Prevention against Ransomware costs - Arcserve UDP

Slides:



Advertisements
Similar presentations
Getting to “More than Backup” Using Cloud Technologies Effectively ARCserve on the EDGE of Cloud Storage.
Advertisements

RETHINK BACKUP & ARCHIVE. 2 Backup and Archive are Top IT Priorities Which of the following would you consider to be your org’s most important IT priorities.
Step 1-Do you need Backup and Data Protection? Can your Business Survive? Of companies that had a major loss of business data, 43% never reopen, 51% close.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Whiteboard Development Develop whiteboard visually in this slide. Use PowerPoint drawing tools and assets copy/paste from previous slide. Duplicate as.
The Strickland Group Founded in employees Information Technology consulting – Software Development – HelpDesk Support – Network Infrastructure.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
Types of Electronic Infection
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
1 IBM TIVOLI Business Continuance Seminar Training Document.
Phil Maynard VP, Worldwide Technical Sales 19th May 2015
TRUE CANADIAN CLOUD Cloud Experts since The ORION Nebula Ecosystem.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Commvault and Nutanix October Changing IT landscape Today’s Challenges Datacenter Complexity Building for Scale Managing disparate solutions.
OFFICE 365 APP BUILDER PROFILE: Druva
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Chapter 40 Internet Security.
Your Office 365 Journey Prepare, Migrate, and Operate with Barracuda
Leverage the Cloud to Minimize the Impact of Ransomware
WannaCry/WannaCrypt Ransomware
Planning for Application Recovery
What they are and how to protect against them
Secure Data – a safe place in an unsafe world!
Offering Mission Critical Technologies (312)
BACKUP IS DEAD! Restore iS born in the cloud!
[Internal Use] for Check Point employees​
Backup, Archive & Recovery
Windows Server 2016 Secure IaaS Microsoft Build /1/2018 4:00 AM
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
Cyber Security & IT: What’s Next?
Data Compromises: A Tax Practitioners “Nightmare”
How to build a good reputation online
CAS-002 Dumps PDF CompTIA Advanced Security Practitioner (CASP) CAS-002 Dumps CompTIA.
Trends in Ransomware Distribution
Bare Metal Server Backup Solution
Business Risks of Insecure Networks
Simplified Total Data Protection Harold Buter – Pre
Vembu SaaSBackup for Office 365
Disaster happens; don’t be held hostage
The Ultimate Backup Solution.
Disaster happens; don’t be held hostage
Disaster happens; don’t be held hostage
Microsoft Azure P wer Lunch
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Recovering From Ransomware Attacks Christophe Bertrand, VP, Product Marketing April 2018.
Data Protection Suite Family Overview
Quick Sales Guide Acronis Backup Cloud Powered by Acronis – local and cloud backup and recovery service to solve your customers’ data protection challenges.
How to survive a ransomware attack and live to tell about it
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
Unitrends Enterprise Backup Solution Offers Backup and Recovery of Data in the Microsoft Azure Cloud for Better Protection of Virtual and Physical Systems.
The Jamespot for Office 365 Application Attaches Business Processes to Docs and Syncs Them to OneDrive to Simplify Collaboration and Sharing OFFICE 365.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
The Ultimate Backup Solution.
Part 3.
WannaCry Ransomware Overview
Preventing a Disaster -“A GB of Backup is Worth a TB of Sleep.”
King Saud University- College OF Applied Studies
Microsoft Virtual Academy
Andy Puckett – Sales Engineer
Move your data to the cloud with Azure and {Partner Company Name}
Using the Cloud for Backup, Archiving & Disaster Recovery
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
G061 - Network Security.
Veeam Backup & Replication
Scenario Discussion.
Presentation transcript:

Prevention against Ransomware costs - Arcserve UDP Tamas.Jung@Arcserve.com Principal consultant - EE Copyright © 2017 Arcserve. All rights reserved.

Copyright © 2017 Arcserve. All rights reserved. What is Ransomware? Ransomware is malware for data kidnapping in which the attacker encrypts the victim's data and demands payment for the decryption key. Ransomware spreads through e-mail attachments, infected programs and compromised websites. A ransomware malware program may also be called a cryptovirus, cryptotrojan or cryptoworm. The net result: no data access, sometimes data loss… The Alternative: Pay up or Ignore (but now you need to restore your systems/data) Copyright © 2017 Arcserve. All rights reserved.

Ransomware is a Costly Reality This Just In... A poll of IT managers at 300 UK businesses sponsored by Trend Micro found that 44 % of UK businesses have been infected by ransomware in the last two years The average ransom demanded is $722 - although the payment is usually requested in Bitcoin 20 % of organizations reported ransom demands of $1338 Organizations affected by ransomware estimate they spent 33 hours on average fixing the issues caused by the ransomware infection For hose companies who refused to give into hackers' ransom demands, 60% said they were able to retrieve data from back up files Copyright © 2017 Arcserve. All rights reserved.

Ransomware in Backup and SLA terms Recovery point objectives Recovery time objectives Copyright © 2017 Arcserve. All rights reserved.

Arcserve’s Backup and Recovery Solution: UDP REMOTE OFFICE / BRANCH OFFICE PRIMARY SITE REPLICATION UDP APPLIANCE GLOBAL DEDUPLICATION PHYSICAL SYSTEM BACKUP VMWARE & HYPER-V BACKUP HARDWARE SNAPSHOT BACKUP BMR INSTANT VM VIRTUAL STANDBY HIGH AVAILABILITY P2V MIGRATION FREE WORKSTATION PROTECTION REMOTE OFFICE PROTECTION TAPE BACKUP PUBLIC / PRIVATE / ARCSERVE CLOUD DR SITE / MSP DATACENTER WAN OPTIMIZED REPLICATION AUTOMATED DR TESTING BACKUP TO CLOUD HIGH AVAILABILITY TO CLOUD FILE COPY & FILE ARCHIVE TO CLOUD REMOTE VIRTUAL STANDBY JUMPSTART DATA SEEDING MULTI-TENANT STORAGE NDMP BACKUP FILE ARCHIVING GLOBAL DASHBOARD CENTRALIZED MANAGEMENT ROLE BASED ADMINISTRATION Copyright © 2017 Arcserve. All rights reserved.

Customer 1 – A Publishing Business….Somewhere 2 3 4 Customer X supports a few hundred users at this publishing business The corruption came in as an attachment titled Pictures.zip with a spoofed email address – who doesn’t have “click-happy” end-users? Photos.zip was the infected file sent via email. It was a “bart” type virus Customer X does a 7AM snapshot of his environment and keeps a near line copy of the Recovery Points as a precaution. Best backup practices paid off!! Result Using Arcserve was key to his ability to thwart the attack and recover the affected systems and their data It took him 28 hours to determine the source, repair and reverse the damage but there was no publicly visible indication that an attack had taken place His ability to contain the attack and mitigate the damage earned him a letter of praise from his CEO Copyright © 2017 Arcserve. All rights reserved.

Customer 2: Medical/Healthcare…Somewhere Else.. 1 2 3 4 Customer was hit with multiple successive attacks, a common recent occurrence in their industry Avoiding operational impacts (regardless of the interruption cause) is a fundamental SLA which has a direct impact on communities and individuals In addition, avoiding negative publicity is very critical to this line of business In this customers’s case, the 5th Ransomware attack was particularly aggressive and took over local admin accounts on workstations and servers and encrypted files dozens of servers. Having a Bad day? Result Customer was able to recover all the servers with Arcserve UDP  Without Arcserve backups, they would be paying many $1000’s to recover, In this customer’s experience, their attacks seem to be more focused on “traditional” types of flat files – PDFs DOCs XLSs, etc.  Copyright © 2017 Arcserve. All rights reserved.

Protect the Source Machine Best Practices Protect the Source Machine Take precautions to prevent infection in the first place, such as training users to not click on links within emails, downloading attachments from unknown sources and updating software on a timely basis. Perform regular backups, which may include rethinking your service level agreements to ensure critical business data is backed up more frequently. Follow the 3-2-1 strategy for backup: one of the copies should be offline, and at least one of the copies should be offsite. Make sure your chosen backup solution includes virtual standby for critical systems so that you can get back on your feet very quickly. Copyright © 2017 Arcserve. All rights reserved.

Best Practices and Conclusion Protect the Protector: The Backup Data Replicate data to offsite / cloud If your backup server gets infected or if your backup data is on a shared network share that is accessible from an infected machine, ransomware can encrypt backup data as well. It sounds obvious, but it’s important to remember! Periodically, copy recovery points to offline media, such as USB disks. Consider leveraging tape as a backup medium for critical data (yes tape!). This oldie but goodie comes in handy to send periodic recovery points offline. Copyright © 2017 Arcserve. All rights reserved.

Questions Tamas.Jung@Arcserve.com Principal consultant – EE Borivoje Božinović b.bozinovic@energodata.rs Hardware & Sotware sales executive , Energodata Copyright © 2017 Arcserve. All rights reserved.