SlideShare a Scribd company logo
1 of 2
Download to read offline
© Copyright 2015 Carbonite, Inc. All rights reserved
™
ENSURING BUSINESSES ARE ALWAYS IN BUSINESS
Whitepaper: January 2015 Virus Backup Update
One of the biggest data security threats of 2013 –
CryptoLocker – has brought the term “ransomware”
to new levels of awareness. That’s because
CryptoLocker is one of the most infamous examples
of a virus that renders data files unusable unless the
victim pays for a key to unlock the infected files.
According to recent reports, ransomware attacks
grew by 500 percent in 2013,led by CryptoLocker –
which first appeared in late summer 2013, and
escalated sharply throughout the remainder
of the year.
Like many viruses, CryptoLocker is triggered by
clicking on a link sent in an email, or by downloading
and opening an email attachment. When combined
with phishing techniques, some of these emails
may seem like a normal, harmless request from
a business partner.
The good news is that by mid-2014, law
enforcement had shut down the botnet used to
distribute the CryptoLocker virus. Two organizations
also came up with a Web tool purportedly able to
unlock individual encrypted files.
The bad news is that there are CryptoLocker
imitations such as CryptoWall and TorrentLocker. So,
unfortunately, the threat from this type of virus is very
much alive. And with the introduction of anonymous
payment systems such as Bitcoin, it’s a pretty sure bet
that this type of cyber extortion will continue.
So how do you protect against Crypto-style viruses?
Isn’t it as simple as instructing employees to never click on
suspicious attachments or links of unknown origin?
Unfortunately, that method of protection doesn’t work all the time. Employees
get careless or don’t adhere to policy, and if the virus is embedded within a well-
targeted phishing attack, it’s possible for someone to make a mistake.
So, yes, setting a clear policy regarding suspicious emails, links, and attachments should
be your first step – part of your “Plan A” for protection – but it’s hardly foolproof.
Pinning all your hopes on data security vendors being able to spot and remove all
phishing attempts or on other specialists being able to devise software to unencrypt
ransomware, also falls short of foolproof. Of course you should have firewall protection
and security software, but that won’t guarantee complete protection.
Since total immunity from these viruses can’t be counted on, that leaves us with
mitigation measures that help an organization with infected files get back to normal.
Regular data backup is the answer. It’s a surefire “Plan B” should efforts to protect
against Crypto-style viruses ever fail.
Regular data backups:
The only sure way to knock out threats from Crypto-style viruses
© Copyright 2015 Carbonite, Inc. All rights reserved
™
ENSURING BUSINESSES ARE ALWAYS IN BUSINESS
Whitepaper: January 2015 Virus Backup Update
It’s important that your backup solution has versions that can be rolled back to
a specific date. While ransomware will make itself known soon after infection,
there may be a lag time of a few hours to a few days before the virus spreads
to encrypt most of your files and the ransom message appears.
On shared drives found in businesses, this can be a huge problem if suddenly
your files can’t be used. And creating new files only creates more infected files.
So the only way to get things back to normal is to roll back to a complete, clean
set of files that was backed up before the initial entry point of the virus.
There is work and costs involved in rolling back all of your data and bringing
everything back up under fresh installs of your system’s software and applications,
but let’s face it, what’s the alternative if you aren’t backing up?
Paying the cybercriminals might get you a code that will unlock your data, or it
might not. After all, these aren’t exactly trustworthy individuals you are dealing
with. You might hope that the encryption used isn’t really all that strong and can
be broken, but you can’t count on that as a solution. And in the meantime, your
data is locked.
So, the most effective mitigation strategy for Crypto-style viruses is to have
regular, versioned backups in place.
There’s added costs to saving more data more frequently, but depending on the
nature of your business, it may be worth the peace of mind and risk reduction to
have a more frequent, full data backup.
It also helps to have strong support services to walk you through recovery steps
should you ever fall victim to one of these viruses, and to also offer options – like
being able to overnight you a clean set of files on disk to speed up file restoration.
The great thing about automatic backup solutions is that they don’t just mitigate
Crypto-style viruses, they protect you from other causes of data loss, such as
server failure, disk failure, or a natural disaster that wipes out your server room.
The risk mitigation step here addresses overall systems continuity.
So by all means, set some serious policy about unknown emails and the like, and
educate all your employees about nasty threats like Crypto. Just remember, there
is a cost to being too draconian with prevention. Your people need to be able to
collaborate with business partners without too many hurdles in the way.
Most small to mid-sized businesses (SMBs) can’t build a hyper-secure private
cloud in which to conduct absolutely all collaboration, and we certainly can’t go
back to the days of faxes and paper forms.
But, for sure, you can take the necessary protection measures and combine them
with regular backups as a sure way to knock back the damage from one of these
viruses should your business ever fall victim.
Jim Flynne
Vice President, Operations
Chief Security Officer
Carbonite, Inc.

More Related Content

What's hot

Business Continuity
Business  ContinuityBusiness  Continuity
Business ContinuityRedcliff
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2Monica Hamilton
 
Cloud Security Myths vs Facts
Cloud Security Myths vs FactsCloud Security Myths vs Facts
Cloud Security Myths vs FactsOPAQ
 
210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentals210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentalsIsabella789
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareDomen Savič
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011 Trend Micro
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber AttacksInuit AB
 
Cyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
Cyber Security at Microsoft - Henkel Keynote Speaker Anton NeidelCyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
Cyber Security at Microsoft - Henkel Keynote Speaker Anton NeidelAntonNeidel
 
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?BHack Conference
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope OverviewNetskope
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Jacob Tranter
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...TechSoup
 
The dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity MonthThe dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity MonthITrust - Cybersecurity as a Service
 

What's hot (20)

Business Continuity
Business  ContinuityBusiness  Continuity
Business Continuity
 
mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2mcafee-10-steps-infographic-d2
mcafee-10-steps-infographic-d2
 
Encryption 101 for Nonprofits
Encryption 101 for NonprofitsEncryption 101 for Nonprofits
Encryption 101 for Nonprofits
 
Cloud Security Myths vs Facts
Cloud Security Myths vs FactsCloud Security Myths vs Facts
Cloud Security Myths vs Facts
 
210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentals210 250 exam-understanding cisco cybersecurity fundamentals
210 250 exam-understanding cisco cybersecurity fundamentals
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Tadej Hren: IOT Ransomware
Tadej Hren: IOT RansomwareTadej Hren: IOT Ransomware
Tadej Hren: IOT Ransomware
 
Threat predictions 2011
Threat predictions 2011 Threat predictions 2011
Threat predictions 2011
 
Wannacry
WannacryWannacry
Wannacry
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA ComplianceNext Dimension and Veeam | Solutions for PIPEDA Compliance
Next Dimension and Veeam | Solutions for PIPEDA Compliance
 
Overcoming Cyber Attacks
Overcoming Cyber AttacksOvercoming Cyber Attacks
Overcoming Cyber Attacks
 
Cyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
Cyber Security at Microsoft - Henkel Keynote Speaker Anton NeidelCyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
Cyber Security at Microsoft - Henkel Keynote Speaker Anton Neidel
 
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?Palestra Filipi Pires - Ransomware – Existe proteção para isso?
Palestra Filipi Pires - Ransomware – Existe proteção para isso?
 
Is your data on the cloud at risk?
Is your data on the cloud at risk?Is your data on the cloud at risk?
Is your data on the cloud at risk?
 
Netskope Overview
Netskope OverviewNetskope Overview
Netskope Overview
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
 
The dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity MonthThe dark side of cybersecurity: International Awareness Cybersecurity Month
The dark side of cybersecurity: International Awareness Cybersecurity Month
 
WannaCry Ransomware
 WannaCry Ransomware WannaCry Ransomware
WannaCry Ransomware
 

Viewers also liked

Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Carbonite
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBsCarbonite
 
File Sharing & Folder Collaboration
File Sharing & Folder CollaborationFile Sharing & Folder Collaboration
File Sharing & Folder CollaborationVembu - SyncBlaze
 
Asigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra
 
SyncBlaze - Product Presentation
SyncBlaze - Product PresentationSyncBlaze - Product Presentation
SyncBlaze - Product PresentationVembu - SyncBlaze
 
The Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 MigrationThe Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 MigrationCarbonite
 
Symantec SMB File Sharing Flash Poll
Symantec SMB File Sharing Flash PollSymantec SMB File Sharing Flash Poll
Symantec SMB File Sharing Flash PollSymantec
 
When Earth Attacks - Protecting Your Business Data From Natural Disasters
When Earth Attacks - Protecting Your Business Data From Natural DisastersWhen Earth Attacks - Protecting Your Business Data From Natural Disasters
When Earth Attacks - Protecting Your Business Data From Natural DisastersMozy
 
User Management in SyncBlaze
User Management in SyncBlazeUser Management in SyncBlaze
User Management in SyncBlazeVembu - SyncBlaze
 
9 Reasons to Choose Asigra
9 Reasons to Choose Asigra9 Reasons to Choose Asigra
9 Reasons to Choose AsigraAsigra
 
Why Agentless Backup is More Secure
Why Agentless Backup is More SecureWhy Agentless Backup is More Secure
Why Agentless Backup is More SecureAsigra
 
8 Reasons for Data Loss
8 Reasons for Data Loss8 Reasons for Data Loss
8 Reasons for Data LossAsigra
 

Viewers also liked (15)

Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...Syncing up with business mobility: A look at the capabilities and uses of fil...
Syncing up with business mobility: A look at the capabilities and uses of fil...
 
6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins6 Ways to Fight the Data Loss Gremlins
6 Ways to Fight the Data Loss Gremlins
 
eBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBseBook: State of Data Backup for SMBs
eBook: State of Data Backup for SMBs
 
Reverse Incremental Backup
Reverse Incremental BackupReverse Incremental Backup
Reverse Incremental Backup
 
File Sharing & Folder Collaboration
File Sharing & Folder CollaborationFile Sharing & Folder Collaboration
File Sharing & Folder Collaboration
 
Notes in SyncBlaze
Notes in SyncBlazeNotes in SyncBlaze
Notes in SyncBlaze
 
Asigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey ResultsAsigra Cloud-to-Cloud Survey Results
Asigra Cloud-to-Cloud Survey Results
 
SyncBlaze - Product Presentation
SyncBlaze - Product PresentationSyncBlaze - Product Presentation
SyncBlaze - Product Presentation
 
The Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 MigrationThe Role of Backup in a Windows Server 2003 Migration
The Role of Backup in a Windows Server 2003 Migration
 
Symantec SMB File Sharing Flash Poll
Symantec SMB File Sharing Flash PollSymantec SMB File Sharing Flash Poll
Symantec SMB File Sharing Flash Poll
 
When Earth Attacks - Protecting Your Business Data From Natural Disasters
When Earth Attacks - Protecting Your Business Data From Natural DisastersWhen Earth Attacks - Protecting Your Business Data From Natural Disasters
When Earth Attacks - Protecting Your Business Data From Natural Disasters
 
User Management in SyncBlaze
User Management in SyncBlazeUser Management in SyncBlaze
User Management in SyncBlaze
 
9 Reasons to Choose Asigra
9 Reasons to Choose Asigra9 Reasons to Choose Asigra
9 Reasons to Choose Asigra
 
Why Agentless Backup is More Secure
Why Agentless Backup is More SecureWhy Agentless Backup is More Secure
Why Agentless Backup is More Secure
 
8 Reasons for Data Loss
8 Reasons for Data Loss8 Reasons for Data Loss
8 Reasons for Data Loss
 

Similar to How to Knock Out Threats from Crypto-Style Viruses

How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breachSILO Compliance Systems
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdfKavitaDubey18
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdfKavitaDubey18
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19Dharmendra Rama
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security MagazineQuentin Brown
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103Jack McCullough
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020developeronrents
 
The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...
The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...
The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...Greg Pierson
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.jayceewong1
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?TechSoup
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robertrobsworld
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxTier3MD
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplaceSameerShaik43
 

Similar to How to Knock Out Threats from Crypto-Style Viruses (20)

How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breach
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Securing Your Work from Home.pdf
Securing Your Work from Home.pdfSecuring Your Work from Home.pdf
Securing Your Work from Home.pdf
 
AEPWP09292016
AEPWP09292016AEPWP09292016
AEPWP09292016
 
Should You Pay Ransomware.pdf
Should You Pay Ransomware.pdfShould You Pay Ransomware.pdf
Should You Pay Ransomware.pdf
 
Keeping Your Cloud Data in Check
Keeping Your Cloud Data in CheckKeeping Your Cloud Data in Check
Keeping Your Cloud Data in Check
 
How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19How to secure your enterprise data during Covid-19
How to secure your enterprise data during Covid-19
 
Cyber Security Magazine
Cyber Security MagazineCyber Security Magazine
Cyber Security Magazine
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
beyond_the_firewall_0103
beyond_the_firewall_0103beyond_the_firewall_0103
beyond_the_firewall_0103
 
10 web application security best practices for 2020
10 web application security best practices for 202010 web application security best practices for 2020
10 web application security best practices for 2020
 
The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...
The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...
The Ultimate Guide to Protecting Your Business from Cyber Attacks by Greg Pie...
 
Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.Microsoft DATA Protection To Put secure.
Microsoft DATA Protection To Put secure.
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?Cyberattacks on the Rise: Is Your Nonprofit Prepared?
Cyberattacks on the Rise: Is Your Nonprofit Prepared?
 
W01p2virus wayman robert
W01p2virus wayman robertW01p2virus wayman robert
W01p2virus wayman robert
 
The Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptxThe Best Defense Against Ransomware.pptx
The Best Defense Against Ransomware.pptx
 
7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf7 Best Cyber Security Practices for Small Businesses.pdf
7 Best Cyber Security Practices for Small Businesses.pdf
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace5 ways to strengthen cybersecurity in the workplace
5 ways to strengthen cybersecurity in the workplace
 

More from Carbonite

The Business Case for Disaster Recovery
The Business Case for Disaster RecoveryThe Business Case for Disaster Recovery
The Business Case for Disaster RecoveryCarbonite
 
The Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryThe Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryCarbonite
 
Data Protection for Credit Unions
Data Protection for Credit UnionsData Protection for Credit Unions
Data Protection for Credit UnionsCarbonite
 
How to fight back against ransomware
How to fight back against ransomwareHow to fight back against ransomware
How to fight back against ransomwareCarbonite
 
Important Lessons in Cloud Backup
Important Lessons in Cloud BackupImportant Lessons in Cloud Backup
Important Lessons in Cloud BackupCarbonite
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Carbonite
 
Keeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantKeeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantCarbonite
 
A Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption TrendsA Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption TrendsCarbonite
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBsCarbonite
 
Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses Carbonite
 
Study: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup MethodsStudy: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup MethodsCarbonite
 
SMB's Unprepared for Data Disaster
SMB's Unprepared for Data DisasterSMB's Unprepared for Data Disaster
SMB's Unprepared for Data DisasterCarbonite
 
Cloud confusion infographic july 2012
Cloud confusion infographic   july 2012Cloud confusion infographic   july 2012
Cloud confusion infographic july 2012Carbonite
 
Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!Carbonite
 
Carb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdfCarb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdfCarbonite
 
How much data is 100 Petabytes?
How much data is 100 Petabytes? How much data is 100 Petabytes?
How much data is 100 Petabytes? Carbonite
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011Carbonite
 

More from Carbonite (17)

The Business Case for Disaster Recovery
The Business Case for Disaster RecoveryThe Business Case for Disaster Recovery
The Business Case for Disaster Recovery
 
The Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster RecoveryThe Building Block for Business Continuity & Disaster Recovery
The Building Block for Business Continuity & Disaster Recovery
 
Data Protection for Credit Unions
Data Protection for Credit UnionsData Protection for Credit Unions
Data Protection for Credit Unions
 
How to fight back against ransomware
How to fight back against ransomwareHow to fight back against ransomware
How to fight back against ransomware
 
Important Lessons in Cloud Backup
Important Lessons in Cloud BackupImportant Lessons in Cloud Backup
Important Lessons in Cloud Backup
 
Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.Working from home? Here's how the cloud can help.
Working from home? Here's how the cloud can help.
 
Keeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-CompliantKeeping Your Business HIPAA-Compliant
Keeping Your Business HIPAA-Compliant
 
A Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption TrendsA Look at US & European Cloud Adoption Trends
A Look at US & European Cloud Adoption Trends
 
2014 State of Backup for SMBs
2014 State of Backup for SMBs2014 State of Backup for SMBs
2014 State of Backup for SMBs
 
Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses Small Business Big Impact: 10 Facts About Small Businesses
Small Business Big Impact: 10 Facts About Small Businesses
 
Study: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup MethodsStudy: Small Businesses and Data Backup Methods
Study: Small Businesses and Data Backup Methods
 
SMB's Unprepared for Data Disaster
SMB's Unprepared for Data DisasterSMB's Unprepared for Data Disaster
SMB's Unprepared for Data Disaster
 
Cloud confusion infographic july 2012
Cloud confusion infographic   july 2012Cloud confusion infographic   july 2012
Cloud confusion infographic july 2012
 
Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!Working From Home: The Good... The Bad... & How The Cloud Can Help!
Working From Home: The Good... The Bad... & How The Cloud Can Help!
 
Carb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdfCarb blogher-infographic-banner-final.pdf
Carb blogher-infographic-banner-final.pdf
 
How much data is 100 Petabytes?
How much data is 100 Petabytes? How much data is 100 Petabytes?
How much data is 100 Petabytes?
 
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides120820115 Deadly Sins of Small Business Data Backup- webinar slides12082011
5 Deadly Sins of Small Business Data Backup- webinar slides12082011
 

Recently uploaded

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

How to Knock Out Threats from Crypto-Style Viruses

  • 1. © Copyright 2015 Carbonite, Inc. All rights reserved ™ ENSURING BUSINESSES ARE ALWAYS IN BUSINESS Whitepaper: January 2015 Virus Backup Update One of the biggest data security threats of 2013 – CryptoLocker – has brought the term “ransomware” to new levels of awareness. That’s because CryptoLocker is one of the most infamous examples of a virus that renders data files unusable unless the victim pays for a key to unlock the infected files. According to recent reports, ransomware attacks grew by 500 percent in 2013,led by CryptoLocker – which first appeared in late summer 2013, and escalated sharply throughout the remainder of the year. Like many viruses, CryptoLocker is triggered by clicking on a link sent in an email, or by downloading and opening an email attachment. When combined with phishing techniques, some of these emails may seem like a normal, harmless request from a business partner. The good news is that by mid-2014, law enforcement had shut down the botnet used to distribute the CryptoLocker virus. Two organizations also came up with a Web tool purportedly able to unlock individual encrypted files. The bad news is that there are CryptoLocker imitations such as CryptoWall and TorrentLocker. So, unfortunately, the threat from this type of virus is very much alive. And with the introduction of anonymous payment systems such as Bitcoin, it’s a pretty sure bet that this type of cyber extortion will continue. So how do you protect against Crypto-style viruses? Isn’t it as simple as instructing employees to never click on suspicious attachments or links of unknown origin? Unfortunately, that method of protection doesn’t work all the time. Employees get careless or don’t adhere to policy, and if the virus is embedded within a well- targeted phishing attack, it’s possible for someone to make a mistake. So, yes, setting a clear policy regarding suspicious emails, links, and attachments should be your first step – part of your “Plan A” for protection – but it’s hardly foolproof. Pinning all your hopes on data security vendors being able to spot and remove all phishing attempts or on other specialists being able to devise software to unencrypt ransomware, also falls short of foolproof. Of course you should have firewall protection and security software, but that won’t guarantee complete protection. Since total immunity from these viruses can’t be counted on, that leaves us with mitigation measures that help an organization with infected files get back to normal. Regular data backup is the answer. It’s a surefire “Plan B” should efforts to protect against Crypto-style viruses ever fail. Regular data backups: The only sure way to knock out threats from Crypto-style viruses
  • 2. © Copyright 2015 Carbonite, Inc. All rights reserved ™ ENSURING BUSINESSES ARE ALWAYS IN BUSINESS Whitepaper: January 2015 Virus Backup Update It’s important that your backup solution has versions that can be rolled back to a specific date. While ransomware will make itself known soon after infection, there may be a lag time of a few hours to a few days before the virus spreads to encrypt most of your files and the ransom message appears. On shared drives found in businesses, this can be a huge problem if suddenly your files can’t be used. And creating new files only creates more infected files. So the only way to get things back to normal is to roll back to a complete, clean set of files that was backed up before the initial entry point of the virus. There is work and costs involved in rolling back all of your data and bringing everything back up under fresh installs of your system’s software and applications, but let’s face it, what’s the alternative if you aren’t backing up? Paying the cybercriminals might get you a code that will unlock your data, or it might not. After all, these aren’t exactly trustworthy individuals you are dealing with. You might hope that the encryption used isn’t really all that strong and can be broken, but you can’t count on that as a solution. And in the meantime, your data is locked. So, the most effective mitigation strategy for Crypto-style viruses is to have regular, versioned backups in place. There’s added costs to saving more data more frequently, but depending on the nature of your business, it may be worth the peace of mind and risk reduction to have a more frequent, full data backup. It also helps to have strong support services to walk you through recovery steps should you ever fall victim to one of these viruses, and to also offer options – like being able to overnight you a clean set of files on disk to speed up file restoration. The great thing about automatic backup solutions is that they don’t just mitigate Crypto-style viruses, they protect you from other causes of data loss, such as server failure, disk failure, or a natural disaster that wipes out your server room. The risk mitigation step here addresses overall systems continuity. So by all means, set some serious policy about unknown emails and the like, and educate all your employees about nasty threats like Crypto. Just remember, there is a cost to being too draconian with prevention. Your people need to be able to collaborate with business partners without too many hurdles in the way. Most small to mid-sized businesses (SMBs) can’t build a hyper-secure private cloud in which to conduct absolutely all collaboration, and we certainly can’t go back to the days of faxes and paper forms. But, for sure, you can take the necessary protection measures and combine them with regular backups as a sure way to knock back the damage from one of these viruses should your business ever fall victim. Jim Flynne Vice President, Operations Chief Security Officer Carbonite, Inc.