Академический Документы
Профессиональный Документы
Культура Документы
Protection Requires a
Comprehensive
Approach
Your expert guide to protecting backups from ransomware,
testing your recovery strategy, and operating post-attack
In this e-guide
Table of Contents:
How has ransomware recovery
changed in recent years? Introduction: Keeping backups safe from ransomware
How ransomware variants are How has ransomware recovery changed in recent years?
neutralizing data backups
How ransomware variants are neutralizing data backups
How to protect backups from
How to protect backups from ransomware infiltration
ransomware infiltration
Protect backup from ransomware attacks and recover safely
Ransomware backup strategy
guidelines to help ensure recovery Ransomware backup strategy guidelines to help ensure recovery
Page 1 of 32
In this e-guide
Introduction: Keeping backups safe
How has ransomware recovery
changed in recent years?
from ransomware
Paul Crocetti, Senior Site Editor
How ransomware variants are
neutralizing data backups If you think ransomware couldn't get any sneakier, you're wrong.
How to protect backups from One of the major trends with ever-evolving malicious software is having it infiltrate an
organization's data backups. The ransomware lies low in your network until data needs to be
ransomware infiltration
recovered back into production, and then it detonates. It's a highly dangerous situation for
Ransomware backup strategy organizations, because contaminated files used to restore data only perpetuate the attack
guidelines to help ensure recovery cycle.
Ransomware disaster recovery: A A ransomware backup protection strategy must include best practices to ensure recovered
data is free from infection. To this end, vendors are starting to add ransomware-specific
checklist for continuity
features -- such as using machine learning technology and predictive analytics to detect
Test your ransomware recovery plan suspicious behavior -- to their backup products. But backup admins need to put
comprehensive backup and data protection procedures in place to provide their backup
to safeguard data
platforms with optimum protection.
Ransomware recovery: How can
Some organizations believe that if they have data backed up, they have ransomware backup
enterprises operate post-attack?
protection in place, but that's not the case. This guide discusses how ransomware can
Can you recover from ransomware? infiltrate data backups, what organizations can do to best prepare for this new problem and
general guidelines for better backup practices.
Take our quiz and find out
▼ Next Article
Page 2 of 32
In this e-guide
How has ransomware recovery
How has ransomware recovery
changed in recent years?
changed in recent years?
Brien Posey, Microsoft MVP
How ransomware variants are
neutralizing data backups History has shown that anyone can fall victim to ransomware. Ransomware infections don't
discriminate and have caused data loss in countless organizations -- from large enterprises to
How to protect backups from individual users.
ransomware infiltration
In the past, ransomware recovery meant one of three choices: Pay the ransom, suffer data
Ransomware backup strategy loss or restore a backup. In fact, the availability of a backup was usually the determining
guidelines to help ensure recovery factor in whether or not a ransom was paid.
Ransomware disaster recovery: A A couple of years ago, there was a sudden, sharp decline in ransomware infections.
Ransomware had become pervasive, and the epidemic received so much media attention that
checklist for continuity
organizations began to make an extra effort to ensure that their data was being securely
Test your ransomware recovery plan backed up. Paying the ransom was effectively removed from the list of viable options, with IT
experts across the board urging against it. After all, there is hardly a guarantee that paying the
to safeguard data
ransom will result in the promised return of data. Instead, the ransomware recovery focused
Ransomware recovery: How can on prevention and pre-emptive measures to ensure a quick recovery in the event of an attack.
enterprises operate post-attack?
Unfortunately, this trend did not lead to the extinction of ransomware. With fewer people
Can you recover from ransomware? paying ransoms, ransomware became far less profitable, and many ransomware creators
began to look for a different scheme. That was about the time when cryptomining started
Take our quiz and find out
taking off.
Page 4 of 32
In this e-guide
How ransomware variants are
How has ransomware recovery
changed in recent years?
neutralizing data backups
Brien Posey, Microsoft MVP
How ransomware variants are
neutralizing data backups Ransomware, the monetization of malware, has been one of the most pervasive threats
against business data for the last several years. Now a megabillion-dollar industry,
How to protect backups from ransomware variants are usually delivered by email attachments that allow attackers to
ransomware infiltration encrypt a company's data and hold the key to unlock the data for an exorbitant price.
Ransomware backup strategy The media has run story after story about businesses that have suffered massive financial
guidelines to help ensure recovery losses following a ransomware attack. Some of the more recent victims include the Georgia
Department of Agriculture, Mecklenburg County North Carolina and the Hackensack Sleep
Ransomware disaster recovery: A and Pulmonary Center in New Jersey.
checklist for continuity
Once an organization falls victim to a ransomware attack, it has two choices: pay the ransom
Test your ransomware recovery plan or restore a backup. Three-quarters of IT decision-makers whose organizations haven't been
hit by ransomware said they wouldn't pay a ransom, according to a survey conducted by
to safeguard data
cybersecurity vendor Trend Micro. When faced with the reality of an attack, however, nearly
Ransomware recovery: How can two-thirds (65%) of previously infected companies surveyed paid up.
enterprises operate post-attack?
The FBI advises against paying the ransom because doing so doesn't guarantee your data
Can you recover from ransomware? will be returned. There are documented instances of companies paying a ransom and never
receiving decryption keys or then being told they need to pay more. Ultimately, paying a
Take our quiz and find out
ransom emboldens the perpetrators.
This leaves backup restoration as the best option for coping with a ransomware attack. But
even this option isn't foolproof.
Page 5 of 32
In this e-guide Inadequate restorations
How has ransomware recovery For one thing, some companies discover their backups are inadequate. For example, they
may have omitted certain systems or data from their backups either accidentally or to reduce
changed in recent years?
costs. Likewise, some organizations fail to test their backups, discovering only after an attack
How ransomware variants are that the backups can't be restored.
neutralizing data backups
These types of problems are preventable if you take time to review and test backups before
How to protect backups from disaster strikes. Far more troubling is how ransomware is becoming more pervasive, and new
ransomware variants are increasingly more sophisticated. Some victims have found
ransomware infiltration
ransomware not only encrypts data, but also destroys backups.
Ransomware backup strategy
guidelines to help ensure recovery
Page 6 of 32
In this e-guide
Page 7 of 32
In this e-guide
Page 9 of 32
In this e-guide
Page 11 of 32
In the past, organizations have relied heavily on user education for malware prevention: If
In this e-guide
users can be taught to recognize a phishing email, then there's little chance they'll click on a
malicious link in such a message. Unfortunately, experience has shown that even the best
How has ransomware recovery
user education won't completely mitigate the risk of users clicking on malicious links or
changed in recent years? opening malicious attachments.
How ransomware variants are A better approach is to assume that user education is ineffective. And a better strategy is to
neutralizing data backups screen messages at the mail server level so phishing messages never make it to users'
mailboxes. Similarly, restrict user permissions in a way that minimizes damage should a
How to protect backups from
ransomware attack occur.
ransomware infiltration
There are a lot of ways of doing this. One particularly effective approach is to use application
Ransomware backup strategy whitelisting so that users can't run unauthorized processes. A more common approach is to
guidelines to help ensure recovery perform a permissions audit and ensure that users only have write permissions where
absolutely necessary. This won't stop a ransomware infection from occurring, but because
Ransomware disaster recovery: A
ransomware piggybacks on the user's privileges, it won't be able to touch anything the user
checklist for continuity doesn't have access to. Hence, this approach limits the damage. Another option is to require
the IT staff to use nonadministrative accounts unless they're performing an action that
Test your ransomware recovery plan
specifically requires administrative privileges.
to safeguard data
It's important to remember phishing email messages are only one source of ransomware. It's
Ransomware recovery: How can also common for attackers to use phony tech support scams as a means of introducing
enterprises operate post-attack? ransomware onto victim computers. Train end users to recognize the difference between a
real phone call from IT and a scam. That's easier said than done, however.
Can you recover from ransomware?
Take our quiz and find out Ransomware protection bottom line
When it comes to protecting against ransomware, it is best to think of the problem as
business continuity. Even if an organization is able to recover from a ransomware attack by
Page 12 of 32
restoring backups, the recovery process will take time to complete. As such, organizations
In this e-guide
shouldn't focus solely on protecting backups against ransomware; they should also consider
how to minimize the disruption caused by a ransomware attack.
How has ransomware recovery
changed in recent years? The best way to minimize the disruption caused by ransomware is to prevent an infection from
ever occurring. But because it's difficult to guarantee that a ransomware infection will never
How ransomware variants are occur, you can minimize the disruption by making sure that users only have rights to the data
neutralizing data backups required to do their jobs and that you have a continuous data protection system in place --
preferably with instant recovery capabilities -- so that you can roll back any damage that does
How to protect backups from
occur.
ransomware infiltration
Page 13 of 32
In this e-guide
How to protect backups from
How has ransomware recovery
changed in recent years?
ransomware infiltration
Alastair Cooke, Consultant for SearchVirtualDesktop.com
How ransomware variants are
neutralizing data backups There has been a tactical pivot in ransomware. It seems that ransomware writers have
realized that large organizations have lots of money, and some do not have the best
How to protect backups from protection against infections. Newer ransomware is behaving as an advanced persistent
ransomware infiltration threat, a piece of malware that tries to stay undetected in your network for some time to do
the maximum amount of damage.
Ransomware backup strategy
guidelines to help ensure recovery The APT will usually spread through your network, infecting as many computers as possible.
Often, the malware will try to connect to a command-and-control server over the internet to
Ransomware disaster recovery: A report the progress of the infection and await the command to attack. To respond to this new
checklist for continuity threat, you need different approaches to protect backups from ransomware.
Page 14 of 32
time to detonate the ransomware. All of the infected machines will suddenly encrypt recently
In this e-guide
used files, and your applications will stop working.
How has ransomware recovery Because the APT ransomware has been in the network for weeks before it detonates, it
changed in recent years? probably has been backed up numerous times. Your backups now contain both encrypted
files and the ransomware application itself. If you bulk restore whole systems in an attempt to
How ransomware variants are protect backups from ransomware, you will also restore the infection and negate all of the
neutralizing data backups cleanup work you have already completed. Be very cautious about restoring any executable
files, scripts such as JavaScript or even files that may contain macros until you know how the
How to protect backups from
ransomware spreads. Ideally, you only want to restore data files.
ransomware infiltration
Page 15 of 32
In this e-guide
Page 16 of 32
In this e-guide Analytics to the rescue
How has ransomware recovery You probably have thousands of encrypted files, and with the last unencrypted versions
spread across multiple backups, you'll need to work out what to restore. Your backup
changed in recent years?
application should use its backup catalogs to identify the last unencrypted version of each file
How ransomware variants are and automatically restore those versions. If those backups are to tape, it will take a while to
neutralizing data backups work through each tape. If the backups are to disk, it should take less time to recover.
How to protect backups from Backups should not be accessible as files over the network, as they will be prime targets for
encryption by the ransomware first. If your backup application can identify encrypted files, it
ransomware infiltration
might be the first thing in your network to identify a ransomware infection. One sure sign of
Ransomware backup strategy the presence of ransomware is the need to back up a lot of non-compressible files in a
guidelines to help ensure recovery directory that previously only contained compressible files.
Ransomware disaster recovery: A Ransomware has evolved and is targeting enterprises by behaving as an advanced persistent
threat. You need to be aware of these changes and protect backups from ransomware by
checklist for continuity
identifying the infection rapidly and recovering without paying a ransom.
Test your ransomware recovery plan
to safeguard data
▼ Next Article
Ransomware recovery: How can
enterprises operate post-attack?
Page 17 of 32
In this e-guide
Protect backup from ransomware
How has ransomware recovery
changed in recent years?
attacks and recover safely
Nick Cavalancia, Consultant, Writer
How ransomware variants are
neutralizing data backups Backups have been a recommended part of your organization's ransomware response
strategy for a number of years now. The pivotal question of whether you pay the ransom or
How to protect backups from not has long been based on the presence of viable backups -- have the backup, skip the
ransomware infiltration ransom.
Ransomware backup strategy In recent years, we've begun to see new tactics from ransomware developers, including the
guidelines to help ensure recovery search for and destruction of backups, making it necessary for organizations to protect
backup from ransomware. But there's an even more sinister tactic being used today -- one
Ransomware disaster recovery: A that makes recovery difficult.
checklist for continuity
It's referred to as a ransomware attack loop. The strategy behind the attack is to infect the
Test your ransomware recovery plan environment with ransomware in a way that, should backups be used to recover, the
ransomware is still present.
to safeguard data
enterprises operate post-attack? 1. An endpoint or server is infected with ransomware through traditional methods.
2. The ransomware does not detonate for three to six months.
Can you recover from ransomware?
3. Backups of the infected system now include data and the ransomware.
Take our quiz and find out 4. The ransomware detonates, asking for the ransom.
5. You recover the system -- rather than paying the ransom -- to an earlier thought-to-be-
clean backup, only to recover the system to a still-infected state.
Page 18 of 32
6. The ransomware redetonates. Herein lies the loop, as you are back to step four in the
In this e-guide
attack.
How has ransomware recovery You can, in theory, repeat step six using earlier and earlier backups, but because you don't
changed in recent years? know exactly when the system was infected, this process may be more work than it's worth.
Page 19 of 32
The trick here is to use one of these two types of backup defense methodologies as part of
In this e-guide
your backup plan. The products preventing ransomware from being included in a backup are
obviously the best choice, but you may not have that as an option. The notification is less
How has ransomware recovery
automated in its response to finding ransomware -- in that you need to do the work of
changed in recent years? removing the malware yourself, as opposed to it simply not being included in the backup set --
How ransomware variants are but is still a viable option.
Page 20 of 32
In this e-guide
Ransomware backup strategy
How has ransomware recovery
changed in recent years?
guidelines to help ensure recovery
Nick Cavalancia, Consultant, Writer
How ransomware variants are
neutralizing data backups In 2018, one of the worst reported ransomware attacks hit. The government office in the
Matanuska-Susitna Borough -- commonly known as Mat-Su -- in Alaska was attacked by
How to protect backups from ransomware that didn't just impact a few endpoints or servers; it brought the entire office
ransomware infiltration down.
Ransomware backup strategy For reference, according to security awareness training vendor KnowBe4, the average
guidelines to help ensure recovery ransomware attack impacts 16 workstations and five servers -- but not the Mat-Su attack. It
impacted 500 workstations and 120 of their 150 servers. Just to keep the borough office
Ransomware disaster recovery: A running, they even reverted to typewriters!
checklist for continuity
It's evident that ransomware can be so much more serious than impacting a few workstations.
Test your ransomware recovery plan And with ransomware evolving to become so vicious, it begs the question of what you need to
be protecting for your ransomware backup strategy to ensure you can recover from an attack.
to safeguard data
enterprises operate post-attack? So, here's how I believe you should approach determining your ransomware backup strategy:
Can you recover from ransomware? 1. Consider the criticality. The Mat-Su incident highlights the need to consider every
Take our quiz and find out last endpoint, server, SAN, etc. Since many parts of the environment can be affected,
start with the question: How would operations be impacted if <insert endpoint, server,
application, data here> was unavailable? The average downtime, according to
KnowBe4, is 14 hours. So, as you think about the CEO's laptop, the files in marketing
Page 21 of 32
or your Exchange server, put it first through the criticality lens. This will help you focus
In this e-guide
on the parts of the environment that would need first response post-attack.
2. Consider the recovery effort. In some ways, criticality can be used to establish a
How has ransomware recovery recovery time objective, the amount of time in which you need to recover a given data
changed in recent years? set. To provide some context around this, I'd also suggest determining how much effort
is necessary to recover each data set. For example, some workstations just need to be
How ransomware variants are reimaged -- no backups needed. But others require some time dedicated to imaging,
software installations, data recovery, synchronization with other services, etc. Those
neutralizing data backups
that need more effort will take longer. I'd rather have a proactive ransomware backup
How to protect backups from
strategy in place that simplifies the restoration of services in these systems and
applications.
ransomware infiltration 3. Consider the likelihood. While there's never a guarantee that a system is immune to
ransomware attacks, you should consider that it usually takes a user clicking on a
Ransomware backup strategy malicious link or attachment to begin an infection. So, certain systems that have no
guidelines to help ensure recovery access to email or the internet are far less likely to be infected and, therefore, may not
be as critical for your ransomware backup strategy. Also, those systems belonging to
Ransomware disaster recovery: A users that are security-savvy -- again, less likely to click on something malicious -- fall
checklist for continuity into the same category.
Test your ransomware recovery plan The reality here is: If you already have a backup strategy, much of this may already be
covered. But when trying to specifically prepare a ransomware backup strategy for an attack
to safeguard data
that can rear its ugly head seemingly anywhere within the network, it's important to have
Ransomware recovery: How can identified your highest risk areas -- both risk of infection and impact to the business. As a
enterprises operate post-attack? result, any system, application or data that isn't backed up within the context of other disaster
recovery plans will be covered in case of a ransomware attack.
Can you recover from ransomware?
Take our quiz and find out ▼ Next Article
Page 22 of 32
In this e-guide
Ransomware disaster recovery: A
How has ransomware recovery
changed in recent years?
checklist for continuity
Paul Kirvan, Independent IT consultant/auditor
How ransomware variants are
neutralizing data backups Among the biggest concerns in information security today is ransomware, where malicious
code embedded into a system prevents users from accessing data unless a ransom is paid.
How to protect backups from From a business continuity perspective, this represents a major risk to organizations of all
ransomware infiltration kinds.
Ransomware backup strategy An inability to access critical systems and data, or the threat by the perpetrator to publish
guidelines to help ensure recovery confidential data, can damage an organization's ability to conduct business and, more
importantly, damage its reputation and competitive position.
Ransomware disaster recovery: A
Taking a page from information security and business continuity playbooks, the following tips
checklist for continuity
on ransomware disaster recovery planning will help your organization defend its data.
Test your ransomware recovery plan
to safeguard data Implement comprehensive backup
Ransomware recovery: How can Identify the electronic systems, data and other intellectual property your organization needs to
enterprises operate post-attack? operate, and the loss of which could damage its reputation. Ensure these assets are securely
backed up and stored in another location so they can be retrieved in an emergency.
Can you recover from ransomware?
For systems and data that change dynamically during the day, perform multiple daily backups
Take our quiz and find out
using techniques such as data mirroring and replication to ensure the most current assets are
available.
Page 23 of 32
In this e-guide Stop ransomware before it starts
How has ransomware recovery As your network perimeter is the most likely entry point for malicious code, ensure it is
protected with as much intrusion detection and prevention equipment as possible.
changed in recent years?
Can you recover from ransomware? Effective recovery from ransomware and other information threats requires not only a
Take our quiz and find out comprehensive and multilayered security strategy, but close coordination among BC, DR and
security teams.
Page 25 of 32
In this e-guide
Test your ransomware recovery plan
How has ransomware recovery
changed in recent years?
to safeguard data
Alastair Cooke, Consultant for SearchVirtualDesktop.com
How ransomware variants are
neutralizing data backups Ransomware is a favorite way for unscrupulous people to make money, so you need to
ensure your organization won't end up paying a ransom. Having a ransomware recovery plan
How to protect backups from is crucial to surviving an attack. Every device on your network should be patched and running
ransomware infiltration an up-to-date antimalware product. Invest in training both IT staff and line-of-business staff so
they are aware of how ransomware can get into the network, what signs to look for and how
Ransomware backup strategy they should respond.
guidelines to help ensure recovery
Unfortunately, we know from the WannaCry virus that these protections alone are not enough,
Ransomware disaster recovery: A so planning a recovery strategy is crucial. Backups are your best method of recovery; they
checklist for continuity should be trusted and include all the files needed to recover compromised data.
Test your ransomware recovery plan How often do you back up?
to safeguard data
If you need to restore from the last backup, all the work between the time of the backup and
Ransomware recovery: How can the ransomware infection will be lost. The recovery point objective (RPO) is the acceptable
enterprises operate post-attack? period of data loss the business has agreed to, and it's an important part of a ransomware
strategy. Different applications often have different RPO requirements.
Can you recover from ransomware?
Take our quiz and find out When testing your ransomware recovery plan, ensure backups run frequently enough that any
potential data loss is acceptable. Many products can back up near continuously, provided you
have space to store the data.
Page 26 of 32
In this e-guide How long does a restore take?
How has ransomware recovery Restore time is at the center of the business impact of a ransomware infection. The recovery
time objective (RTO) is the time from an event that stops work until work can resume. Like
changed in recent years?
RPO, there will probably be different RTOs for different applications. The bottom line is that
How ransomware variants are the longer the recovery time, the higher the cost to the business for the infection. If the restore
neutralizing data backups cannot start until backup tapes are retrieved from off-site storage, an outage could last hours
or days.
How to protect backups from
On the other hand, if your infrastructure allows for immediate rollback, you may be able to
ransomware infiltration
recover data very quickly. Bear in mind that PCs infected with ransomware need to be
Ransomware backup strategy removed from your network before any recovery can start. Otherwise, the ransomware will re-
guidelines to help ensure recovery encrypt the restored files.
Ransomware disaster recovery: A You can help to reduce recovery times by educating users about ransomware, particularly
how to recognize an infection and how to respond to the situation. The first response may
checklist for continuity
simply be to shut down the PC and phone the help desk.
Test your ransomware recovery plan
to safeguard data Can you trust your backups?
Ransomware recovery: How can The only way to trust your backup strategy is to test your data restoration process. Users
enterprises operate post-attack? accidentally deleting their files usually provide IT staff with a natural reason to restore
individual files. If users are not requesting restores, then scheduling weekly or monthly
Can you recover from ransomware? restoration tests as part of your ransomware recovery plan can help verify that file restoration
Take our quiz and find out is possible.
Page 27 of 32
Some ransomware infections are caused by a
In this e-guide When testing your
single, vulnerable computer and an unlucky or
How has ransomware recovery
careless user. Just a few critical files are affected ransomware recovery
and the issue is detected quickly. More often, the
changed in recent years? plan, ensure backups
ransomware infection rips through the whole
run frequently enough
How ransomware variants are network, and thousands of files are encrypted
Page 29 of 32
In this e-guide
Ransomware recovery: How can
How has ransomware recovery
changed in recent years?
enterprises operate post-attack?
Nick Lewis, SearchSecurity.com Contributor
How ransomware variants are
neutralizing data backups Danish shipping company Maersk, which was heavily affected by the NotPetya
ransomware last year, reported that it recovered from the attack by reinstalling its
How to protect backups from entire infrastructure, including more than 4,000 servers; 45,000 PCs; and 2,500
ransomware infiltration applications. Is a full reinstall the best option for a system infected by ransomware or
is there a risk the malware will remain even after the reinstall? What other options are
Ransomware backup strategy available for ransomware recovery?
guidelines to help ensure recovery
The nuclear option when responding to a cybersecurity incident may call for a company to
Ransomware disaster recovery: A format and reinstall a server or, in more extreme cases, rebuild an Enterprise Active Directory.
checklist for continuity In the most extreme situations, it may require an enterprise to reinstall all of its servers and
endpoints.
Test your ransomware recovery plan
Anything malicious that could survive a format and reinstall would need to persist in the
to safeguard data
firmware, hardware, backups or system management tools, and it would be very difficult to
Ransomware recovery: How can detect and remove. This could be very costly for an enterprise; for most companies,
enterprises operate post-attack? reinstalling the operating system on a compromised device is sufficient.
Can you recover from ransomware? Maersk apparently took the nuclear option for ransomware recovery last year in response to
the NotPetya ransomware and reinstalled all of its servers and endpoints. It is possible
Take our quiz and find out
Maersk took this extreme response because the attackers compromised its Active Directory,
as well as its endpoint management tools and the system used for logging.
Page 30 of 32
If all of those systems were compromised, the enterprise wouldn't be able to tell what systems
In this e-guide
weren't compromised and wouldn't be able to use their existing systems to rebuild. Because
Maersk had to start from the ground up to rebuild the network, incorporating this process into
How has ransomware recovery
the company's business continuity and disaster recovery plan would have been a good idea.
changed in recent years?
The standard advice for ransomware recovery is to reinstall the compromised systems and
How ransomware variants are restore system data from backups. However, it is important for defenders to only restore data
neutralizing data backups from a known good state to avoid inadvertently restoring the ransomware -- or the
vulnerability the ransomware exploited to attack the system.
How to protect backups from
ransomware infiltration When the system is reinstalled, it should be brought up to date with patches and have a
securely configured image installed. If your endpoint security tool doesn't address
Ransomware backup strategy ransomware, then you may want to choose a different tool or take other steps to ensure that
guidelines to help ensure recovery protection from future ransomware attacks is in place.
Ransomware disaster recovery: A Within the ransomware recovery process, if the ransomware affected a file share or server,
checklist for continuity then you must take the additional step of investigating how malware could affect a server to
adequately secure the server, including fixing share or file system access control before
Test your ransomware recovery plan bringing it back online.
to safeguard data
Page 31 of 32
In this e-guide
Can you recover from ransomware?
How has ransomware recovery
changed in recent years?
Take our quiz and find out
Erin Sullivan, Site Editor
How ransomware variants are
neutralizing data backups Ransomware is easily the most pressing issue facing modern disaster recovery efforts, and
it's only becoming more urgent. To recover from ransomware, an organization needs to have
How to protect backups from backups and other recovery tools in place prior to an attack.
ransomware infiltration
Treating ransomware like an inevitability rather than a hypothetical seems like the best
Ransomware backup strategy strategy these days; thinking of it as something that could happen to you, not just something
guidelines to help ensure recovery that happens to others. But what can be done following a ransomware attack? There are a
few options.
Ransomware disaster recovery: A
Whether you're looking at your existing data protection strategy or shopping for ransomware-
checklist for continuity
ready products, there are a lot of elements to consider. What product options are out there?
Test your ransomware recovery plan Whose responsibility is it? Should we just pay the bad guy and get it over with?
to safeguard data Take our quiz here, and find out if you know all there is to know about how to recover from
Ransomware recovery: How can
ransomware.
Page 32 of 32