Tagged in

ransomware

Rubrik -  - Introducing Radar: Faster Recovery from Ransomware

Company

Introducing Radar: Faster Recovery from Ransomware

Ransomware is on the rise, and it’s only getting smarter. Recent research shows ransomware attacks grew more than 350% annually.* To defend against attacks, many companies typically focus on building a perimeter to prevent malware from ever entering their data center. However, as malware becomes increasingly sophisticated, it’s no longer a matter of if  but when an organization will be hit by an attack. While building a perimeter is essential, preventing every threat, every time, across every surface area is a near-impossible task. In fact, 71% of organizations were hit by ransomware after it successfully bypassed their detection and prevention measures.** Once an attack breaks through your defenses, bouncing back quickly is painful. For many IT professionals, this will bring to mind long nights spent trying to detect an attack, analyze the extent of the damage, and restore quickly from backup files. Resiliency should be stronger, and recovery should be faster. The most effective strategy for defending against ransomware is a defense in depth. This approach encompasses a holistic, multi-level ransomware response strategy that incorporates both prevention measures to keep threats out and strong resiliency to minimize downtime when an attack happens. Meet Radar: Recover Faster. Stay Smarter. We’ve been…
Rubrik -  - The Beauty of Immutability

General Tech

The Beauty of Immutability

Imagine one or more of your systems is unavailable because of some malicious attack, whether a nasty virus, ransomware, or sabotage from a disgruntled employee. No worries, these things happen —  you’ll recover from backup. Except you discover that your backups have been compromised in the same manner (this has happened). This is usually where the term air gap gets dropped. Someone will say, “you need a truly offline backup — tape! There’s no way ransomware can get into a tape backup!” While that’s true, how long does it take to recover from tape stored in a land somewhere far, far away? If a backup takes so long to restore that there’s major financial or business impact, does it actually exist? Realistically, there are ways to protect your data stored by backup systems even without this gap. I recently wrote a blog post about immutable infrastructures, but compute infrastructures are not the only way that immutability matters in the data center. Immutable, by definition, means the state is set or inflexible once constructed. In other words, it cannot be changed. The goal is to build a more reliable automated compute infrastructure in order to enable stable continuous delivery. Data has become…
Rubrik -  - Encrypting Your Data in the Cloud, Part 1: Why It Matters

General Tech

Encrypting Your Data in the Cloud, Part 1: Why It Matters

Data Breaches Are Trending While IT security in 2018 has been dominated with news about CPU vulnerabilities, we may very well look back on 2017 as the year of online data breaches and cloud data leaks. From stolen consumer data due to unpatched vulnerabilities to sensitive data leaks due to misconfigured cloud storage buckets, it seems that no one’s data was safe in 2017. For a number of reasons, this is a trend that is likely to continue in 2018 and beyond: The inexorable move from analog to digital means more and more of our data is being stored on computers and websites that are targets for hackers. For example, the Equifax breach impacted 145 million consumers who had personal information stolen. A greater percentage of company employees work remotely using a wide range of devices from desktops to smartphones. This expands the threat landscape and gives malicious actors more ways to compromise valuable data. The growth of the public cloud means that increasingly more data is being stored outside of company data centers in repositories that are accessible via public endpoints. This move to the cloud requires knowledge and skill sets that are still in short supply, leading to…
Rubrik -  - Worried About Viruses? Ransom? Data Loss? The Cure is Here!

General Tech

Worried About Viruses? Ransom? Data Loss? The Cure is Here!

This is not hype! This is reality. Companies across industries get hit with viruses all the time. In the always-on economy, companies rely on 24/7 data availability, so any downtime can severely impact the business. The good news is that with a strong data management solution, you can quickly recover from a disaster without any data loss. Before we dive into how Rubrik delivers that solution, let’s go over what happens during a virus attack. The Lifecycle of a Virus Attack Before Rubrik As the above diagram shows, a typical attack has several phases: you get hit with the virus, your systems are under attack, and your business loses access to the encrypted data. Once it’s detected, your IT team documents and implements steps to prevent the virus from spreading. But since most organizations rely on data to perform daily operations, the data loss you’ve already experienced has a severe impact on the organization. Unfortunately, for many organizations, a virus’ life doesn’t end with patching the vulnerability. Even with a sophisticated antivirus software, viruses can remain in your system undetected. This often leads to further data corruption and a vicious cycle of attack, recover, and patch. For this reason, many…
Rubrik -  - Chapters Health System Chooses Rubrik to Combat Ransomware and Manage Nutanix AHV Environment

Customers

Chapters Health System Chooses Rubrik to Combat Ransomware and Manage Nutanix AHV Environment

Headquartered in Temple Terrace, Florida, Chapters Health System is a principal provider of care for persons affected by advanced and life-limiting illnesses. As one of the country’s first post-acute care systems, Chapters Health is a progressive leader in the delivery of hospice, palliative care, and home health services. Each year, Chapters Health delivers hundreds of thousands of healthcare services across eight counties in West Central Florida through its inpatient and outpatient locations. Chris Williams, Director of IT Operations at Chapters Health, and Mike Parkin, Director of IT Security, discuss how Rubrik protects against the threat of Ransomware and empowers their multi-hypervisor strategy. What challenges were you experiencing with data protection? CW: We were concerned with the growing threat of Ransomware, particularly given the prevalence of attacks targeting hospitals and healthcare systems. The previous solution also failed to provide adequate visibility, which resulted in us needing to physically call the vendor to check the status of a backup. Conducting maintenance was a pain, too. Every new software update would result in issues with our agents or logs not being truncated. MP: We wanted to implement Nutanix AHV, which, with our previous vendor, would have forced us to purchase additional hardware and…
Rubrik -  - How to Avoid Ransomware Jail

General Tech

How to Avoid Ransomware Jail

It’s 1983, and Ronald Reagan is sitting down to watch the hit film War Games. Five days later, the president asked his secretaries of state, “Could a scenario like war games ever happen?” One week later, General Vessey returned with the answer: “Mr. President, it is a lot worse than you think.” Was this the first time that cyber security and privacy had surfaced in computer systems? Categorically, no. Security and Privacy in Computer systems 1967 by Willis Ware was the first paper on the topic — written in 1967. So, since the beginning of networked computing, cyber security, and privacy have been a factor. So, why is it suddenly a huge industry buzzword? My thoughts on this are twofold: Across governments, the use and ideas of cyber warfare were dismissed, ignored, or forgotten. But in 2007, the Aurora test categorically proved that cyber attackers could inflict physical damage using computer tools. This was a pivotal moment, as critical infrastructure was at risk. Cybercrime then shifted to the public sphere with cyber groups lining their sights on non-government attacks, such as online fraud, ransomware, malware, and phishing. The role that security and privacy now play in IT and our personal lives…
Rubrik -  - Combating the Evolving Landscape of Ransomware

General Tech

Combating the Evolving Landscape of Ransomware

About one year ago today, we pointed out an emerging security crisis in the healthcare industry. Cyber threats targeting hospital data were becoming a regular event, with some computer systems held captive for a reputedly multi-million dollar ransom. Beyond the Bitcoin cost, ransomware puts patient care at risk since many organizations must stop operations for over a week. More recently, the worldwide spread of a virus known as “WannaCry” has been decimating operations at UK healthcare provider National Health Service (NHS) in addition to telecom, logistics, and car manufacturers. In total, it has caused havoc to over 230,000 computers in 150 countries. This attack has been aggressively accelerating while CIOs struggle to find a realistic solution. The root cause comes down to the usual suspects: a combination of phishing emails and poorly patched security vulnerabilities. This particular vulnerability was so caustic that Microsoft released an update to several of their deprecated operating systems such as Windows XP and Server 2003. Additionally, users need to stop using older protocols like SMB 1.0 because they create a multitude of vulnerabilities that allow attackers to commandeer a system. It’s on the vendor and partner communities to come up with innovative and effective methods…
Rubrik -  - The Accelerating World of Ransomware

General Tech

The Accelerating World of Ransomware

Have you been hearing more about ransomware recently? It seems like every day there’s another news headline, vendor presentation, or story about data held ransom. So, what’s driving this “buzz”? Is it just a media-created frenzy, or are there actual changes in the ransomware landscape? Ransomware: A Maturing Landscape Per ZDNet, the cost of ransomware attacks rose from $25M in 2015 to $1B in 2016–an incredible rate of growth. The landscape is evolving into a structure similar to the IT market; there are ransomware vendors, “channel partners” or providers, and (of course) customers. Ransomware vendors now sell “kits” to aspiring hackers that offer various degrees of customization, encryption types, and technical skill required to use. This is a thriving industry, as exemplified by the barrage of stories on organizations such as public transportation services, school districts, and hospital after hospital. Customer Service from Ransomware Once your files are encrypted by ransomware, you are their customer–albeit a very unwilling one. In a darkly ironic twist, ransomware providers are ramping up their customer service efforts to give technical support on using Bitcoin and other related tasks. In some cases, the hacker even pays a percentage of ransoms back to the vendor. This new sector reveals a maturing marketplace with continuing investment that will…
Rubrik -  - Data Protection Is Not Just for Compliance

General Tech

Data Protection Is Not Just for Compliance

Technology permeates all aspects of our lives in such a seamless manner that it is easy to underestimate our reliance on it. As consumers, we’ve all been inconvenienced by the words, “I’m sorry, we can’t do anything right now–our computers are down.” But for a business, this disruption is far more than an inconvenience. A Business Held Hostage On the evening of March 19th, 2016, the owner of Hard Times Café in Bethesda, MD, began having problems with their point of sale (POS) system. The following morning, they discovered that their POS system had been compromised by ransomware. They would have to pay $10,000 in Bitcoin for the release of their encrypted files. When the team contacted the FBI, they were told to pay or rebuild their system since the agency was overwhelmed with ransomware cases. The restaurant was closed for seven days before being able to reopen. Your Data Is Your Business Underestimating the necessity of a reliable backup solution can be a financial disaster for large companies, but it can be fatal for smaller ones. During the seven days that Hard Times Café was closed, their three dozen full- and part-time employees went without pay, and the business generated no revenue. In addition,…