Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

WannaCry Commentaries - Part 1

1.) Acronis

Nikolay Grebennikov,VP of Engineering

“People, and businesses hear ‘ransomware’ and think such an attack can’t happen to them. The fact is that it can, and in fact, just today – Telefonica was hit by a very aggressive version of the Wcry ransomware. 47 percent of businesses were under ransomware attacks last year and that’s growing. Just look at Telefonica for the latest proof. The real question businesses, hospitals and telcos should be asking themselves is how can I protect myself from a ransomware attack that is seemingly inevitable. The answer – a reliable backup solution that includes active protection against ransomware attacks. Acronis Backup 12 Advanced and Acronis Active Protection can prevent damage from such ransomware and this solution is available for businesses today.”



“47% of businesses were under ransomware attacks last year. As witnessed by Telefonica and recent bank attacks in Spain and the UK, the threat is growing. Shutting down computers is one short-term solution but won’t help. Only an integrated solution, combining of backup (passive) and proactive security (active) technologies, working together in one product, provides data recovery in any situation. With such sophisticated ransomware, you can’t have limitations on size of the files, number of files.”

“Thankfully for companies, that solution exists today with Acronis Active Protection, which actually detected this virus and is able to stop it. Back up procedures is must have business continuity management in companies who want to be protected.”

2.) Commvault

Matthew Johnston, Area Vice President, ASEAN & Korea, Commvault

Based on our experiences working with companies around the world, we've developed a list of best practices to protect and recover from ransomware attacks.
  • Develop a program that covers all your data needs. You must identify where your critical data is stored, determine your workflows and systems used to handle data, assess data risks, apply security controls, and plan for evolving threats. If it is not protected, it cannot be recovered.
  • Use proven data protection technologies. You need solutions that detect and notify of potential attacks, leverage external CERT groups, identify and prevent infection, maintain a 'GOLD' image of systems and configurations, maintain a comprehensive backup strategy and provide a means to monitor effectiveness.
  • Employ Backup and Data Recovery (DR) processes. Don’t rely solely on snapshots or replica backup. Your backup process data could just as easily be encrypted and corrupted if it is not stored in a secure way where a ransomware attack. If your process or vendors don’t offer ransomware protection that addresses the proper way to store your data, then your backup plan is at major risk!
  • Educate employees on the dangers of ransomware and how to secure endpoints. Ransomware invasions often originate through endpoints, such as desktop computers, laptops, smart phones, tablets or fringe computing resources. Educating your staff is key. The security off an organization is only as strong as your weakest link. Train your staff on all data recovery and security best practices to get endpoint data protected within your Information Security Program. The strength of an organization lies in your weakest link, with most breaches arising from simple human error.
  • Assess and update any business applications
    Most organizations suffer from key business applications that run on older, sometimes unsupported and unpatchable operating systems, which lack the necessary security updates to stop the spread of potential attacks. To combat this, businesses must invest in a data platform that covers core enterprise, private and public cloud environments and extends to endpoint protection. One that can store immutable, up-to-date copies of all these environments to ensure the ability to recover rapidly - should disaster strike.
Full article.



This post first appeared on IT-Sideways - Technology Social Media, please read the originial post: here

Share the post

WannaCry Commentaries - Part 1

×

Subscribe to It-sideways - Technology Social Media

Get updates delivered right to your inbox!

Thank you for your subscription

×