Believe it or not, it has been a year since WannaCry crippled organizations around the world, and since that time ransomware attacks have only accelerated. The ransomware "industry" is now a $5 billion market and is projected to grow to over $11 billion by 2019. Backup alone is not enough, ransomware is the new disaster, and it can impact any organization regardless of size or location. Are you ready for what is coming next? Attend our live webinar as experts from Storage Switzerland and Infrascale help you create a Ransomware Preparedness Checklist.
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
1. Ransomware Checklist -
Are You Ready For Ransomware’s Next Wave?
Learn how to defend
against, respond to and
recover from a
ransomware attack
For audio playback and Q&A
go to: http://bit.ly/RansomWave
3. Ransomware Refresh -
What is Ransomware?
● Ransomware is Malware
● Encrypts an organization’s data
● Cures
○ Pay ransom
○ Recover data
4. Ransomware’s Next Wave
● Gradual Infection - Harder to Detect
○ Instead of corrupting all at once
○ Corrupt a little bit at a time
● Backup Corruption
○ Don’t execute attack right away
○ Let executable get backed up
○ Restoration includes restoring
infection executable
● Backup/Snapshot Attack
○ Ransomware specifically
targets backup
○ Encrypt backup
configuration files
○ Encrypt protected data
5. Ransomware Recovery Challenges
● More than just “can” you
recover
○ Can you recover faster and
easier than paying the
ransom?
● Infection can occur anywhere
○ Applications
○ File servers
○ Laptops/Desktops
● Need to make sure you don’t
recover the “trigger”
○ Otherwise, you create an
endless loop of corruption
7. Step 1: Defend
● Granular, changes only backups
● Enables frequent data protection
(every 15 minutes)
● Protect everything: applications,
file servers, and endpoints
● Protect Backup Data: Off-site,
limit user access, dual keys
8. Step 2: Detect
● Backup system should
alert to a high number of
changes
● Backup system should
provide multiple versions
for rollback
9. ● Multiple recovery methods need to be available
● Single file recover when the attack is detected early
Step 3: Recover
● Versioned recovery when a staged
attack occurs
● Boot from backup recovery when an
entire volume is impacted
● Total recovery in the cloud when the
entire data center is compromised
10. 7 Point -
Ransomware
Checklist
● User Education - Don’t click on anything
with a link (repeat often)
● Email Security (reputation, anti-spam, anti-
malware, anti-phishing)
● Gateway Security (advanced persistent
threat and above)
● File Monitoring (rapid opens, modifications,
and closures (file renames)
● Frequent Backups (every 15 minutes)
● Instant Restores (recover in less than 15
minutes)
● Cloud Copy (protected copy, DRaaS)
11. With a 15-minute failover guarantee
How To Protect
Against Ransomware
14. COMPREHENSIVE DATA & SYSTEM RECOVERY
INFRASCALE
CLOUD BACKUP
INFRASCALE
DISASTER RECOVERY
• Backup your data directly to the
cloud
• Recover your data in seconds
• Optimized for endpoints and
branch office servers
• Ransomware detection &
remediation
• Remote wipe, geo-locate, mobile
device management functionality
• Backup your entire network of
systems to an on-premise
appliance and to the cloud
• Run system replicas in seconds
• Restore in your own time
• Optimized for mission-critical
physical and virtual servers
INFRASCALE
CLOUD APPLICATION BACKUP
• Cloud applications have limited
retention policies, then delete
forever
• Backup Office 365, SharePoint
and OneDrive, G-Suite,
Salesforce.com, Box.com and
more
• Recover individual mail items or
mailboxes
18. VISIONARY
Disaster Recovery
as a Service
ABOUT INFRASCALE
FOUNDED HQ
PARTNERS
CUSTOMERS
DATA CENTERS
DATA PROTECTED
2012 Los Angeles, CA
1,000
1M devices
protected & counting
15 global data centers
100+ petabytes
of data
2017 Gartner Leader - DRaaS
Eradicate downtime & data loss – With a 15 minute failover guarantee!
20. Ransomware Checklist -
Are You Ready For Ransomware’s Next Wave?
For complete audio and Q&A please register for the On Demand Version:
http://bit.ly/RansomWave