What if your data center is hit with ransomware?

Data has become lifeblood to many businesses irrespective of their size and industry vertical they belong to and that’s what is making them face tough time these days. Cyber attacks, especially Ransomware hitting databases has become a nightmare to IT managers of public and private organizations. For instance, you can take the recent case of US Air Force losing data to cyber criminals.

According to a press release, in May 2016 the database of US Air Force was corrupted and Lockheed Martin has spent two weeks trying to recover data before notifying the Air Force on June 6th, 2016. The database was populated with data and information about current investigations as well as all records related to Inspector General Complaints. Some news sources also reported that more than 100,000 files went missing from May 2016 and out of them around 500 critical files were hit with ransomware and were encrypted and locked. Lockheed was not interested in entertaining the demands of the cyber criminals and so asked US Air Force to knock the door of Pentagon.

Early this week, the US Air Force turned to the Pentagon’s team of cyber security professionals and as of Wednesday, they have found that extensive data recovery efforts will be needed to decrypt the encrypted files.

Hence, when government agencies are finding it arduous to deal with ransomware, imagine what will happen to private companies and their data, if at all, they are hit by Ransomware…..?

The said situation rises the question—- “What if your data is hit by ransomware?”

This is where a data backup shows its significance. Data is a crucial part of your business and essential to your business continuity plan. Backup allows you to avoid issues as this one as data loss can happen in many ways. The most common cause of data loss comes down to physical failure of hardware, accidental deletes, theft or disasters like fire and flood.

It can also act as a savior in this age of digital era of cyber threats such as hacking and ransomware. Want to know how?

Suppose one of your IT managers has clicked an email link which made malware enter your network and encrypt all your database. And if cyber criminals are demanding a ransomware to offer you a key to decrypt the files, the issue can become far more complicated then you think. What if they do not offer you the key as promised after receiving the said sum and what if they start demanding more money seeing your enthusiasm after receiving the first installment?

This is making many enterprise managers turn a blind eye towards Ransomware demand. But what will happen to the critical data which is in hands of cyber criminals

Here’s where being proactive, rather than reactive helps you come out of situation in a simple way. If you have a backup of your production data, then you can use that duplicate copy as a data continuity service and can show the bad guys a blind eye.

Additionally, if you always practice the process of encrypting the files at rest, this will give an additional security layer to your data storage practices. Means, if suppose, the bad guys take hold of your data, it can prove worthless to them, as it is encrypted. So, even if you don’t pay them the ransom, and if they choose to leak the data to other sources such as your competitors, since, the files are encrypted the move will completely be useless.

So, a backup copy can act as a business continuity resource and encrypted data nullifies the ransomware affect.

What do you say? Please share your thoughts on this thought of our analysts team of StorageServers through comments section below.

Meanwhile, approach StoneFly, Inc for all your Backup and Disaster Recovery needs.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s