Tagged in

ransomware

Rubrik -  - How Healthcare Organizations Drive Cyber Resiliency with Rubrik

Customers

How Healthcare Organizations Drive Cyber Resiliency with Rubrik

More and more healthcare organizations are driving digital transformation as they look to improve the patient experience, reduce costs, and streamline processes. The downside, however, is that this shift is making healthcare organizations even more lucrative to cyberattackers–especially when combined with the volume of computer-stored patient information and EHR data. Healthcare remains one of the top industries targeted by ransomware and saw a 350% increase in Q4 2019 alone. To learn how you can help protect your organization from ransomware, download our eBook: How Healthcare Organizations Can Develop an Effective Ransomware Remediation Plan. You’ve heard us say it before. Backups are a critical defense against ransomware. However, advanced ransomware is now targeting backups, which only increases the chances of ransom payout as organizations lose their last line of defense. Rubrik was designed to make backups immune to ransomware and accelerate recovery after an attack. Data stored in Rubrik is never available in a Read/Write format, preventing your backups from being compromised or deleted. In the event of an attack, quickly recover to the most recent clean state with just a few clicks–minimizing downtime and data loss. Here are two stories of how healthcare organizations are leveraging Rubrik to up-level their…
Rubrik -  - Combat Ransomware & Increase Resiliency with Rubrik and Azure

Product

Combat Ransomware & Increase Resiliency with Rubrik and Azure

It’s 2020, and the frequency of and repercussions from ransomware are getting worse. Bad actors are taking advantage of increases in remote work and the lapses or gaps in security measures as the attack-surface spreads. In Q1 2020, the average enterprise ransom payment increased to $111,605, up 33% from Q4 of 2019. Business interruption costs are often 5-10x higher than direct ransomware incident costs. Lost revenue, downtime, and brand damage are factors that severely affect victims of ransomware if they’re unable to recover quickly. Recently, Karl Rautenstrauch, Principal Program Manager with the Microsoft Azure engineering team, gave a highly informative presentation about how Rubrik and Microsoft Azure are a powerhouse combination in helping to defeat ransomware. Here are some key takeaways from the presentation: A Common Ransomware Reality The following scenario happened to an Azure customer. It’s a bad story, but it’s one everyone can learn from. The customer’s entire network was impacted by a particularly nefarious form of ransomware that not only deleted content on users’ workstations where the ransomware was first encountered, but reached out across the network and deleted content from NAS appliances and from an appliance used to back up to the Azure Cloud. The ransomware…
Rubrik -  - 3 Truths About Moving Large Workloads to the Cloud

General Tech

3 Truths About Moving Large Workloads to the Cloud

We are in the age where data is no longer the endgame for businesses, it’s merely a place to start. Deep insights that drive innovation, enhance customer engagement, and improve business outcomes can be pulled from data. So, how you treat your data can have a profound bearing on the conclusions you draw and the business success you realize. Businesses that want to move their big data applications to the cloud (like SAP, Oracle, HPC) in order to open up the vast opportunities the cloud offers in terms of data treatment have, historically, faced significant barriers. Traditionally, the biggest obstacles have been bandwidth limitations in getting the applications to the cloud and a lack of control over data, both in-transit and at rest. After data has been migrated to the cloud, you won’t necessarily have the same suite of tooling to manage it that you would have on-premises. The business process differs as that data moves. And, of course, data-in-transit faces more potential exposure and is therefore more vulnerable. However, with advancements in both internet infrastructure and secure data management solutions, the barriers that have held companies back from the cloud in the past have been removed. Now, there is…
Rubrik -  - Recovering Fast from Ransomware Attacks: The Magic of an Immutable Backup Architecture

Architecture

Recovering Fast from Ransomware Attacks: The Magic of an Immutable Backup Architecture

Summary Ransomware has been blasting my news feeds on a daily basis for years. Each article details the story of an organization that can no longer access their business critical data. Where the attackers have crippled their victims by encrypting access to production files and storage devices. According to the Emsisoft Malware Lab, ransomware attacks in 2019 “impacted at least 966 government agencies, educational establishments and healthcare providers” at a potential cost in excess of $7.5 billion. Whilst cyber security teams have invested in a myriad of protection tools, extortionists continue to find new mechanisms to encrypt organizations’ data. Backups are one of the most – if not the most – important defense against ransomware. But if subject to corruption, attackers will use it against you. Advanced ransomware is now targeting backups – modifying or completely wiping them out – eliminating your last line of defense and driving large ransom payouts. Rubrik’s uniquely immutable filesystem natively prevents unauthorized access or deletion of backups, allowing IT teams to quickly restore to the most recent clean state with minimal business disruption. This blog walks you through our one-of-a-kind immutable architecture and robust security controls that harden your data from cyber attacks. The…
Rubrik -  - The Importance of Cyber Resiliency During a Global Crisis

Product

The Importance of Cyber Resiliency During a Global Crisis

Cybercriminals have been busy exploiting global crises. Often in the form of phishing emails or other malware, these attacks prey on people’s need for information and have already started targeting large organizations, including hospitals and government agencies. For your organization, this means that hackers can easily attempt to take advantage of your employees who are eager for more news, leaving you vulnerable to ransomware. When combined with the growing sophistication of ransomware, the importance of cyber resiliency is more important now than ever.  Combat Ransomware with Rubrik Backups are often your last line of defense against ransomware and should be a reliable recovery strategy following an attack. In fact, advanced ransomware attacks target backup files—and the probability of a ransom payout increases when your last line of defense is compromised.  Recovery is typically complex and time-consuming for organizations relying on legacy backup solutions; identifying the scope of the attack, locating the most recent clean data, and restoring quickly can be a significant investment for any organization. And with today’s ransomware strains, backups themselves are often encrypted or deleted from an attack.   Customers across industries leverage Rubrik as part of their ransomware remediation strategy to ensure minimal data loss and business…
Rubrik -  - Built-in Immutability for Cyber Resiliency

General Tech

Built-in Immutability for Cyber Resiliency

Imagine one or more of your systems is unavailable because of some malicious attack, whether a nasty virus, ransomware, or sabotage from a disgruntled employee. No worries, these things happen —  you’ll recover from backup. Except you discover that your backups have been compromised in the same manner. This is usually where the term air gap gets dropped. Someone will say, “you need a truly offline backup — tape! There’s no way ransomware can get into a tape backup!” While that’s true, how long does it take to recover from tape stored in a land somewhere far, far away? If a backup takes so long to restore that there’s major financial or business impact, does it actually exist? Realistically, there are ways to protect your data stored by backup systems even without this gap.  I previously wrote a blog post about immutable infrastructures, but compute infrastructures are not the only way that immutability matters in the data center. Immutable, by definition, means the state is set or inflexible once constructed. In other words, it cannot be changed. The goal is to build a more reliable automated compute infrastructure in order to enable stable continuous delivery. Data is becoming more and more…
Rubrik -  - Exploring Passive Survivability: Bracing for a Cyber Attack

General Tech

Exploring Passive Survivability: Bracing for a Cyber Attack

Security attacks continue to be on the rise as threats like ransomware grow more mature. Many enterprises find themselves unprepared for an attack, with more organizations opting to pay ransom than ever before. This is because recovering from an attack is often time-consuming and complex, and in many cases, the backups themselves are compromised. Although preventing ransomware attacks may seem near impossible, there are tools and infrastructure best practices that can help you build an effective ransomware remediation plan to ensure cyber resiliency. In an article with Infosecurity Magazine, Robert Rhame, Director of Market Intelligence at Rubrik, explores the passive survivability model and how this framework can enable your team to bounce back from a successful attack. Let’s take a quick look at this model and how, according to Rhame, it can prepare your team.  A version of the below excerpted article originally appeared in Infosecurity Magazine. Design Your Infrastructure for Ransomware Resiliency When it comes to preparing for a threat that you can’t stop, your infrastructure must be designed in such a way that an attack, although damaging to your business, does not cause all of your operations to sink. Like a modern battleship, your infrastructure should be created…
Rubrik -  - The Day the Data Center Stood Still: A Tabletop DR Workshop

General Tech

The Day the Data Center Stood Still: A Tabletop DR Workshop

When it comes to being ready for the real thing, regular DR testing is crucial to preparing a team for all the moving parts involved when some random day goes really wrong. The trouble is, it’s not always possible to scrape together the time and resources needed to test as often as you should. In many organizations, the first time a crisis team gets together is for the big one.   This blog series shows how you can use tabletop workshops to do some hypothetical training and strengthen your disaster recovery and response strategy. In my first post, I discussed the importance and preparation of a tabletop exercise. This post will help walk through the setup and execution of the exercise. Let’s get started! Tips for Running Your Tabletop Workshop Each workshop has one facilitator to guide the exercise and 5-10 participants in the core and extended crisis team to roleplay the scenario. Note that participants will not necessarily be playing their actual role at the company, but working collectively as a group to address the disaster. Group Discussions One of the main goals of a tabletop workshop is to encourage group discussions that identify holes in your current DR strategy…
Rubrik -  - How to Throw a Disaster Recovery Tabletop Workshop

General Tech

How to Throw a Disaster Recovery Tabletop Workshop

Ransomware and destructive malware. You either groan with media fatigue or cringe at the thought of getting blown off the map by bitcoin bandits…perhaps both. For many organizations, creating a multi-leveled disaster recovery plan to accommodate this potential threat is now a top priority. The problem is, many organizations create a DR plan but don’t test each year. It’s easy to procrastinate DR testing, as it’s a costly activity in terms of both hours and infrastructure. But failure to test in a complete and realistic scenario can leave an organization woefully unprepared for some of the ancillary activities like communication and ownership of action. Essentially, the first time the crisis team meets should never be during a crisis. Simulating an attack around a table with a few colleagues doesn’t replace live testing, but it does uncover things you may not otherwise think of. This blog series will help walk through the setup and execution of a tabletop exercise for testing your DR plan. In true RPG style, this post will show how to simulate an unfolding disaster and apply your DR strategy in response. The advantage of running a tabletop exercise is its lightweight impact in terms of time and…