We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Ransomware: How to avoid becoming the next victim

Ransomware: How to avoid becoming the next victim

posted in Backup & Recovery ● 21 Mar 2017

2016 was dubbed the year of Ransomware in the technology industry and it remains one of the largest threats to security within the industry today. Redstor have teamed up with computing.co.uk to provide guidance on how to stay protected from ransomware and how to recover if you do get stung.

What is Ransomware

Ransomware has been around for over a decade although it was not until 2013 that it started to become big news, with the arrival of Cryptolocker. Ransomware strains all have commonalities; they make your data inaccessible through encryption and to regain access, you will have to pay a ransom within a set time period.

It has been reported that some scammers have demanded ransoms of up to £1m and in thousands of pounds in schools no less. Even after paying a ransom, there is no guarantee that data will be unencrypted in its entirety and there is no guarantee it won’t be encrypted again.

What’s in the whitepaper?

With Ransomware being such a hot topic, Redstor and computing.co.uk wanted to understand how it has been affecting organisations and how much is known about how to deal with these kinds of attacks. We have completed a survey of decision makers within a range of organisations varying from industry to size and compiled the results.

The whitepaper covers a range of topics including real world ransomware attacks, what the true costs of an attack could be and what defensive measures organisations can take.

With almost 60% of those surveyed indicating they have been affected by ransomware, or know someone who has been, now is the perfect time to find out how to up your protection against ransomware.

Protecting all data, whenever, wherever, forever

Redstor’s data management and security platform encompasses, backup, disaster recovery, archiving and security. By taking a holistic view on data security, Redstor protect data regardless of its location, ensuring that it can be made available again on demand. Our customer community shapes our technology by actively participating in our development roadmap, and we actively respond with monthly releases and feature updates to their benefit.

Download the whitepaper.

Vital new role of AI in keeping backup data safe from malware

Vital new role of AI in keeping backup data safe from malware

Every day more than 350,000 new types of malware are unleashed on the internet. The scale of the problem is so massive, it is no longer enough to have traditional anti-virus software, solely defending against known threats.

Continue reading
Xero Data Backup

Why you should consider Xero Data Backup for your accountancy firm

Ignoring the need for a third-party backup is a major gamble. Xero’s own Services Agreement states: “You must maintain copies of all data inputted into the service. Xero expressly excludes liability for any loss of data no matter how caused.”
Continue reading

Survey on risk of data loss and cybercrime

Wondering how best to fend off new cyber threats? Curious about what your peers are doing?

Continue reading