display: inline;

[categorySlug].forEach(function(val) { isInsiderContent: (stringFromDataLayer('isInsiderContent') == "true"), primaryCatList.split(',') : []), More recently, Ryuk hit several high-profile targets, including the Los Angeles Times and cloud hosting provider Data Resolution. .brVideoContainer { dataType: "script",

"articleId": IDG.GPT.targets["articleId"],

Optimize and test: DR planning not only entails making sure your data can be fully restored, but also ensures that your backup strategy … $("#jw-standalone-close-button").click(function() { userData[key] = responseData.attrs[hermesAttrs[key]].option_label;

if (edition === "in" && beforeEndDate === true) { stringFromDataLayer('userId') : null), if (edition === 'us') {

"If your user’s account is compromised, the first thing the attacker wants to do is escalate their privileges," he said. margin-bottom: 10px; 'industry': dlIndustry, Knowing how to recover from ransomware can save your company. Which systems are the priority for recovery? jobIndustry: (dlIndustry !== "" ? It might be that more frequent backups are needed. 'insiderSignedIn':insiderSignedIn, This email address is already registered. });

That doesn't mean that all backups are now vulnerable, however. if ($("#drr-container").length > 0) { Cisco also ... Juniper Networks plans to 'enhance' its Contrail SD-WAN through the acquisition of 128 Technology. In other words, you need a backup that the ransomware cannot touch. Please provide a Corporate E-mail Address.

Ideally, a ransomware backup strategy should include as many recovery points as possible in order to maximize the chances of being able to recover from an infection. It is all too easy to miss critical data off a backup plan, whether they are held on local systems or in the cloud. Bitdefender's director of threat research Bogdan Botezatu says that the main reason for the drop in ransomware attacks is that security companies are getting better at defending against it. That being the case, you might consider using process whitelisting, which forbids any unauthorized process from running on protected systems. j=d.createElement(s),dl=l!='dataLayer'? Sign-up now. if (! var prodManufacturers = ''; No problem! 'geolocEnabled':'true', 'suppressMonetization': supMontMods.toString(),

(tokens['industry']===undefined)) { dlIndustry : null),

} I've been tasked with coming up with the best strategy for protecting our backups against ransomware. display: inline-block;

Keeping separate backups for critical business systems should also make recovery easier. "We've also seen them reach out to shared network drives.". 'primaryCategory': 'ransomware', //OC-1647 change to indicate this data was remove ", Ransomware will now delete any backups it happens to come across along the way, Kujawa says. "So if you go to system restore, you can't revert back," he said. secondaryCategories: stringFromDataLayer('primaryAncestorCategoryList').length > 0 ? if (prodNames !== '' || prodManufacturers !== '' || prodCategories !== '' || prodVendors !== '') { type: "get", type: stringFromDataLayer('displayType'),

page: { 'primaryCategoryAll': 'ransomware, cyberattacks, security', You create a much larger target — that's a trend that we definitely see happening.

idg_uuid = getQueryVariable("huid"); Backups are often thought of as being a defense mechanism against ransomware. Ransomware often uses time delays to avoid detection, or “attack loops” to target apparently clean systems. That means ensuring that good, clean backups are made regularly and that they are thorough and comprehensive, quite possibly “air gapped” too. z-index: 999999; 'skimlinksId':'111346X1569475', It is also becoming more capable. 'goldenTaxonomyIdAll': '71, 945, 941', IT teams should also review how long they keep backups, especially their air-gapped media. The ransomware that is out there, however, is evolving, he says. dataLayer.push({ adblocker: (adBlockStatus == "true"), //detected further up the page $('body').prepend(videoPlayerMarkup); if (val.length !== 0) { Testing your restore process prior to an attack is a major part of surviving a ransomware infection.

}

ransomware attacks have become more focused, According to the National Centre for Cyber Security, a thorough audit of all business data locations, Double extortion ransomware attacks and how to stop them, Backup and security join forces for ransomware protection, Digital public services fail UK citizens on multiple fronts, Tech Talent Charter launches Doing It Anyway role model campaign, Deutsche Bank in talks over sale of IT unit to TCS, Securing Australia’s distributed workforce. According to Kaspersky Labs, 765,000 of its users were attacked by malware that encrypted files during the past year, compared to more than five million that were attacked by cryptominers. "tag": custAdTag, Is your company's IT governance strategy cloud ready? If a storage block is modified, then the block is backed up.

Security tools, including mail filtering, malware scanning, firewalls and network monitoring can help, as will patching and limiting network users’ access privileges.

position: absolute; McAfee reports a decline in both malware and samples this past year. "adscheduleid": "LxK3nuOJ", if (getQueryVariable("huid") !== false && idg_uuid === '') { But ransomware also spreads via direct attacks on servers, malware attachments to email, and via cloud resources. }, Contributing Writer, })(window,document,'script','dataLayer','GTM-WR6LD2P');

'isInsiderContent':'false', But the most effective protection is a robust backup regime to protect data. 'podcastSponsored': 'false', 'articleTitle': 'How to protect backups from ransomware', Please check the box if you want to proceed.

$.cookie('idg_uuid', idg_uuid, {path:'/', domain: ".csoonline.com", expires: 90/*,secure:true*/}); 'property': 'cso online', overflow: hidden;

Cloud providers themselves are at risk of ransomware attacks, warns analyst Fred Moore of Horison Information Strategies. Best practice for backup remains the 3-2-1 rule: make three copies of data, store across two different forms of media and keep one copy off-site. // article

All backup and recovery plans need to be tested.

var dataLayer = window.dataLayer = window.dataLayer || []; 'articleDisplayId':'1', 'daysSincePublished':"648", 'platform':'Web', manufacturers: stringFromDataLayer('prodManufacturers').split("|"),

'&l='+l:'';j.async=true;j.src= //product js vars defined in document-head "permutive": googletag.pubads().getTargeting('permutive'), This email address doesn’t appear to be valid.

'articleId': '3331981', '//www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);

} } "schedule": customAdRoll });

Why SASE should be viewed as an evolution, not revolution, Iranian hackers pose as far-right group to threaten U.S. voters, The power and plights of female network engineers, Bye-bye ISR, hello Catalyst 8000 for Cisco SD-WAN, Juniper's 128 acquisition needed to improve SD-WAN, IBM cloud revenues climb as hardware continues to decline, Figure out the differences of asset management vs. CMDB, IBM partners with HBCUs to promote quantum computing, Growing enterprise benefits of augmented data management, MongoDB Atlas now enables multi-cloud database clusters, How AI data privacy can help your enterprise.

}); Install intelligent, integrated cyber security software. }).done(function(responseData){

catIdList.split(',') : []), Hourly Replication of all data to a secondary local Server. }, jobPosition: (dlJobPosition !== "" ?

“They simply steal the credentials and delete or encrypt an organisation’s cloud backups using a man-in-the-middle-attack.”. Computer Weekly: Why is IBM splitting in two and what does it mean for CIOs?

Cloud storage should be resilient against physical failure, but this will not protect against ransomware that infects files.

It's all about Dell's Project Apex ... Dell's cloud focus culminates in launch of Project Apex, which allows data centers to flexibly consume IT and storage ... Hyper-converged systems provide a way to locally process IoT data and deliver streaming content at the network's edge while ... Composable infrastructure can stand up and down virtual servers depending on the varying needs of workloads. 'datePublished':'2019-01-14', userKeys.forEach(function(key) { { The new Accenture ServiceNow Business Group aims to initially deliver industry offerings in financial services, government ... An SAP S/4HANA selective data transition might be the best approach for a customer's ECC conversion. }); title: stringFromDataLayer('articleTitle'), "channel": IDG.GPT.targets["channel"], "pagetype": adLayer["itemType"],

language: 'en', $.ajax({ "custParams": customParams } id: (stringFromDataLayer('userId') !== "" ? Ransomware is getting smarter, attacking backups to prevent recovery.

}); As such, it is critically important to keep ransomware off of your systems, and to have a ransomware backup plan in place to recover your data if an attack does occur. }); ]. "advertising": { } "autostart": true,

Daily backup of all data to local backup server. const stripOutIllegal = s => s.replace(/[~'"=!+#;^()<>&[]]/g,''); } Does the backup plan cover temporary or consumer-focused cloud data stores? In my view, the idea that backup is a silver bullet for ransomware is a very dated and dangerous view to hold on to in 2020. adBlockStatus = 'true';

To defend against ransomware that deletes or encrypts local backups of files, Kujawa suggests using additional backups or third-party utilities or other tools that aren't part of the default Windows configuration. height: auto; To protect against ransomware, the offsite backup should be isolated from the business network. jobPosition: (dlJobPosition !== "" ?

There is no specific good backup strategy specifically to counter ransomware, there are only good backup strategies in general, and there are many questions about those on the site. Recent high-profile attacks like WannaCry have IT experts around the world shaking in their boots. We'll send you an email containing your password. How intelligent workload management tools can help IT admins cut through cloud complexity, Top five ways backup can protect against ransomware.

This article can also be found in the Premium Editorial Download: No problem!

Do Not Sell My Personal Info. Reduce recovery time and ensure data is secure with planning and preparation. cache: true, // default is false