Recovering From Ransomware Attacks Christophe Bertrand, VP, Product Marketing April 2018.

Slides:



Advertisements
Similar presentations
Introducing FailSafeSolutions Online Backup Software.
Advertisements

Backup as a Service and Disaster Recovery as a Service Providing backup and disaster recovery for virtual servers.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Module 9 Planning a Disaster Recovery Solution. Module Overview Planning for Disaster Mitigation Planning Exchange Server Backup Planning Exchange Server.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
The Best DR and “Undo” Virus Attacks!! What can Zerto do for you?
TRUE CANADIAN CLOUD Cloud Experts since The ORION Nebula Ecosystem.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
The Derivitec Risk Portal Provides Powerful, Cost-Effective Risk Management Solutions, Powered by Azure, that Deploy in Minutes MICROSOFT AZURE ISV PROFILE:
OFFICE 365 APP BUILDER PROFILE: Druva
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
WannaCry/WannaCrypt Ransomware
Leverage the Cloud to Minimize the Impact of Ransomware
WannaCry/WannaCrypt Ransomware
Planning for Application Recovery
Chapter 6: Securing the Cloud
What they are and how to protect against them
WorkDiff Mobile, Scenario-Based Collaboration Solution WorkDiff Allows Users to Work Differently While Using Familiar Functions of Microsoft Office 365.
Office 365 is cloud-based productivity, hosted by Microsoft.
Prevention against Ransomware costs - Arcserve UDP
BACKUP IS DEAD! Restore iS born in the cloud!
Unit 4 IT Security.
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
46elks Add-In for Microsoft Office 365 Excel Makes it Easy to Add SMS and Voice to Any Website or App – Just Install, Select Numbers, and Hit Send OFFICE.
New Heights by Guiding Them into the Cloud
Customized Solutions to your needs
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Boomerang Adds Smart Calendar Assistant and Reminders to Office 365 That Increase Productivity and Simplify Meeting Scheduling OFFICE 365 APP BUILDER.
Trial.iO Makes it Easy to Provision Software Trials, Demos and Training Environments in the Azure Cloud in One Click, Without Any IT Involvement MICROSOFT.
Firefish Software for Professional Recruiters Stays Available Around the Clock from Any Device and Anywhere by Using the Microsoft Azure Platform Partner.
Cyber Security & IT: What’s Next?
Data Compromises: A Tax Practitioners “Nightmare”
How to build a good reputation online
Officeatwork 365 Document Designer Allows Organizations to Design Brand- and Legal- Compliant Templates and Documents Globally OFFICE 365 APP BUILDER PROFILE:
Measure Effectiveness of Communication, Engage Your Employees, and Bridge Communication Gaps with Sparrow App and Power of Microsoft Azure MICROSOFT AZURE.
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Business Risks of Insecure Networks
Smart Org Charts in Microsoft Office 365: Securely Create, Collaborate, Edit, and Share Org Charts in PowerPoint and Online with OrgWeaver Software OFFICE.
Simplified Total Data Protection Harold Buter – Pre
That Saves Money and Preserves Opportunities
Infrastructure, Data Center & Managed Services
Cybersecurity Awareness
Disaster happens; don’t be held hostage
Disaster happens; don’t be held hostage
Disaster happens; don’t be held hostage
It’s About Time – ScheduleMe Outlook Add-In for Office 365 Enables Users to Schedule Meetings Easily with People Outside of Your Organization Partner Logo.
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Big Red Cloud Offers a Simple Online Accounts Solution for Business Owners and Bookkeepers Hosted on the Powerful Microsoft Azure Platform MICROSOFT AZURE.
Office 365 Integration Enables WebUntis Users to Sign in Using Office 365 Account Information and to Export WebUntis Timetables Directly to Outlook OFFICE.
Get Enterprise-Grade Call Handling and Control for Microsoft Office 365 and Skype for Business with the Bridge Boss-Admin Executive Console OFFICE 365.
MyCloudIT Enables Partners to Drive Their Cloud Profitability Using CSP-Enabled Desktop Hosting Automation with Microsoft Azure and Office 365 MICROSOFT.
Built on the Powerful Microsoft Office 365 Platform, My Intranet Boosts Efficiency with Support of Daily Tasks, Internal Communications and Collaboration.
Introducing Qwory, a Business-to-Business Search Engine That’s Powered by Microsoft Azure and Detects Vital Contact Information for Businesses MICROSOFT.
Partner Logo Azure Provides a Secure, Scalable Platform for ScheduleMe, an App That Enables Easy Meeting Scheduling with People Outside of Your Company.
Datacastle RED Delivers a Proven, Enterprise-Class Endpoint Data Protection Solution that Is Scalable to Millions of Devices on the Microsoft Azure Platform.
The Jamespot for Office 365 Application Attaches Business Processes to Docs and Syncs Them to OneDrive to Simplify Collaboration and Sharing OFFICE 365.
TechEd /28/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
MICROSOFT AZURE ISV PROFILE: ONEBE
Keep Your Digital Media Assets Safe and Save Time by Choosing ImageVault to be Your Digital Asset Management Solution, Hosted in Microsoft Azure Partner.
PRESENTER GUIDANCE: These charts provide data points on how IBM BaaS mid-market benefits a client with the ability to utilize a variety of backup software.
Yooba File Sync: A Microsoft Office 365 Add-In That Syncs Sales Content in SharePoint Online to Yooba’s Sales Performance Management Solution OFFICE 365.
Chris Patterson Senior Director Product Management
Anyshare solution.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Presentation transcript:

Recovering From Ransomware Attacks Christophe Bertrand, VP, Product Marketing April 2018

Copyright © 2017 Arcserve. All rights reserved. Arcserve Profile Worldwide Customer Base & Sales Presence Industry Recognition 45,000 customers 7,500 partners Distributed in 150 countries WW HQ – Minneapolis, USA LATAM HQ – São Paulo, Brazil EMEA HQ – Barcelona APAC HQ – Singapore Japan HQ – Tokyo Sales offices in 20+ countries 3 VMworld Gold Awards 2 CRN Channel Chief Awards Channel Company Top Midmarket Executive MSPBJ Titan of Technology 4 Storage Awards Cloud Hosting DR Product of the Year Computer Singapore Readers’ Choice Award for Networked Storage 2 PC Pro Recommendations 3 IT Pro Recommendations DCS Storage Software Product of the Year CRN Woman of the Channel A single, fully-integrated solution portfolio to protect across cloud, virtual and physical environments. SOFTWARE APPLIANCES CLOUD (DRaaS) 2 Copyright © 2017 Arcserve. All rights reserved.

Copyright © 2017 Arcserve. All rights reserved. What is Ransomware? Ransomware is malware for data kidnapping in which the attacker encrypts the victim's data and demands payment for the decryption key. Ransomware spreads through e-mail attachments, infected programs and compromised websites. A ransomware malware program may also be called a cryptovirus, cryptotrojan or cryptoworm. The net result: no data access, sometimes data loss… The Alternative: Pay up or Ignore (but now you need to restore your systems/data) Copyright © 2017 Arcserve. All rights reserved.

Ransomware in Backup and SLA terms Recovery point objectives Recovery time objectives Copyright © 2017 Arcserve. All rights reserved.

Mitigating The Risk of Ransomware: Example 1 Multi-site medical center for senior citizens, with a mental health agency Client initiated incident response at 8:30am Identified culprit remotely and method of attack Phishing email with a Word attachment and a macro By 11:30am: back at steady state Able to identify what data access had been granted and what had been compromised by network shares File-level recovery from Arcserve directly into those folders Removed all infected data Back up-and-running in 3 hours Zero data loss

Mitigating The Risk of Ransomware: Example 2 Mechanical organization (plumbing and HVAC) Infected at 10:30am Identified what data access had been granted Performed file-level recovery right back into those folders Back up at 2pm Recovery time included wiping the PC Very little data loss A couple of files that had not yet been backed up

Mitigating The Risk of Ransomware: Example 3 Mid-sized medical clinic Combination of tampered admin account and cryptolocker Re-populated their backup stores and brought everything back online by restoring those virtual machines Phished by an email which allowed access to the network Seeded that back into the environment in person Maliciously held data for ransom by installing a cryptowall variant Servers were lost: Full BMR Deleted: application, Local backup copy Recovery time: It was a network share….Wasn’t hidden - too exposed!!!! Back up-and-running in 36 hours, Steady state at 48 hours Attack happened early in the morning No data loss Recovered copies from data center to removable storage Loss of time and productivity: 2 business days Brought virtual servers back online in their hypervisor

Arcserve UDP Platform Newest Addition to the UDP portfolio Copyright © 2017 Arcserve. All rights reserved.

Arcserve’s Backup and Recovery Solution: UDP Copyright © 2017 Arcserve. All rights reserved.

Arcserve UDP Cloud Direct ENTERPRISE GRADE AND EASY TO USE BACKUP AS A SERVICE (BAAS) DISASTER RECOVERY AS A SERVICE (DRAAS) Automated backups transfer data safely offsite Easy set up in a few clicks from a single web based console Web-based console recovery data to/from anywhere Easy set up Push-button recovery RTO ~5 minutes Automated DR testing Copyright © 2017 Arcserve. All rights reserved.

Protect the Source Machine Best Practices Protect the Source Machine Take precautions to prevent infection in the first place, such as training users to not click on links within emails, downloading attachments from unknown sources and updating software on a timely basis. Perform regular backups, which may include rethinking your service level agreements to ensure critical business data is backed up more frequently. Follow the 3-2-1 strategy for backup: one of the copies should be offline, and at least one of the copies should be offsite. Make sure your chosen backup solution includes virtual standby for critical systems so that you can get back on your feet very quickly. Copyright © 2017 Arcserve. All rights reserved.

More Examples– A Publishing Business….Somewhere 1 2 3 4 Customer X supports a few hundred users at this publishing business The corruption came in as an attachment titled Photos.zip with a spoofed email address – who doesn’t have “click-happy” end-users? Photos.zip was the infected file sent via email. It was a “bart” type virus Customer X does a 7AM snapshot of his environment and keeps a near line copy of the Recovery Points as a precaution. Best backup practices paid off!! Result Using Arcserve was key to his ability to thwart the attack and recover the affected systems and their data It took him 28 hours to determine the source, repair and reverse the damage but there was no publicly visible indication that an attack had taken place His ability to contain the attack and mitigate the damage earned him a letter of praise from his CEO Copyright © 2017 Arcserve. All rights reserved.

More Examples: Medical/Healthcare…Somewhere Else.. 1 2 3 4 Customer was hit with multiple successive attacks, a common recent occurrence in their industry Avoiding operational impacts (regardless of the interruption cause) is a fundamental SLA which has a direct impact on communities and individuals In addition, avoiding negative publicity is very critical to this line of business In this customer’s case, the 5th Ransomware attack was particularly aggressive and took over local admin accounts on workstations and servers and encrypted files dozens of servers. Having a Bad day? Result Customer was able to recover all the servers with Arcserve UDP  Without Arcserve backups, they would be paying many $1000’s to recover, In this customer’s experience, their attacks seem to be more focused on “traditional” types of flat files – PDFs DOCs XLSs, etc.  Copyright © 2017 Arcserve. All rights reserved.

Protect the Protector: The Backup Data Best Practices Protect the Protector: The Backup Data Replicate data to offsite / cloud If your backup server gets infected or if your backup data is on a shared network share that is accessible from an infected machine, ransomware can encrypt backup data as well. It sounds obvious, but it’s important to remember! Periodically, copy recovery points to offline media, such as USB disks. Consider leveraging tape as a backup medium for critical data (yes tape!). This oldie but goodie comes in handy to send periodic recovery points offline. Copyright © 2017 Arcserve. All rights reserved.