A Virus Backup Plan: Responding When the Worst Happens

By: In: Data Privacy & Protection On: Sep 30, 2016
A Virus Backup Plan: Responding When the Worst Happens

Extortion. Ransom. Cyber criminals. No, this isn’t a description of the latest best-seller. For many, however, it could be the start of a very bad day at the office. Unless, that is, you have a virus backup plan in place beforehand.

What happens to turn an average day into a bad one? It all begins with clicking on a corrupt email link or ZIP file attachment: Someone in your organisation has just taken the bait of a ransomware phishing campaign. Ransomware goes by a number of names and methods: Cryptolocker and CryptoWall were early, effective versions. Today, you have Locky and Bart. Whatever the strain, ransomware is designed to infect your system, encrypt your files and spread itself to other systems on the network. In order to unencrypt the files, you are often required to pay a digital Bitcoin ransom to the perpetrator.

“Not on My Watch!”

Are you under the impression that this can’t happen to you and your organisation? After all, you keep users’ systems updated with the latest patches, and you pursue ongoing education and training to keep employees from falling for this kind of email ruse. You even segment network traffic to keep a potential virus from running amok.

Unfortunately, despite these best efforts, your organisation may still be at risk. In Verizon’s 2016 Data Breach Investigations Report, the company analyses more than eight million results from various vendors’ sanctioned phishing tests in 2015. Verizon found that an average of 30% of all phishing messages had been opened by the targeted individual. Furthermore, 12% of targets went on to click the accompanying attachment or link. In a real-world scenario, this action would have launched an attack.

When Prevention Turns to Disaster Recovery

What do you do when as much as 12% of your users are likely to succumb to a ransomware attack at any given time?

While you can easily pay the ransom, law enforcement and IT security companies don’t typically recommend that you take this action. Instead, organisations like The No More Ransom Project place backup at the top of their list of recommended actions to minimise ransomware’s fallout. Sure, almost every organisation performs some type of backup. But what separates routine backups from those that make a really bad day more bearable? It’s all about how well you recover.

Once ransomware takes hold of one computer or many, IT’s job becomes one of disaster recovery. Here, the plan should include tiers of data protection and recovery based on how soon certain systems and data need to be back online following a disaster. This type of plan may involve replication, snapshots and backup to the Cloud, as well as tape or disk backups that are physically removed from the network.

Why not be prepared before a ransomware attack strikes? It’s time for you to work out the details of your own disaster recovery or backup plan.

← How to Prepare for the New GDPR 4 Things to Remember When Securing Your Enterprise IT →

Leave A Comment

About the author

John Sharpe

John Sharpe is Director of Product Management for Iron Mountain’s Data Management business. In this role, he is responsible for developing and implementing strategies for backup, disaster recovery, and archiving. Creating new offerings that will allow our customers to extract more value from their media, whether new or archival, is central to Mr. Sharpe’s work. His primary overall objective is to ensure that Iron Mountain is a trusted information partner for our customers – and much more than a storage vendor. Mr. Sharpe has over 15 years of experience in engineering, corporate strategy, and product management. He holds a BA in computer science from Boston College and an MBA in finance from Yale.