Sponsored By

No Organization Is Immune

There is a staggering disparity between how well organizations believe they are protected against ransomware and the protection their existing security solutions actually provide.

3 Min Read
no organization is immune to ransomware
Getty Images

The recent cyberattack on discount retailer The Works emphasizes the need for organizations of all sizes to invest in ransomware prevention measures.

Since sanctions were imposed on Russia following the Ukraine invasion, there has been a tremendous surge in cyberattacks aimed at all sectors of the economy. Sir Jeremy Fleming, director of GCHQ, the United Kingdom’s intelligence, cyber and security agency, has said the Russian regime is identifying institutions and businesses to bring down, and predicts the number of state-sponsored attacks will increase.

It is not just banks and similar high-profile organizations that need to review their cybersecurity, as evidenced by the attack on The Works: In this instance, cyber thieves targeted a business that sells books, stationery, craft supplies and toys.

Five of The Works outlets were temporarily closed after an unknown perpetrator gained unauthorized access to its systems, adversely impacting trade and business operations by creating till issues and forcing delays to store deliveries and online orders.

Forensic experts have been hired to investigate the data breach, and The Works has notified the Information Commissioner’s Office (ICO) of the incident.

There is a staggering disparity between how well organizations believe they are protected against ransomware and the protection that their existing security solutions actually provide.

This disparity has grown massively since the start of the pandemic. Indeed, Covid-19 triggered global cloud adoption, a huge increase in shadow IT and widespread remote working, leading to extensive new data protection challenges.

Thankfully, in the case of The Works, third-party systems secured the company’s most sensitive customer data, highlighting the need to engage external third-party providers for data security and backup.

While there is no 100% effective way to avoid being a ransomware victim, there are actions you can take to ensure your backup strategy will able you to recover effectively:

  • Air gap: Guarantee that the primary and backup storage systems are physically separated. Bad actors are unable to access backup data copies because of this physical break.

  • 3-2-1-1: The most recent best practice calls for three copies of data, two separate backup media, one offshore location to store backups online and an offsite location for backups offline–all air-gapped.

  • Backup data malware detection and removal: Ransomware frequently stays idle on a network for long periods of time before encrypting systems. This model ensures that the malware is present in all backup versions, making malware-free recovery impossible. It’s become critical to be able to detect and remove ransomware from backup data, and to have an isolated area where data can be restored.

  • Instant/rapid recovery flexibility: Long periods of downtime can be just as harmful as data loss. A backup strategy must allow users to quickly return to work by allowing temporary access to data, if necessary, with priority recovery of vital data if necessary.

There is no fail-proof technique to thwart cybercriminals and no means to get rid of ransomware. With the right cloud backup, however, you can ensure that your organization is not held hostage by ransomware demands.

For more information, contact Redstor.

This guest blog is part of a Channel Futures sponsorship.

Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like