fbpx
Search
Close this search box.

Defend Against Ransomware Attacks With Backups—But Not Just Any Backups

Lines of code streaming down.

Regular backups are a great way to combat ransomware attacks.” You’ve heard it said before, at the end of news stories and PSA’s about ransomware like WannaCry and Nyetya, and it’s true—in theory.

Traditional backups are actually almost as vulnerable to ransomware as your business’s primary system, depending on how the two are connected. Thankfully, backup technology has come a long way.

While data protection is certainly one of the three tenants to protect your business (Education, Defense in Depth, and Data Protection), the saying “the two most important things in networks are backups and backups” has never been truer.

“There is now a clear distinction between old and new backup technology.”

When considering a backup solution for your company, I recommend taking a harder look at backup technology and methods. Backups have made such strides that there is now a clear distinction between old and new backup technology.

According to Randy Franklin Smith, “old backup technology” is:

  • Typically run once, nightly
  • Saved to a backup media that is either replicated or manually taken offsite
  • Seldom tested (other than the random recovery of a deleted file).

Old backup technology is data-centric, which requires the complete reload, reconfiguration, manual update of a system, after which you hope you can drop the data back in place. In many cases, old backup technology is itself, a target of ransomware because the backup is attached to an infected system.

“In many cases, old backup technology is itself, a target of ransomware.”

In my experience, restoring your data from old backup technology is time consuming, stressful (even when it works), and a heart-attack for you and your IT staff when it doesn’t. If you are using old backup technology, or if you aren’t regularly performing backup restoration tests, you’re going to get burned. For some of you, it may even be a RPE (Resume Producing Event).

Almost equally ominous is the chance that, after hearing the risks involved in your data recovery process, company stakeholders elect to pay the ransom. RPE, indeed.

How New Backup Technology Acts as Protection From Ransomware

New backup technology, simply put, is capable of putting complex data (entire systems as opposed to just files) on a smaller space, and doing so more frequently than old backup tech.

Not only does a modern backup device run continuously to eliminate data loss, but can test itself, confirm the tests with automatic alerts, and even detect ransomware activity on your network. Because these backup solutions are examining changes to every byte of data, they immediately see when ransomware is encrypting (altering) your data.

“Would you, under the threat of great losses, elect to pay the ransom after considering the risks involved in your data recovery process?”

In the event of a disaster, new backup solutions allow you to recreate your network locally on the backup appliance or in a cloud hosted location so your business doesn’t skip a beat.

Here are a few features I recommend:

  • Image-based backups
  • Enough storage for appropriate backup frequency
  • Local server and cloud systems backups
  • Integrates easily with your systems

“Ransomware attackers are learning which businesses are likely to choose old backup technology.”

Do not underestimate ransomware attackers motivated by profit.They are learning which businesses are likely to choose old backup technology, due to budget (though many new solutions are affordable, there is a misconception they aren’t), bureaucracy, or doing things the way “they’ve always worked.”

Those charged with protecting your data must maintain its Confidentiality, Integrity and Availability. If you are interested in a backup solution that will protect your data from ransomware, only modern backup technology will suffice.

Ask us your questions about backing up your business: email Corsica Technologies!

Corsica Technologies
Corsica provides personalized service and a virtual CIO (vCIO) who serves as a strategic advisor. When it comes to the complex integration of solutions for IT and cybersecurity, the whole is greater than the sum of its parts. We offer cybersecurity solutions, managed services, digital transformation, resale services, and one-off technology projects. Corsica unifies any combination of these services into a complete, seamless solution.

Related Reads

IT Outsourcing Company Trends - Corsica Technologies

11 Emerging Trends in Technology and IT Outsourcing

Things change fast in the world of technology. From emerging trends in cybersecurity to EDI and data integration, it’s challenging for midmarket companies to meet the technology needs of their internal and external customers. For many organizations, outsourcing is the

Read more
EDI Issues and Challenges - Corsica Technologies

7 Pitfalls To Avoid On Your EDI Journey

Electronic Data Interchange (EDI) is an essential technology for exchanging transactional data between business partners, also known as Trading Partners in the EDI community. From orders, invoices, and advance shipment notifications to benefit enrollments, claims processing, and payment authorizations, numerous

Read more
Cybersecurity Trends 2024 - Corsica Technologies

10 Cybersecurity Trends Emerging In 2024

When it comes to cybersecurity, things are never static. So far, 2024 is consistent with this theme. We’re seeing a mix of familiar trends intensifying alongside startling new developments. From the cybersecurity skills crunch to AI-powered attacks, 2024 is shaping

Read more

Sign Up For Our Newsletter

Stay up-to-date on the Managed Services and Cybersecurity landscape, and be the first to find out about events and special offers.