— How To Backup Google Apps & Drive —
The FBI reports that there are 4,000 cyber attacks per day—that’s almost four attacks per minute—and they’re becoming more prevalent. In 2015, there were only 1,000 attacks per day. That’s a 300% increase, and the latest global ransomware attack may have been one of the worst yet. Is your company considering how To Backup Google Apps & Drive?
While it’s obvious from their regularity that the business world is no stranger to malicious viruses, malware, and more, in many cases even large organizations aren’t fully prepared to prevent an attack. That’s because, when 93% of phishing emails are now ransomware, it can be difficult to keep up with the criminals particularly when your company’s safety is not in the hands of your knowledgeable IT department but in the hands of your everyday employees. If even one employee clicks on a link or downloads an attachment from a hacker, the data of your entire company could be compromised.
The key is understanding exactly what malware is and knowing whether all of your data, including Google Drive, is protected.
What Is Ransomware?
Ransomware is a type of malware virus that takes over a computer and prevents access to data until a ransom is paid. It works by encrypting files and forcing you to pay a fee if you want to decrypt them. Only the ransomware creator knows the encryption key, and if your company isn’t willing to pay up, the data is often deleted and lost forever.
In many cases, the ransom demand is made via new computer wallpaper, which details specific instructions for payment. Some past messages have read:
- “Your computer was used to visit illegal content. To unlock your computer, you must pay a $100 fine.”
- “You only have 96 hours to submit the payment. If you do not send money within the provided time, all of your files will be permanently encrypted, and no one will be able to recover them.”
Payment demands can be up to $500 USD with the price doubling if funds are paid within a specified time—usually 24 hours.
The most recent iterations of ransomware have targeted enterprise end users who may not think they are “valuable” or “high-profile” enough to be the victim of an attack. The reality is that anyone can be a victim, which was more than proven in the most recent widespread attack.
Recent Ransomware Attack
“Petya” might not sound like a dangerous word, but it’s the name for a vicious ransomware attack that crippled organizations all over Europe and the US in June 2017. It began in the Ukraine and quickly spread around the world, crippling big institutions such as WPP, Mondelez (a food company), DLA Piper (a legal firm), Maers (aDanish shipping and transport company), and Merck a large U.S. pharmaceutical company. The attack locked thousands of employees out of their computers until the ransom was paid.
Large organizations were particularly vulnerable to Petya because it only took one machine becoming infected for the ransomware to spread throughout the entire network. However, that doesn’t mean small companies weren’t at risk, too. Any machine connected to the Internet—nearly everyone—is susceptible.
And “Petya” is only the most recent attack. Just two months previously, the WannaCry or WannaCrypt ransomware attack hit more than 150 countries, 230,000 computers, and hundreds of companies including Telefónica, German State Railways, and the Britain’s National Health Service (NHS).
In both attacks, the ransomware spread rapidly using Microsoft Windows as its venue to move throughout each network.
In the case of WannaCry, the ransomware found a vulnerability in Windows that could have been fixed with a software patch, but many companies were using an outdated version. Worse yet, WannaCry didn’t require humans to spread. Once it was unleashed, it had the ability to move around the network by itself. WannaCry was able to hunt down vulnerable machines and infect them, too. It spread like a virus, searching out weaknesses and exploiting them.
Petya worked similarly.
The Petya attack began through a software update mechanism built into a regularly used accounting program. Then, a second wave of infections was released using a phishing campaign with malware-laden attachments. However, unlike WannaCry, which tried to spread both internally and externally, Petya focused solely on internal networks, which limited its range of damage.
“I’m willing to say with at least moderate confidence that this was a deliberate, malicious, destructive attack or perhaps a test disguised as ransomware,” Nicholas Weaver, a security researcher at the International Computer Science Institute, told Krebs on Security. “The best way to put it is that Petya’s payment infrastructure is a fecal theater.”
Still, in both cases, the outbreaks were devastating for the companies affected and were difficult to coral once unleashed. And security experts warn that Petya and other ransomware strains will continue to proliferate.
So, how do you protect your company?
Preventing Ransomware Attacks
The best way to prevent a ransomware attack is to be prepared for one. There’s no way to 100% stop ransomware, since it’s up to user error and appropriate training, but there are a few things you can do to negate the affects of a ransomware attack. The first step is to review your company’s security settings along with your software habits to reduce your chance of becoming a victim.
The most important protection: regularly backup Google and all of your SaaS data. The advantage of cloud storage is that it automatically backs up your data in a secure and remote location, so even if your business becomes compromised your data stays protected.
A common misconception when it comes to SaaS data in the cloud is that it’s backed up and protected. This is not the case—Google backup does not exist and Office 365 backup is limited.
Google Drive automatic backup only happens if you use third-party software, like CloudAlly, to protect yourself. This means that if you’re infected with ransomware, all of the files, spreadsheets, and private information that you put in the cloud to keep it “safe” could be at risk of attack.
And an external backup drive is not sufficient. A hard drive backup that is connected to your computer can be compromised during a malware attack.
Using CloudAlly, you can auto backup Google drive every single day including your Mail, Drive, Calendar, Contacts and Tasks. This simple step can reduce your risk of losing everything if a hacker takes your system hostage. When you have a backup, you can ignore the request for ransom and have your IT department remove the malware without any data loss worries.
Then, once your system is clean again, CloudAlly offers a simple non-destructive restore process, allowing you to recover your data in its entirety with point-in-time recovery.
“If you administer your company’s cloud accounts and need a simple to use but sophisticated backup solution, CloudAlly is all you need.” — Gareth Griffiths, NRH