{"id":405,"date":"2016-12-14T05:02:50","date_gmt":"2016-12-14T05:02:50","guid":{"rendered":"http:\/\/www.cllsystems.com\/?p=405"},"modified":"2016-12-14T05:06:20","modified_gmt":"2016-12-14T05:06:20","slug":"back-basic-backup","status":"publish","type":"post","link":"https:\/\/www.cllsystems.com\/staging\/2016\/12\/14\/back-basic-backup\/","title":{"rendered":"Back to Basic &#8211; Backup!"},"content":{"rendered":"<p><strong>Ransomware<\/strong>\u00a0is a type of malware that prevents or limits users from accessing their system, either by locking the system&#8217;s screen or by locking the users&#8217; files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.<\/p>\n<p>When faced with a <strong>Ransomware<\/strong> attack the current wisdom is if your computer gets infected and it encrypts your files you have three basic options:<\/p>\n<ol>\n<li>Pay the ransom<\/li>\n<li>Restore from a backup<\/li>\n<li>Cut your losses and format your computer<\/li>\n<\/ol>\n<p>Typically, paying the ransom is <strong>never recommended<\/strong>, mainly because it does not guarantee to solve your problem. In addition, if the ransom is paid, it proves to the cyber-criminals that ransomware is effective. As a result, cyber-criminals will continue their activity and look for new ways to exploit systems that result in more infections and more money on their accounts.<\/p>\n<p>Obviously, I would strongly recommend <strong>&#8220;backup&#8221;<\/strong> (back to basic) as <strong>best option<\/strong> and bear in mind that <span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">you have backup doesn\u2019t mean you\u2019re protected from ransomware however you\u2019ll get your data back assuming restoration goes well. <\/span><\/p>\n<p>Using Backup practical tips to recover from Ransomware.<\/p>\n<ol>\n<li><strong>Using 3-2-1 rule<\/strong> (The 3-2-1 rule states to have three different copies of your media, on two different media, one of which is off-site. This is great because it can address nearly any failure scenario and doesn\u2019t require any specific technology. In the ransomware era, it\u2019s a good idea to add another \u201c1\u201d to the rule where one of the media is offline. The offline storage options listed above highlighted a number of options where you can implement an offline or semi-offline copy of the data)<\/li>\n<li><strong>Backup to Disk, Tape<\/strong> (Typically you MUST define your RPO &amp; RTO. <span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\">It\u2019s important to understand what your <a href=\"http:\/\/www.cllsystems.com\/solutions\/\">RPO\/RTO<\/a> is and how much data you could stand to lose if you were hit with ransomware and had to recover from your backup.<\/span><\/li>\n<li><strong>Backup to Cloud or Replicate to offsite<\/strong> (Replication is no longer a luxury \u2014 it\u2019s part of your Availability strategy. Veeam\u2019s 2-in-1: backup and replication\u2122 provides you with a copy of your virtual machine (VM) in a ready-to-start state, so if a VM goes down, you can immediately fail over to a standby VM)<\/li>\n<li><strong><a href=\"http:\/\/www.cllsystems.com\/cll_products\/veeam-availability\/\">Veeam Backup Copy<\/a> (<\/strong>The Veeam Backup Copy Job is a great mechanism to have restore points created on different storage and with different retention rules than the regular backup job. When the previous points above are incorporated, the backup copy job can be a valuable mechanism in a ransomware situation because there are different restore points in use with the Backup Copy Job)<\/li>\n<li><a href=\"http:\/\/www.cllsystems.com\/solutions\/business-solutions\/\"><strong>Azure Backup<\/strong><\/a> (Unified solution to protect data on-premises and in the cloud)<\/li>\n<li><strong>Test you Backup<\/strong> (With SureBackup\u00ae and SureReplica,With <a href=\"http:\/\/www.cllsystems.com\/cll_products\/veeam-availability\/\">Veeam SureBackup<\/a>, <a href=\"http:\/\/www.cllsystems.com\/cll_products\/veeam-availability\/\">Veeam SureReplica<\/a> there\u2019s no need to worry about recoverability because it is all tested! Guarantees recovery of every file, application or virtual server, every time by running automated recovery verification jobs)<\/li>\n<\/ol>\n<p>Back to Basic &#8211; Backup! Backup! Backup! Use Backup to recover from Ransomware! <a href=\"http:\/\/www.cllsystems.com\/contact-us\/\">Contact us today<\/a> if you need any help for &#8220;<strong>Protection<\/strong>&#8221; and &#8220;<strong>Recovery<\/strong>&#8221; from Ransomware.<\/p>\n<p><a href=\"https:\/\/www.nomoreransom.org\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-408 aligncenter\" src=\"http:\/\/www.cllsystems.com\/wp-content\/uploads\/2016\/12\/No-more-Ransom.jpg\" alt=\"no-more-ransom\" width=\"488\" height=\"75\" srcset=\"https:\/\/www.cllsystems.com\/staging\/wp-content\/uploads\/2016\/12\/No-more-Ransom.jpg 488w, https:\/\/www.cllsystems.com\/staging\/wp-content\/uploads\/2016\/12\/No-more-Ransom-300x46.jpg 300w\" sizes=\"(max-width: 488px) 85vw, 488px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware\u00a0is a type of malware that prevents or limits users from accessing their system, either by locking the system&#8217;s screen or by locking the users&#8217; files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain &hellip; <a href=\"https:\/\/www.cllsystems.com\/staging\/2016\/12\/14\/back-basic-backup\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Back to Basic &#8211; Backup!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":406,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[21,22,23,18,19,20,11],"_links":{"self":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts\/405"}],"collection":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/comments?post=405"}],"version-history":[{"count":5,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts\/405\/revisions"}],"predecessor-version":[{"id":412,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/posts\/405\/revisions\/412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/media\/406"}],"wp:attachment":[{"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/media?parent=405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/categories?post=405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cllsystems.com\/staging\/wp-json\/wp\/v2\/tags?post=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}