Anti-ransomware software supports your disaster recovery plan and protects files and backups and so it is a great addition to your strategy. Disaster recovery plans are being developed to ensure business continuity in case of incidents that affect systems and data. All such projects include solutions that perform regular backups of important files, in various ways and to different locations but most do not include anti-ransomware protection. However, ransomware is a problem even for good disaster recovery plans as there are at least three ways in which it can break even the most efficient ones:
If during a ransomware infection, the backup repositories are online and reachable from the infected machine, and if the ransomware runs in a security context that has sufficient rights to access the backup repositories, it may attack and encrypt the backups. Depending on the backup strategy in place, the impact of this type of incident:
•With proper offline/online backup synchronization, it may just involve rebuilding the online backup from another (offline) backup, eventually losing a few hours worth of files;
•Without proper offline/online backup synchronization, or if the timing is terrible, it may involve losing a significant time range of backups.
In any case, there is serious downtime and concern for IT.
If endpoints get infected with ransomware, and if a backup task runs before the infection is detected (usually the case in unprotected environments), it may be that the backup solution will copy encrypted files into main backups. These encrypted files may propagate to offline backups, etc. The impact of this incident varies depending on when and how the ransomware infection is being detected, but it all boils down to having backups which cannot be restored.
Here is a real-life scenario experienced by one of our customers before using our solution.
It provides some insight into the impact of such an incident: a laptop is connected to the network and infected with ransomware. During the infection, the ransomware attacks a mapped drive on the laptop, that points to the file server and encrypts part of the data on the file server. Next, the ransomware infection is detected on the laptop as ransom notes pop out, but nobody has any idea about the fact that the file server was also compromised remotely. The endpoint is restored from the last backup, some files are lost, but the incident is closed. Next, the backup job runs on the file server and backs up encrypted files without anybody knowing. At this point, there is a backup that IT relies on, but which cannot be restored.
Ultimately, with incremental backups, if there is a ransomware incident, you always lose the files changed between the last backup and the ransomware incident itself. Restoring from the last backup helps a lot in this case, but there are cases where the files changed in-between are critical and cannot be recovered. In these cases, the business loses time and money re-doing work already done.
Our anti-ransomware software detects and stops ransomware in seconds, and notifies IT on such incidents. At the same time, it creates real-time backups of files being manipulated in suspicious ways, covering the gap between the last incremental backup and the ransomware incident, and ensuring no data is lost. It also protects the files it backs up in safe vaults on the local hard drive. The backup solution part of the disaster recovery plan can feed on these secure vaults ensuring no encrypted files make it to the backups.
By using anti-ransomware software together with backups, your disaster recovery plan benefits from the following enterprise ransomware protection features:
•No important file loss on ransomware incidents, even if the incremental was taken hours ago;
•No backup repositories get compromised;
•No encrypted files make it into main backups that IT needs to rely upon.
Anti-ransomware software delivers adequate ransomware protection for your latest files and backups, and the advantages it brings make it a great addition to your disaster recovery plan. For more information, follow us on social media and subscribe to our newsletter.
This post was last modified on August 21, 2023 7:27 am
In the digital world, information is often stored and transferred through files. From the most…
Introduction Data security is more important than ever in today's fast-paced digital world. One critical…
Introduction: Cyber threats are a growing concern for businesses and individuals alike. With the increasing…
Microsoft Internet Information Services (IIS) is a popular web server that is widely used to…
File tracking is an important aspect of server administration, and it can help administrators detect…
File monitoring solutions are essential tools for administrators to manage and protect their organizations' data…