Ransomware and other cybercrime attacks are the easiest way for criminals to extract money from you whilst maintaining their anonymity.
This happens thousands of times every year and that number is on the increase. The majority of attacks go unreported because of embarrassment, or fear of customers losing faith in a business.
Since GDPR became law in the EU in May 2018, there have been reports of criminals blackmailing companies after they have downloaded personal data of their customers. This is partly because the fines for a personal data breach can run into millions and a ransom payment might be seen as an easier way out.
A lot of your customers’ data might exist solely online with one system admin having access to all systems with the same login credentials.
What if those credentials are shared between staff and the system administrator leaves your company? Will they still have backdoor access?
Most vulnerable are organisations which have a high turnover of admin staff and high privileged login accounts. Larger organisations also have the money to pay a ransom, so they are on the criminals’ ‘hit list’.
How a Cloud Storage Backup can help you recover from Ransomware
This is a typical scenario:
Someone with a known login to a customer’s server passes these details onto the criminal. They connect to the server and encrypt all files and data. Other attacks can come via malware downloaded by an unsuspecting user, however those won’t normally grant unauthorised access to a server’s console.
Who is to blame? The customer? Their IT support company?
Either way, the only way out is to pay the ransom in Bitcoins. And then you have to trust the criminal to follow through and unlock your files.
As a final way to make sure a ransom is paid, the backups are deleted. Why? Because cybercriminals are intelligent and they know the name and type of every backup, sync and replication product on the market.
They will download an application to the server and will know within a few minutes about every backup, sync and replication product installed on your server. A few minutes later, they will all be purged, thus preventing a restore.
It takes a few seconds to harden your BOBcloud backup sets and ensure all backed-up data is safe from cybercriminals.
Simply configure our software to log off every time you finish using it on your customer’s server. Ideally, the software needs to be in a state where it requires a login before it can be accessed. Under normal circumstances, a backup won’t need to be modified after the initial backup has finished, so there is no need to give it an auto-login.
If the login becomes compromised, it can be easily changed.