There are many reasons that businesses and their IT teams may weigh up the option to backup and protect data with an inhouse solutions versus outsourcing data backup.
Continue readingRansomware attacks are becoming more severe and the creators of this malware are always looking for new and cunning ways of circumventing security mechanisms. Ransomware is fundamentally a bullying tactic and those that are unprepared, like home users and everyday consumers, are easy targets – they’re also the typical profile of a ransomware victim. Education about ransomware isn’t really mainstream and unfortunately the average home user doesn’t always expect to be affected, which leaves them uninformed and unarmed.
In recent years, businesses, including large corporations, have been targeted more and more, with attacks being highly focused and personalised to the target. Research by Symantec for the period between January 2015 and April 2016 has revealed that 57% of individual consumers were victims of a ransomware attack and 43% of organisations. It is clear that ransomware is no longer a problem experienced by only consumers, but businesses as well.
When a machine has been infected, here are some basic steps to go through towards the recovery:
The necessary prerequisites for Step 3 are stipulated in the FBI’s tips for a business continuity plan to help combat the effects of ransomware. Therein they recommend the following:
A comprehensive backup solution is your best chance of surviving a ransomware attack.
Though many opt not to use data backups because they feel that recovering a full system would take too long. Instead, they choose to pay the ransom in the hopes that their now encrypted data will be released sooner. Unfortunately, there is no guarantee that the cybercriminals will not continue the extortion: they could give you the incorrect decryption key, or even delete your data.
That is why we recommend using a backup service provider that has the ability and functionality to quickly and effectively restore critical data – be it to recover an entire system or not. Redstor’s Backup Pro provides a capability known as InstantData that facilitates instant access to data, allowing you to either work on data while it is being restored or to recover a full bootable machine to a virtual machine within minutes. With these two options you are able to access critical data with almost zero downtime or to revert an entire infected system to a previous working state.
There are many reasons that businesses and their IT teams may weigh up the option to backup and protect data with an inhouse solutions versus outsourcing data backup.
Continue readingCyber-criminals are increasingly viewing education institutions as easy prey. No surprise then that the UK’s National Cyber Security Centre (NCSC) recently warned of a spike in the targeting of schools, universities and colleges.
Continue readingThe majority of Google services went down yesterday, leading to widespread disruption all around the world. Users were left waiting for almost an hour before hearing they could regain access.
Continue reading