DRJ's Spring 2019

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 31, Issue 2

Full Contents Now Available!

DRJ Blogs

DRJ | The premiere resource for business continuity and disaster recovery

3 Steps Prevention against Ransomware

3 Steps Prevention against Ransomware

Regrettably ransomware are becoming a regular occurrence. The stories of data loss, locked away data and critical operation disruption are real. With the General Data Protection Regulation (GDPR), applicable after 2018, companies are already addressing their backup and disaster recovery plans to ensure that they remain compliant with the data protection regulations. Regardless of compliance reasons, enterprises still need a reliable way of protecting themselves from ransomware.

The following three steps can prepare an enterprise to prevent the damage done by ransomware:

Step 1: Prepare

Preparation is of the utmost importance; something as grand a scale as moving to the cloud takes a great deal of it. It can be classified into these major segments: Training staff, employing security layers, removing outdated operating systems.

Recent Ransomware, Locky, used phishing emails to attack a number of enterprises. Even if the organization is employing efficient backup appliances and is backing up their data to the cloud, it makes little difference if the staff cannot identify phishing emails. By clicking on the links or downloading files and folders, they can put all of the sensitive and mission critical data at risk. This makes staff education extremely important.

Different security protocols are necessary to ensure that data is protected. Services such as Amazon Macie and Azure Confidential Cloud Computing are promising services dedicated to ensure that data remains encrypted and protected.

Outdated operating systems can put the entire structure at risk. Traditional technologies are costly and reduce the overall efficiency, productivity and in turn the profitability of the enterprise. Apart from this, the outdated technology also puts the data at risk; making it purposeless.

Step 2: Detection

Ransomware detection is necessary especially if you do not have a disaster recovery (DR) plan in place. Without the DR plan, once a ransomware locks your data you have no choice but to wait until it’s recovered. Federal agencies and experts recommend that you should acquire reliable enterprise cloud storage. If you don’t have one and your data is compromised, it is strongly recommended not to pay the ransom because in most cases, it is highly likely that you won’t get your data back. Not to mention, the hacker now has more incentive to continue his illegal activities.

There are innovative tools and software available that facilitate the detection of unusual behavior. There are services that utilize machine learning to learn user patterns and then detect any anomaly in those patterns (Amazon Macie).

Step 3: Mitigation

 The best way to ease the effects of a successful ransomware attack is a reliable backup and disaster recovery solution. This is due to how ransomware work. For instance, WannaCry encrypted the user data and blocked access to it while Petya deleted data but asked for ransom pretending that it actually had the files encrypted; either way access to data was locked.

If the victim of the ransomware, already has a cloud backup solution they can simply recover their data after resetting the credentials of their system. That way, even after a successful security breach; the enterprise remains unaffected.


The preventive measures against ransomware can be simplified into three steps: Preparation, Detection and Mitigation. It is necessary to employ backup appliances that can provide effective backup and can extend to the cloud using cloud connect services; giving you a reliable backup and DR service. With the help of this service, even if your system is attacked by a ransomware; you always have a way to recover your data. 

BCP Headaches you can Avoid by Using Shield: Part ...
Never, say never… 

Related Posts