Jon Thordarson / 12. Apr 2016

Ransomware and backup

Ransomware like Cryptolocker are evolving and causing more damage than ever before. Cryptolocker, which is one form of malware, encrypts your data, blocking access to it unless you have the correct key. The option is to either pay a “ransom” and get the encryption key or recover the data from previous backups. However there is no guarantee that even though you pay the ransom that you will actually get access to your data. You are at the mercy of the villain.

Will your company be held “ransom”?

Organisations are relying more and more on their backup and a well implemented backup policy to protect against such threats.
It is very important to select a safe and secure cloud backup solution with retention options that allows them to recover data from before the infection occurred.

In some cases it takes customers a while to realize that they are in fact infected and they have lost access to their data. In these cases the backup might have run a few times and backed up the corrupt versions of their files. This is where the proper backup strategy is important to allow you to fall back to a good version of your backup.

Increased Threat

It is projected that we will see an increased amount of these forms of malware with much more sophistication. It is up to organisations to try and protect themselves, educate their users and at the very least, implement a good backup strategy that they could fall back to in case they get infected.

Over the past few months, datastring engineers have helped numerous infected customers restore their data successfully, rather then paying the ransom.

We recommend that everyone keep updated on the latest Ransomware out there and keep your users informed.
The latest version, called Maktub, is distributed via scam emails, see more on BBC news here.

Don’t wait around for this to happen to your organisation, prepare now, before it’s too late.