Sysfacts Logo
de_DE DE
de_DE DE
  • Objective
  • Achievements
  • Insights
  • Services

E-Mail

Tel.

hello@sysfacts.com +49 221 670572 0
Contact Us
  • Objective
  • Achievements
  • Insights
  • Services
  • Contact
  • News
  • Case Studies
  • Careers

Sysfacts AG
Rudolfplatz 3
50674 Cologne
Germany
—

E-Mail

Tel.

hello@sysfacts.com +49 221 670572 0
de_DE DE
de_DE DE
Post Thumbnail
Return to articles

Date → 17 • February • 2023

Author → Yannick Haymann

Backup – the antidote to ransomware

638 words •

IT infrastructure

Share on Linkedin

Share on Facebook

Share on Twitter

SHARE

It’s not a question of if, but when!

Ransomware attacks have become one of the most significant cybersecurity threats to organizations worldwide. These attacks can cause significant damage by encrypting critical data and demanding payment in exchange for a decryption key. In many cases, organizations have to pay the ransom to recover their data, leading to significant financial losses.

One of the key challenges in dealing with ransomware attacks is ensuring that organizations have a reliable and valid backup copy of their data that can be used to restore their systems. However, in many cases, backup data can also be compromised, either due to insufficient security measures or by the ransomware attack itself.

Without a valid backup, organizations may be left with no choice but to pay the ransom, putting their data and finances at risk. To address this problem, organizations need a reliable and secure backup and recovery solution that can help protect their data from ransomware attacks.

Backup as smart countermeasure.

The foundation is always a suitable strategy and architecture. Since I do not want to overstretch this article, I will go into these aspects deeper in another article. The important thing is that the strategy must be closely aligned with the business and include, for example, valences of the workloads to be protected.

Back to topic: To protect backup data from ransomware attacks, organizations need a multi-layered backup and recovery strategy that includes several measures. One such measure is to use an air-gapped backup system, where backup data is kept in a separate, isolated environment that is not connected to the production network.

This approach helps to ensure that the backup data remains safe from any ransomware attacks that may infect the production network. Additionally, organizations can use a tamper-evident backup system that uses immutable backups to prevent any unauthorized changes to the backup data.

Another measure is to use a backup and recovery solution that includes a verification process to ensure that backup data is recoverable and free from malware or ransomware infections. This process helps to ensure that organizations can quickly restore their systems and data in the event of a ransomware attack, minimizing downtime and financial losses.

Suitable tools

We often use Veeam in the design of our solutions and have had consistently good experiences so far. Of course, critics can now say that software from Veeam is very common and thus a worthwhile target for the search for attack vectors, but I personally consider the technical advantages of Veeam to be predominant. The company offers a range of features, including “SureBackup” and the “Hardened Linux Repository”, that can be used to create a multi-layered backup and recovery strategy.

SureBackup is a feature that allows organizations to test and verify the recoverability of their backup data, ensuring that they have a valid and uncorrupted backup copy that can be used to restore critical data and systems in the event of an attack. Veeam Hardened Linux Repository is another feature that provides an additional layer of security to the backup repository by leveraging a secure, locked-down Linux appliance to store and manage the backup data.

These features help organizations create an air-gapped backup solution that is isolated from the production environment, making it less susceptible to ransomware attacks. When combined with Veeam’s verification process, organizations can ensure that their backup data is recoverable and free from any malware or ransomware infections.

In conclusion, ransomware attacks pose a significant threat to organizations worldwide, and the key to mitigating this threat is to have a reliable and secure backup and recovery solution in place. By using Veeam’s backup and recovery features, organizations can create a multi-layered backup and recovery strategy that helps protect their data from ransomware attacks and ensures that they can quickly restore their systems and data in the event of an attack.

Digitization
Post Thumbnail
What is IT architecture and why does it matter?

Date → 25 • February • 2023

Author → Yannick Haymann

Read More
IT strategy
Post Thumbnail
Exit – A important part of your cloud strategy

Date → 9 • February • 2023

Author → Yannick Haymann

Read More

Accelerate your IT Infrastructure.

Schedule Consultation

About

  • Objective
  • Achievements
  • Insights
  • Contact Us

Services

  • IT Restructuring
  • Cloud Migration
  • Advanced Housing

Resources

  • Careers
  • Schedule a consultation
  • Case Studies
  • News

Legal

  • Imprint
  • Terms & Conditions
  • Privacy Policy

Our Clients

Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
Partner Logo
LinkedIn Xing Instagram

© 2023 Sysfacts AG

LinkedIn Xing Instagram

Designed by Alphamark™

Cookie Consent

By clicking “Accept Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage and assist in our marketing efforts. Privacy Policy

Accept AllCookies Settings
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
en_US EN
en_US EN
de_DE DE