FEATURE : RANSOMWARE
Edwin Weijdema , Global Technologist , Veeam , says Business
Continuity is all about backup .
In the likely event of a ransomware attack , the extra copies can allow organizations to go back online as soon as possible and be reinstated to the most recent save point .
It is imperative that all backups are monitored daily and should have zero errors . Restore testing should be performed at recurring intervals to ensure that the most updated data can be retrieved .
Employing a robust backup strategy is important in fortifying an organization ’ s defences against ransomware attacks Backup data is the last line of defence against ransomware attacks and hackers know this . By attacking the backup solution , attackers completely remove the option of recovery and essentially force payments .
While best practices such as automating cyber detection scans , securing backup credentials and auto verifying that backups are restorable are beneficial , the key tactic is to ensure that backup repositories cannot be corrupted or deleted .
Organizations must focus on immutability by addressing unclassified data and data that is not tagged or identifiable in order to assign a risk level to datasets . Identifying and tagging important data will allow businesses to see which of their datasets have been breached in an attack , allowing IT leaders to determine if sensitive data was leaked .
Over 493 million ransomware attacks took place last year – a sure sign that such incidents are growing in volume and intensity and now affect every industry sector .
As the threat landscape continues to evolve , it is imperative that businesses adopt proactive measures and learn how to effectively respond when needed .
For many organizations , the first instinct is to pay the ransomware fee when attacked , but many do not realise that this does not guarantee that data will be recovered or returned to them .
According to the Veeam 2023 Ransomware Trends report , 80 % of global organizations surveyed paid the ransom to recover data and end an attack , up 4 % compared to 2022 .
After payment , only 59 % who forked out money were able to retrieve their data .
Not paying is often part of an organizations ’ security protocol , yet of 80 % who paid , 41 % of these businesses have a ‘ do not pay ’ policy on ransomware .
One backup is no longer the standard practice and it is recommended that businesses follow the ‘ 3-2-1- 1-0 ’ rule , allowing companies to have a solid backup strategy that can be utilized in the event of a disaster .
The rule essentially means three copies of backup , with two backups stored on different storage media , one at an offsite location and one offline .
With the rate and speed that organizations are getting hacked , it is time for organizations to stand strong against hackers and refuse payment . IT leaders can do this by taking the right steps , educating staff on being vigilant on suspicious links and implementing security measures .
Understanding the reasons behind organizations ’ willingness to comply with ransomware demands is
Backup the best defence in the face of ransomware attack
40 INTELLIGENTCIO NORTH AMERICA www . intelligentcio . com