{"id":24542,"date":"2016-07-27T12:35:05","date_gmt":"2016-07-27T12:35:05","guid":{"rendered":"http:\/\/greenpages.com\/?p=6715"},"modified":"2016-07-27T12:35:05","modified_gmt":"2016-07-27T12:35:05","slug":"guest-post-how-to-minimize-the-damage-done-by-ransomware","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/guest-post-how-to-minimize-the-damage-done-by-ransomware\/","title":{"rendered":"Guest Post: How to Minimize the Damage Done by Ransomware"},"content":{"rendered":"<p><em>Below is a guest post from Geoff Fancher, Vice President, Americas Channels at SimpliVity Corporation<\/em><\/p>\n<p>Have you ever woken up in the middle of the night, sweating profusely, scared half to death, and terrified that your data center was infected with ransomware? If so, you\u2019ve had an IT nightmare. Just be thankful it was all just a dream and your data isn\u2019t lost.<\/p>\n<p>Though <a href=\"https:\/\/www.simplivity.com\/blog\/2016\/05\/nightmares-become-disasters\/\" >IT nightmares come in all forms<\/a>, one thing all IT pros fear nowadays is ransomware. That\u2019s because ransomware is becoming increasingly commonplace and is evolving to become even more vicious and hard to stop once it has entered an IT environment. The cost to business productivity can be crippling, and the data loss that can occur can set a company back for days.<\/p>\n<p>According to Ponemon Institute, the average cost of IT downtime is $7900 per minute. Per minute! The reason recovering from ransomware attacks can be so costly is that backing up from restores can take a long time, typically measured in hours or days depending on where and how backups were stored. Also, depending on when the most recent backup took place, a lot of data could be lost once the backup is recovered.<\/p>\n<p>With the cost of downtime due to ransomware being so high because quick restores aren\u2019t an option, many organizations are choosing to pay the ransom to get their data back. <a href=\"http:\/\/www.latimes.com\/business\/technology\/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html\" >The most notable example<\/a> comes from Hollywood Presbyterian Medical Center. The hackers infected the hospital\u2019s computer systems, shutting down all communication between the systems, and demanded $17,000 to unlock them. The hospital, being in an a high-pressure situation without the correct resources to be able to quickly shut down its systems and restore from a recent backup, was forced to pay the ransom to receive the decryption key and get back online.<\/p>\n<p>The fundamental piece, then, to avoiding paying the ransom demanded by cyber criminals is to have a disaster recovery plan in place. You should know what to do if a ransomware attack happens. As the old adage goes, \u201cHope for the best. Prepare for the worst.\u201d That\u2019s the attitude to take and the way to do it is to have a plan.<\/p>\n<p>One company that instituted a solid disaster recovery plan just in the nick of time was an enterprise manufacturing company based in the Netherlands. The company was infected with ransomware while its IT partner was in the process of migrating VMs to a new <a href=\"https:\/\/www.simplivity.com\/why-hyperconvergence\/\" >hyperconverged infrastructure<\/a> environment that had built-in data protection. Most of the infected folders were already on the new solution, which was lucky because they were able to use the solution\u2019s backup to restore within fifteen minutes, when just a day before, on the previous infrastructure, it would have taken about three hours to restore to the most recent backup. The partner was also performing hourly backups on the new solution, so they lost less than an hour\u2019s worth of data during the restore. Before deploying hyperconverged infrastructure, the partner was backing up to tape every 12 hours, so they saved the company about 11 hours of data loss on the new hyperconverged solution. What a difference a day makes.<\/p>\n<p>For a disaster recovery plan to be successful, the IT team needs to define recovery time objectives (RTOs) \u2013 how long it takes to restore the backup \u2013 and recovery point objectives (RPOs) \u2013 the nearest backup they can restore from. Basically, businesses have to ask themselves two questions: How long can the business shut down while waiting for the restore to take place? And, how many hours of business-critical data can the company afford to lose? There are data protection plans for every size of company and for every budget. The first step to a data protection plan is defining the organization\u2019s requirements.<\/p>\n<p>Hyperconverged infrastructure, for example, can dramatically cut down the hours it takes for businesses to recover from IT downtime. By making data efficient from the start of its lifecycle, businesses are able to quickly recover from a previous backup.<\/p>\n<p>With <a href=\"https:\/\/www.simplivity.com\/\" >SimpliVity<\/a> hyperconverged infrastructure, companies are able to backup quickly and efficiently with minimal data loss because SimpliVity\u2019s solution is designed to meet even the most stringent RTOs and RPOs to ensure businesses functions aren\u2019t interrupted for long in case of a disaster or ransomware attack. If you&#8217;re heading to GreenPages&#8217; Summit Event next week, definitely swing by the SimpliVity booth to chat!<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=agnqYvkajpc:YNcgSEbfSnw:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=yIl2AUoC8zA\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=agnqYvkajpc:YNcgSEbfSnw:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=agnqYvkajpc:YNcgSEbfSnw:-BTjWOF_DHI\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=agnqYvkajpc:YNcgSEbfSnw:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?i=agnqYvkajpc:YNcgSEbfSnw:V_sGLiPBpWU\" border=\"0\"><\/img><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?a=agnqYvkajpc:YNcgSEbfSnw:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/JourneyToTheCloud?d=qj6IDK7rITs\" border=\"0\"><\/img><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/JourneyToTheCloud\/~4\/agnqYvkajpc\" height=\"1\" width=\"1\" alt=\"\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Below is a guest post from Geoff Fancher, Vice President, Americas Channels at SimpliVity Corporation Have you ever woken up in the middle of the night, sweating profusely, scared half to death, and terrified that your data center was infected with ransomware? If so, you&rsquo;ve had an IT nightmare. Just be thankful it was all&#8230;  <a href=\"http:\/\/greenpages.com\/networking-security\/guest-post-how-to-minimize-the-damage-done-by-ransomware\/\" title=\"ReadGuest Post: How to Minimize the Damage Done by Ransomware\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2503,3327,4506,3797],"tags":[118],"class_list":["post-24542","post","type-post","status-publish","format-standard","hentry","category-hyperconverged-infrastructure","category-networking-security","category-ransomware","category-simplivity","tag-security"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/24542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=24542"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/24542\/revisions"}],"predecessor-version":[{"id":24543,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/24542\/revisions\/24543"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=24542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=24542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=24542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}