Ransomware: When potential becomes reality – fast recovery is priority

5 best practices that organizations can adopt to protect and recover from ransomware by safeguarding the most important asset to any business – data

Ransomware Hack Code

Author

Matthew Johnston is Area Vice President, ASEAN, at Commvault.

We’ve all heard the warnings from industry gurus about the potential threat of ransomware. On May 12, those ‘potential’ threats turned into reality. WannaCry, a worldwide cyberattack is the largest to date, affecting businesses in more than 100 countries and counting. From petrol stations in China halting mobile payments, while in Jakarta, 400 computers in a hospital were affected, blocking access to patient records. With public service, government and commercial businesses being affected – this has led to the question, “is my business truly protected?”

This event certainly solidifies the reality of the world in which we live. Once attacked, there are only two options: pay a fee to unlock your content or implement your data recovery plan – and do it fast. Having a data recovery plan has always been a must, but what was once good enough, may now leave you exposed in this new reality.

Based on our experiences working with companies around the world, we’ve developed a list of best practices to protect and recover from ransomware attacks.

1. Develop a program that covers all your data needs. You must identify where your critical data is stored, determine your workflows and systems used to handle data, assess data risks, apply security controls, and plan for evolving threats. If it is not protected, it cannot be recovered.

2. Use proven data protection technologies. You need solutions that detect and notify of potential attacks, leverage external CERT groups, identify and prevent infection, maintain a ‘GOLD’ image of systems and configurations, maintain a comprehensive backup strategy and provide a means to monitor effectiveness.

3. Employ Backup and Data Recovery (DR) processes. Don’t rely solely on snapshots or replica backup. Your backup process data could just as easily be encrypted and corrupted if it is not stored in a secure way where a ransomware attack. If your process or vendors don’t offer ransomware protection that addresses the proper way to store your data, then your backup plan is at major risk!

4. Educate employees on the dangers of ransomware and how to secure endpoints. Ransomware invasions often originate through endpoints, such as desktop computers, laptops, smart phones, tablets or fringe computing resources. Educating your staff is key. The security off an organization is only as strong as your weakest link. Train your staff on all data recovery and security best practices to get endpoint data protected within your Information Security Program. The strength of an organization lies in your weakest link, with most breaches arising from simple human error.

5. Assess and update any business applications. Most organizations suffer from key business applications that run on older, sometimes unsupported and unpatchable operating systems, which lack the necessary security updates to stop the spread of potential attacks. To combat this, businesses must invest in a data platform that covers core enterprise, private and public cloud environments and extends to endpoint protection. One that can store immutable, up-to-date copies of all these environments to ensure the ability to recover rapidly – should disaster strike.

Evaluating your current ransomware threat readiness and applying these key steps will make sure that your organization is doing everything possible to avoid turning the long-term consequences of ransomware attacks from potential to reality. The goal, if affected, is to minimize the consequences and get your data back, and your business up and running quickly.

Don’t let the new reality of ransomware win. While there is no fool proof solution, develop your plan, use tried-and-true technologies to recover, ensure your disaster recovery plan is rock solid and fast, and educate your users to recover should such incidents occur.

Vonage adds messaging to Microsoft workflow automation suite
Tech has advanced greatly for the ‘good guys’, unfortunately also for cybercriminals: Nick FitzGerald, ESET