Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Backup & Storage

A Couple of Tips For Ransomware Defense for Disaster Recovery

Just like Harry Potter had to learn new skills in his defense against the dark arts studies, today’s IT administrators need to add new and improved defenses to protect your businesses from the ever-growing threat of ransomware. With traditional disaster recovery, the administrator was mainly concerned with recovering from a hardware or software failure or sometimes in extreme cases, from a natural disaster or site failure. While that’s all certainly still valid, there’s little doubt that exposure to a ransomware attack can leave your business every bit as inoperable as if the servers and OS had failed; the security firm Malwarebytes estimates that ransomware attacks increased more than 90 percent from 2016 to 2017.

Several recent high profile ransomware attacks serve to highlight the dangers of a ransomware infestation; notably, the ransomware attack that crippled the city of Atlanta for several days shows that ransomware isn’t just restricted to hospitals or Eastern European countries that still run Windows 7.

The Atlanta attack in March of 2018 left 8000 city employees without access to their systems for several days. Atlanta was hit by ransomware named SamSam and they were asked for a ransom of approximately $50,000 worth of bitcoin. They refused to pay the ransom and brought in eight different security firms to assist with ransomware cleanup efforts as their email, financial software, CRM and other vital city services were inaccessible. Overall, it’s estimated that the city of Atlanta spent $2.6 M to recover from the attack and their key services were inaccessible for almost five days. In their case, the SamSam ransomware attack clearly resulted in a DR scenario where major system recovery was required.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

They say that knowing is half of the battle and when you understand the dangers of ransomware and how it spreads, you can begin to protect your business from it. Some of the steps that businesses should take to help defend themselves from ransomware attacks include:

  • Back up your data – Backups are the foundation of your data protection strategy and having a set of archived backups will ensure that you have a copy of your data before it was infected with ransomware.
  • Keep your computer operating systems updated – Most malware and ransomware exploit known system vulnerabilities. Keeping your systems current with supported operating system and security updates will stop most attacks.
  • Use antivirus software – Updates are important but running antivirus software is also required to make sure that you have protection from known malware and ransomware.
  • User training – Your users are your first line of defense. Educating them on the nature of malware and ransomware can help prevent the initial infection. Many ransomware attacks are spread through phishing emails that entice users to click on them thereby executing the initial malware attack.

Beyond these preventative steps, certain changes to your backup protocols can help ensure that your backups remain ransomware free. Using air-gapped backups where your backup archives are physically separated and separately secured from your on-line network can ensure that you have a backup copy that is not corrupted by any potential ransomware attack. The physical separation ensures that network scans cannot reach the backups and a different set of security credentials prevents access from even privileged AD accounts.

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Michael Otey is president of TECA, a technical content production, consulting and software development company in Portland,
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: