As HSMC Orizon Technology continues to keep up with trending patterns in the industry, we are currently seeing a heightened level of concern from both the Technical Industry and the United States Government. Both are seeing a surge in the Cryptolocker ransomware exposure levels. Repeated attempts to thwart the spread of Cryptolocker have proven ineffective, even the FBI is heading a multinational effort. As a best practice reminder, be very careful when viewing emails, browsing websites inside and outside the cloud, or moving data into the cloud from local workstations or jump drives.
Cryptolocker is one of the primary reasons you should restrict most websites in a secure system along with the prevention of .exe files from installing. Exposing your firm to an adaptation of the Cryptolocker ransomware will have devastating repercussions. It will infiltrate your firm’s data and encrypt it. The only ways to recover your data is to pay the ransom (not guaranteed) or restoring your data to a previous day, causing lost time and work.
Backups vs. Business Continuity
Are you still using traditional backups?
Do you have the right solution in place to quickly recover?
Is your system old and outdated, making recovery times extended and restore efforts frustrating?
It is no longer good business practice to only back up your data. In yesteryear, backing up your critical and non-critical data was comprised of software and hardware that copied data from one location to another and then wrote that data onto a tape. Once on a tape, it was up to the employee to arrange transporting the tape to another location for storage.
Backups, however, were only part of the Disaster Recovery Plan. If that data was ever needed to restore a file or server, it was then a reverse pattern of the above to restore the data. An employee would need to retrieve the tape from its offsite facility (if it ever made it offsite), insert it into the specialized machine to read from the tapes, and then recover the good data and replace the corruption or lost data.
If this was a hardware issue and the server was lost, this became a much more extended process. Hardware would need to be ordered and configured and then once ready, the data could be recovered from the tape and restored to the new server. This process could take anywhere from a day to a week, depending on how quickly hardware could be received. Small to medium-sized businesses could not afford to be without critical data and systems for extended periods of time.
As technology has advanced, the ability to recover data, short and long-term disaster recovery solution has become the industry standard. This solution is known as Business Continuity.
As we have seen various forms of Cryptolocker over the past couple of years, it has become apparent that the greatest risk to your data is not a hardware failure or data corruption, but your employees. 58% of downtime is directly connected with human error, a study from Independent Oracle User group, in July of 2012 suggests.
Cryptolocker quickly sweeps through encrypting all data that the user has access to regardless of where that data sits. Quickly recovering from these infections is critical to company up time and productivity.
Business Continuity not only encompasses traditional backup practices, keeping data both locally and sending it offsite, it also allows for a quick recovery of files and virtualization of servers locally and in the cloud.
As we face current, upcoming, and unknown threats to our data and our daily business operations, it is imperative to move your company’s data to a business continuity solution. It is the only way to ensure the safety of your data, recovering from a disaster, and that the longevity of your business is secure.
HSMC Orizon Technology consistently works with our clients to mitigate the risk of their environment being exposed to virus, malware, and ransomware. If you question something that has been received by email or wish to review your security and backup systems, please contact the support line at 816.875.1421 or email us at firstname.lastname@example.org.