Spread your backup bets to solve the ransomware challenge
When a ransom attack is successfully executed, the victim organisation is locked out from its own data. Backups have become a vital part of ransomware defences, because they offer a replica of that data that can be quickly restored.
From offsite backups including the old tried and trusted favourites such as disk and tape, backups can be separated from other core systems that may be at risk of breach (otherwise known as “air gaps”). It’s essentially an IT version of not putting all your eggs in one basket.
The downside to these more traditional approaches is that they take time, expertise, effort and money to manage, and need constant maintenance. Not only that, but depending on how air gaps are managed, they can need physical transportation to offsite premises, and are always susceptible to physical threats such as flood, fire, human error – or even the risk that malware may still breach them.
Immutable backups are one way of solving this issue. These can be run and stored locally on the same media as the normal systems. This approach makes recovery quicker, while significantly reducing management time.
For Acronis’ Senior Director of Product and Technology Positioning Alexander Ivanyuk, well-executed backup and storage strategies can form an important part of anti-ransomware strategies. He described it as “self-defence, with real-time ransomware detection and automatic recovery”. This ensures IT teams can rest in the knowledge that backups are safe without needing to take additional measures to safeguard them.
In this video, Acronis show how to use their unique anti-ransomware feature.
What to expect in the second half of the year?
How an enhanced Incident Response Plan helps.
Best practices, checklists, samples and more from Acronis.
Safeguard your organisation’s workloads, systems, and productivity.
And how to protect against it.
Why every business ultimately pays
Modern threats are coming thick and fast. Deploy limited IT resources more effectively.
Triple extortion is a huge threat. Here's how to up the ante.
Join a live webinar on 8th December to protect it.
Protecting peripherals, ports and places
Five key questions to ask vendors
Let us know what you think about the article.