Presentation is loading. Please wait.

Presentation is loading. Please wait.

Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.

Similar presentations


Presentation on theme: "Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward."— Presentation transcript:

1 Using the Cloud to secure your data.

2 History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward to 2005 and begin seeing different types of ransomware in the wild. In 2012 Reveton is the first observed instance of mass- deployed ransomware. Late 2013 to mid 2014 Cryptolocker made off with $3 Million. 2015 - The FBI, through their Internet Crime Complaint Center (IC3), released an alert that between April 2014 and June 2015, the IC3 received 992 CryptoWall- related complaints, with victims reporting losses totaling over $18 million. Ransomware gives cybercriminals almost 1,500% return on their money. almost 1,500%

3

4

5 Cryptoworms: The future of ransomware hell! Cryptoworm ransom starts at $1 million Once the Cryptoworm is launched, “the malware is more or less unstoppable. In the span of an hour, over 800 servers and 3200 workstations are compromised; half the organization's digital assets, and the vast majority of the company's data are encrypted. Cisco Talos – “If enterprises don't start making strides towards defensible architecture today, massive ransoms may end up getting paid tomorrow.”

6 How can we save ourselves! More Importantly, why is Veeam here speaking of Security and Randsomware? Backup recovery is your last line of defense to having to pay out a ransom to the attackers; it's your last bastion in the event that the worst has happened.

7 How to avoid Crypto Locked backup files. 1. Use a dedicated account to access the backup share When you are using a share as the backup target, instead of connecting to it with your username and password, use your computer account. 2. The 3-2-1 Rule. Number 1, meaning one copy of the backup stored off site, is especially important here. Your data will be much more secure by simply making sure that you have at least one read-only, backup copy stored in the cloud or on an offline storage like tape 3. Do not over permission your backup service accounts. Only allow the appropriate access for your backup service account. Don’t let your backup software be the Weakest point of security. 4. Visit our Veeam Booth to find out more about Veeam CloudConnect as well as our other offsite/offline backup storage options

8 Conclusion! Ransomware attacks are on the rise lately. In many cases, it isn’t easy to recover from. FBI cyber division recommends these three options if you get attacked by Ransomware: 1.Call the FBI and they will try to assist. 2.Roll back to GOOD, CLEAN, VERIFIED BACKUPS. 3.Pay the ransom! You would be surprised by the number and size of companies they have had to tell to pay the ransom. So, while having a good backup solution ready is a great layer of defense, make sure that you take necessary precautions to avoid the Trojan encrypting your backup files as well. And, remember to test your backups!

9 trial available at veeam.com/downloads Questions? Nicholas Serrecchia System Engineer, Veeam Software Nicholas.Serrecchia@Veeam.com


Download ppt "Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward."

Similar presentations


Ads by Google