News Security USA

Backup data is critical when recovering from a ransomware attack

“Cyber criminals are now utilizing advanced techniques, including artificial intelligence, to penetrate the data center and corrupt critical data assets.  Organizations need to be smarter and more aggressive in combatting these attacks, instead of using common and predictable approaches which have not worked in the past,” said Jim McGann, VP of Marketing and Business Development for Index Engines.

The reports from Scripps Health on the recent string of cyberattacks confirms the involvement of ransomware. As per 10news, one patient, who had broken his neck, was not only able to get needed CT scans but anything related to the hospital visit.

Reacting to this Jim McGann, VP of Marketing and Business Development for Index Engines, said, “Cyber criminals are now utilizing advanced techniques, including artificial intelligence, to penetrate the data center and corrupt critical data assets.  Organizations need to be smarter and more aggressive in combatting these attacks, instead of using common and predictable approaches which have not worked in the past.”

“These new approaches include protecting the backup data, checking the integrity, and ensuring that when they are attacked, they can recover quickly with a known good backup,” he added

As per McGann, Backup data is critical when recovering from a ransomware attack. Knowing that it is common for cyber-criminals to encrypt and corrupt files, backup is where organizations turn to bring the business backup to pre-attack conditions.  If organizations do not check the integrity of the data in the backups they will be faced with an unwelcome surprise when using these backups to recover. Many will find these backups corrupted, and the data inside these images encrypted and unusable.  Organizations that blindly backup data, and do not validate the integrity of the content do not have the confidence they need to ensure a reliable recovery from a cyber attack.  Cyber criminals are smart and understand a company’s environment. They will corrupt data, and backups and make it difficult for any company to recover. If a company is continually validating the data’s integrity, they will outsmart the threat actors and enable a rapid recovery.

Related posts

Team Computers and Apple Collaborate to Empower GCCs with Smarter Workplace Solutions

enterpriseitworld

Ajay Ajmera Joins Group CIO at Rockman Industries 

enterpriseitworld

Versa Envisions Securing Anywhere, Anytime Access with VersaONE Universal SASE

enterpriseitworld
x