Ransomware: Be afraid. Be very afraid.



By Eli Lopez for Beyond The Blocks - Friday, October 07, 2016

Lock-067304-edited.png
What will you do when your security measures fail?

Cyber attacks happen. How can you recover quickly?

If you are in IT management, everywhere you turn, you see warnings of malicious forces working diligently with the one aim of compromising your security and eating your data for lunch.

It’s not a question of if anymore but rather of when. Many times the cyber security tools will not prevent the break-in, but only alert you of the compromise.

In recent months the number of ransomware attacks has grown dramatically and it is safe to say that this is the highest priority item on CIO lists and what keeps them up at night…

The IT world is flooded with ransomware protection tools but any time you install a new tool, you can be sure someone just came out with a new ransom threat for which your new software does not provide protection.


The April Cybercrime Alert report, released by phishing defense firm PhishMe, says ransomware attacks will grow in size, as the malware changes faster than detection technologies, paying ransom is still the safest way to get your data back, and one successful attempt usually means another one will strike soon.


Prevention is not enough. CIOs are looking for fast and reliable recoverability.

There was a local roundtable of CIOs recently discussing their most pressing concerns. The main conclusion was that since these attacks are bound to happen to organizations at some point and cannot be totally prevented, what CIOs should concern themselves with is the ability to recover from such attacks as quickly and seamlessly as possible.

Management will understand and accept that their organization security was compromised but will not put up with a CIO who did not prepare for quick recovery.  

Imagine such a scenario – you have been compromised and you receive a ransom demand.

Your first wish is that you could go back in time to just before the attack and clear all of your data of any damage caused by the attack.

You could use your storage native snapshot capability (scheduled “images” of your data)  to go back in time. Typically snapshots are taken every few hours and so you would lose a few hours worth of data.

 

Imagine you had a magic wand which could “rewind” your data to the exact second before the attack.

Well you can!

Reduxio storage systems give you a time machine which will allow you to go back in time to precisely the second before the attack. We call this capability BackDating.

It allows the sysadmin to choose any time in the past at one second granularity and either create an independent clone or revert the original data volume to that time.

With no upfront administration or scheduling, no complicated consistency groups, lightning fast time travel and efficient space consumption, this is the capability which allows you to recover your data to right before the attack.

This is the time machine that will enable you to save your organization and be the hero of the day.

In conclusion, it would seem that the correct approach in dealing with cyber threats is to utilize the best cyber protection tools but also to prepare for quick recovery when your data is compromised.

Reduxio storage systems are the only storage arrays in the market with the native capability to go back in time at one second granularity. Recovering from cyber-attacks is one unique use case customers have found for this capability.

The only innovation which surpasses Reduxio’s innovation,  is our customers’ innovation when it comes to finding new use cases for Backdating…

Backdating Data Security

Remember, only investing in cyber protection and not in quick recovery capabilities is like going on a rough terrain safari without a spare tire…

 

Eli Lopez

Written by Eli Lopez

Eli has extensive experience in the storage industry both as a customer and working for multiple innovative storage vendors such as NetApp, EMC, and Reduxio, where he has held technical, sales, product roles. Eli holds a BSc in Computer Science from the Hebrew University of Jerusalem, is married with 4 children and lives in Israel.



Want to comment on this blog post?