deletion or modification until the expiration of the defined period.<\/li>\n<li><strong>Intelligence<\/strong>: data can be analyzed to ensure that at the time it is transferred to the vault it has not been manipulated or corrupted.<\/li>\n<\/ol>\n<p>Cyber Recovery can be considered the last line of defense to protect companies, not only for protecting data but also allowing their recovery whenever an attack occurs, minimizing downtime and the resulting revenue and image consequences.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The now well-known dependence of companies on technology makes them the perfect target for cybercriminals, who, well aware of the heavy repercussions caused by a total shutdown, systematically threaten and attack their mission-critical operations. As usual, the learning curve of these cybercriminals keeps pace with the defensive actions taken by companies, learning as they go around them. <\/p>\n","protected":false},"author":4,"featured_media":246271,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[37,48],"tags":[],"class_list":["post-246285","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security","category-manageddataprotection-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Recovery: the strategy to defend against cyber attacks<\/title>\n<meta name=\"description\" content=\"Learn about Cyber Recovery, the cyber attack defense strategy that enables data recovery in the event of an attack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Recovery: the strategy to defend against cyber attacks\" \/>\n<meta property=\"og:description\" content=\"Learn about Cyber Recovery, the cyber attack defense strategy that enables data recovery in the event of an attack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"4IT Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/4itsolutions10\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-16T13:22:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-13T08:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"393\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stefano Papaleo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stefano Papaleo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/\"},\"author\":{\"name\":\"Stefano Papaleo\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\"},\"headline\":\"Cyber Recovery: the strategy to defend against cyber attacks\",\"datePublished\":\"2023-01-16T13:22:46+00:00\",\"dateModified\":\"2024-02-13T08:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/\"},\"wordCount\":224,\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-1.jpg\",\"articleSection\":[\"IT Security\",\"Managed Data Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/\",\"name\":\"Cyber Recovery: the strategy to defend against cyber attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-1.jpg\",\"datePublished\":\"2023-01-16T13:22:46+00:00\",\"dateModified\":\"2024-02-13T08:31:38+00:00\",\"description\":\"Learn about Cyber Recovery, the cyber attack defense strategy that enables data recovery in the event of an attack.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-1.jpg\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/Immagine-copertina-BLOG-1.jpg\",\"width\":750,\"height\":393,\"caption\":\"Cyber Recovery: la strategia di ripristino dopo un attacco informatico\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\",\"item\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/category\\\/blog-en\\\/it-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Recovery: the strategy to defend against cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#website\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"name\":\"4IT Solutions\",\"description\":\"Soluzioni informatiche per la tua azienda\",\"publisher\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/4itsolutions.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#organization\",\"name\":\"4IT Solutions\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"4IT Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/4itsolutions10\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/4it-solutions\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/#\\\/schema\\\/person\\\/00e74235300c4565c3d41e8f097a5d74\",\"name\":\"Stefano Papaleo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"contentUrl\":\"https:\\\/\\\/4itsolutions.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/Stefano-Papaleo-96x96.png\",\"caption\":\"Stefano Papaleo\"},\"description\":\"CTO - Chief Technology Officer\",\"url\":\"https:\\\/\\\/4itsolutions.com\\\/en\\\/author\\\/stefano_papaleo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Recovery: the strategy to defend against cyber attacks","description":"Learn about Cyber Recovery, the cyber attack defense strategy that enables data recovery in the event of an attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Recovery: the strategy to defend against cyber attacks","og_description":"Learn about Cyber Recovery, the cyber attack defense strategy that enables data recovery in the event of an attack.","og_url":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/","og_site_name":"4IT Solutions","article_publisher":"https:\/\/www.facebook.com\/4itsolutions10","article_published_time":"2023-01-16T13:22:46+00:00","article_modified_time":"2024-02-13T08:31:38+00:00","og_image":[{"width":750,"height":393,"url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-1.jpg","type":"image\/jpeg"}],"author":"Stefano Papaleo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Stefano Papaleo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/"},"author":{"name":"Stefano Papaleo","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74"},"headline":"Cyber Recovery: the strategy to defend against cyber attacks","datePublished":"2023-01-16T13:22:46+00:00","dateModified":"2024-02-13T08:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/"},"wordCount":224,"publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-1.jpg","articleSection":["IT Security","Managed Data Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/","url":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/","name":"Cyber Recovery: the strategy to defend against cyber attacks","isPartOf":{"@id":"https:\/\/4itsolutions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-1.jpg","datePublished":"2023-01-16T13:22:46+00:00","dateModified":"2024-02-13T08:31:38+00:00","description":"Learn about Cyber Recovery, the cyber attack defense strategy that enables data recovery in the event of an attack.","breadcrumb":{"@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/#primaryimage","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-1.jpg","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2023\/01\/Immagine-copertina-BLOG-1.jpg","width":750,"height":393,"caption":"Cyber Recovery: la strategia di ripristino dopo un attacco informatico"},{"@type":"BreadcrumbList","@id":"https:\/\/4itsolutions.com\/en\/cyber-recovery-the-strategy-to-defend-against-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/4itsolutions.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/"},{"@type":"ListItem","position":3,"name":"IT Security","item":"https:\/\/4itsolutions.com\/en\/category\/blog-en\/it-security\/"},{"@type":"ListItem","position":4,"name":"Cyber Recovery: the strategy to defend against cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/4itsolutions.com\/#website","url":"https:\/\/4itsolutions.com\/","name":"4IT Solutions","description":"Soluzioni informatiche per la tua azienda","publisher":{"@id":"https:\/\/4itsolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/4itsolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/4itsolutions.com\/#organization","name":"4IT Solutions","url":"https:\/\/4itsolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2022\/11\/favicon.png","width":512,"height":512,"caption":"4IT Solutions"},"image":{"@id":"https:\/\/4itsolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/4itsolutions10","https:\/\/www.linkedin.com\/company\/4it-solutions\/"]},{"@type":"Person","@id":"https:\/\/4itsolutions.com\/#\/schema\/person\/00e74235300c4565c3d41e8f097a5d74","name":"Stefano Papaleo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","url":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","contentUrl":"https:\/\/4itsolutions.com\/wp-content\/uploads\/2025\/02\/Stefano-Papaleo-96x96.png","caption":"Stefano Papaleo"},"description":"CTO - Chief Technology Officer","url":"https:\/\/4itsolutions.com\/en\/author\/stefano_papaleo\/"}]}},"_links":{"self":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=246285"}],"version-history":[{"count":4,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246285\/revisions"}],"predecessor-version":[{"id":247957,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/posts\/246285\/revisions\/247957"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media\/246271"}],"wp:attachment":[{"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=246285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/categories?post=246285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/4itsolutions.com\/en\/wp-json\/wp\/v2\/tags?post=246285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}