ransomware-protection

ransomware-protection


What is Ransomware?

Many IT managers, CIOs worry about Malware, and such Ransomware attacks, and as such ransomware protection, is at the top of our mind in the ultimate search for data protection, and business continuity.

Ransomware Protection – So what is ransomware?
Ransomware ProtectionQuoting directly from Wikipedia; “Ransomware is a type of malware from cryptographic that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptographic viral extortion, in which it encrypts the victim’s files, making them inaccessible, and demands a ransom payment to de-crypt them.

Ransomware attacks are typically carried out using a Trojan that is disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. However, one high-profile example, the “WannaCry worm”, traveled automatically between computers without user interaction.”

When did it begin?

Its commonly acknowledged to have started at about 2012, with a multitude of internet scams increasing globally.  The statistics are clear: About 181.5 million ransomware attacks took place in the first six months of 2018.  The previous year 2017 we say 229% less in terms of attacks.  As early as in 2014 anti-virus companies such as Norton, and McAfee published data demonstrating that they had seen more than twice the number of samples of ransomware  in one quarter, than they did in the same exact period in in 2013.  McAfee advised that CryptoLocker was particularly successful, procuring an estimated US $3 million before it was taken down by authorities, and same for CryptoWall which was dealt with by the US FBI.

ransomware protection

Defense by backup!

ransomware defenseA common modus operandi way in which hackers, would attempt to place an organization data in compromise is to attach all types of software; anti-virus, firewalls, and backup.  Businesses which use Microsoft Office 365 online, and or  G Suite, Dropbox Business, Box Business, and such cloud software, naturally benefit from the protection of the cloud service they have adopted alongside its cloud backup solution such as CloudAlly.  However, illegal entry of criminal activity into a business major application, is recoverable from any point in time with the restore capabilities of CloudAlly.

Defense is the best attack

Business organizations which have backed up their Microsoft Office 365 online with CloudAlly are able to restore back to any period, as of course they enjoy an unlimited retention period, and choose a particular data in time previous to the actual hacking attack.

Proof is in the pudding

It takes virtually 5 mins to initiate a free 14 day trial backup for your organizations business solution, and from that particular moment onward your data is safe & secure, with the ability to restore from any point in time.  Regardless, of what happens to Microsoft Azure outage, or incident such as the recent Cloudflare CDN outage, your data is safely secured on a 3rd party data center Amazon AWS, unaffected from disruptions to business.