TORONTO, ON – May 27, 2020 – /BackupReview.info/ – Asigra Inc., a leader in backup and recovery software that delivers comprehensive repository cyber protection, today highlighted a number of best practices proposed by providers of both preventative and responsive solutions for combating the financial ramifications of ransomware.

“Ransomware attacks are becoming more targeted, sophisticated, and costly, even as the overall frequency of attacks remains consistent,” according to a bulletin released by the Federal Bureau of Investigation. “Cyber criminals can take advantage of security weaknesses in widely used software programs to gain control of victim systems and deploy ransomware. For example, recently exploited vulnerabilities were discovered in two remote management tools used by managed service providers (MSPs) to deploy ransomware on the networks of customers of at least three MSPs.”[1]

Industry experts often cite two categories of ransomware defensive approaches and solutions – preventative and responsive. Preventative strategies stop such attacks from succeeding in a way that would maintain business access to their data. Strategies in this area would include training employees about the proper handling of potential phishing emails, implementing the proper cybersecurity software to protect primary data and a second layer of security-enabled data protection on secondary storage to ensure the complete recovery of criminally encrypted data.

Responsive ransomware strategies include ransomware recovery experts (CYPFER Corp. for example) to minimize downtime and potential financial loss in the event an attack was successful. These measures also include a managed service provider to assist in finding all possible alternatives to return mission critical data to the customer. Additionally, it would also include a credible cyber-insurance provider at the company’s disposal to financially cover the event and address monetary damages.

Five best practices cited by experts in these areas include:

  1. Cultivate a security-aware culture: Educate and train employees on the dangers of phishing emails. Phishing is the number one method used by ransomware attackers because it is an effective means to access a target’s network.
  2. Backup files and protect backup data: Regularly back up data using a 3-2-2 methodology where three copies of data are stored locally on secondary storage; two additional copies of backup data are kept on different locally available mediums (devices); and two backup copies are stored offsite two remote locations, such as a remote facility or cloud-based platform. In the event the training and primary cybersecurity measures fail, ensure the backup data is protected as it will become the recovery technique of last resort should the network be impacted. This is effectively done with a backup solution that addresses ransomware Attack Loops™ by scanning for malware instream and as recovered data is returned to production, among other techniques.
  3. Secure the network environment: Keep programs and operating systems up to date, ensure servers are patched and updated, and securely restrict and limit system components and administration tools by granting users enough access or privileges to accomplish a task or run an application.
  4. Defend primary data: While there are an endless number of cybersecurity solutions available, choose solutions with an effective record of success and deploy accordingly to protect both traditional and remote workforce environments.
  5. Insure: Some ransomware payments have been reported to be in the millions. Organizations that have no other option but to pay the ransom, would be remedied by having a cyber insurance policy that covers the damage from such attacks. Having a policy that protects against such attacks and the resulting liability could mean the difference between continuing with operations or claiming bankruptcy.

Ransomware Response and Recovery
Should devices on a company network unfortunately fall victim to cyber attackers and it is critical that data be recovered, ensure that a ransomware recovery expert is part of the incident response team to negotiate the ransom demand with the threat actors and to try to reduce the financial impact. To mitigate the risk, the incident response team should investigate all the alternatives, such as recovering from back-ups, rebuilding server environments and deploying free decryption tools, or negotiating with the threat actors.

As a last resort, a company can direct the ransomware recovery expert to coordinate and direct the most suitable response to the specific threat, and if the decision is made to pay the ransom, negotiate and facilitate the ransom settlement on the victim’s behalf and procure the decryption tools required to restore data files.

“Paying ransom to cyber threat actors is not recommended, but sometimes it is a necessary response to ensure business continuity,” said Jason Kotler, Founder and President, CYPFER Corp. “In these cases, it is essential to negotiate and facilitate payment of the ransom in the proper cryptocurrency and to ensure that your data is unlocked, so that business services can resume as soon as possible.”

“The financial impact that ransomware can have on any organization is frequently devastating,” said Marc Staimer, Principal Analyst and President of Dragon Slayer Consulting. “If not properly prepared, damages can go beyond the payment of an exorbitant ransom which does not guarantee the de-encryption of data. It often also includes the loss of revenues from downtime, expensive third-party data recovery attempts, increases in future insurance costs, and reputational damage.”

“These time-sensitive events need to be addressed quickly. Whether for pre-attack preparation or post-attack emergency support, it is critical to have industry experts available,” said Eran Farajun, Executive Vice President, Asigra. “To provide some level of assurance, the five best practices and the experts referenced will provide the best chance of making it through one of these events.”

For more information on Asigra, please download a case study on cybersecurity-enabled data protection at https://site-files.asigra.com/files/case-study/pdf/pcs-trade-union.pdf

Tweet This: : @Asigra Presents Five Preventative and Responsive Best Practices to Mitigate Ransomware Damages — https://bit.ly/2B7ndg1

To learn more about Asigra, visit www.asigra.com

Follow Asigra on Twitter — www.twitter.com/asigra

Additional Resources:

  • Hear what Solution Providers have to say about working with Asigra: www.asigra.com/partnership
  • Follow Asigra on Twitter at: http://twitter.com/asigra
  • View the enhanced features of the Asigra Hybrid Cloud Partner Program at: www.crn.com/slide-shows/cloud/300101651/2018-partner-program-guide-5-star-cloud-vendors-part-1.htm/pgno/0/7

About Asigra
Trusted since 1986, Asigra technology is proudly developed in and supported from North America, providing organizations around the world the ability to quickly recover their data from anywhere through a global network of IT service providers. As the industry’s most comprehensive data protection platform for servers, virtual machines, endpoint devices, databases and applications, SaaS and IaaS based applications, Asigra lowers the total cost of ownership, reduces recovery time objectives, and eliminates silos of backup data by providing a single consolidated repository with 100% recovery assurance and anti-ransomware defense. The company has been recognized as a three-time Product of the Year Gold winner by Techtarget for Enterprise Backup and Recovery Software and positioned well in the market by analysts. More information on Asigra can be found at www.asigra.com

Asigra and the Asigra logo are trademarks of Asigra Inc.


[1] FBI, Public Service Announcement, https://www.ic3.gov/media/2019/191002.aspx


Contact Asigra
Call 877-736-9901 or email info@asigra.com

Asigra Media Contact
Umair Sattar
416-736-8111
Umair.Sattar@asigra.com
www.asigra.com

Source: Asigra

 

 

 

General Tags: online backup companies, online backup reviews, online backup, online file storage, data security, data storage, online backup news, online backup providers directory, compare online backups, software as a service, backing up online, CEO interviews, online file backup, top rated online backups, cloud computing, SaaS, online backup services, online data backup

Like us on Facebook




===========================
Do you like this post? Subscribe to our RSS feed ===========================



Share/Save/Bookmark

Related posts:

  1. Asigra Partners Choosing Preventative Over Reactive Strategies to Defeat Ransomware Attack-Loops
  2. Acronis True Image 2019 Includes Cyber Protection that Stopped more than $100 Million in Ransomware Damages
  3. Online Tech’s Data Recovery Services Mitigate Ransomware Impact for National Distributor
  4. Tripwire Media Alert: Security Expert Offers Ransomware Recovery Tips
  5. Asigra Integrates Cyber Security to Defend Against Ransomware Attack-Loops
  6. New Research from Kaspersky Finds 45% of Employees Don’t Know How to Respond to a Ransomware Attack
  7. Asigra and Secret Double Octopus Partner to Provide Top-flight Authentication for Cloud-based Data Backups Susceptible to Ransomware Attacks
  8. Asigra Wins Gold in IT World Awards for Anti-Ransomware/Malware Data Protection
  9. Sandz Mitigates Ransomware Risk with OpEx Backup Appliance Powered by Asigra and Zadara
  10. Reevert Backup Offers One Year Free Subscription To Any Business Affected By Ransomware

Tags: