SlideShare une entreprise Scribd logo
1  sur  21
The current state of ransomware
76% of companies threatened admit to paying a ransom
!
200% increase in new ransomware variants
!
#1 cause of loss (at 51%) of total incident costs, followed by hacking
!
#1 AWS Recovery
$1.54 Million average (mean) ransom. Almost 2X the $812,380 of 2022
!
92% increase in policy premiums for cyber insurance since last year
!
236.7 Million ransomware attacks in the first half of 2022
!
Notable recent ransomware attacks
Minneapolis School District —March 2023
• After failing to pay $1 million to keep its information from being leaked, hackers posted online
sensitive data going back to 1995
• The event shut down many Minneapolis schools, but the school district downplayed it calling
it ‘an encryption event’ and not providing safety protocol in a timely manner (i.e. change
passwords, use multi-factor authentication, be vigilant of credit card purchases)
Although forced to disclose data breaches, companies and institutions often downplay them…
!
!
#1 AWS Recovery
Rackspace —December 2022
• The attack caused significant outages and disruptions for its Hosted Exchange services.
Beginning Dec. 2, customers were unable to access their mail services in what the cloud
service provider called a "security incident."
• Four days later, Rackspace confirmed the outages were caused by ransomware and began
migrating its Hosted Exchange customers to Microsoft 365.
• Rackspace declined to comment on whether it received or paid a ransom
To pay or not to pay the ransom?
MYTH: Paying ransom guarantees your data back
� Only 42% of companies report being able to fully
recover data after an attack
� Many times bad guys will attack a 2nd time knowing
they can extort another payment
TRUTH: The only guarantee of returning your data is to have a
reliable backup & recovery solution in place.
#1 AWS Recovery
The biggest cost isn’t the ransom
❌ Data damage
❌ Restoration of host systems and data
❌ Downtime due to attacks (no productivity/revenue)
❌ Forensic investigation
❌ Damage to the reputations of victims
Downtime creates loss of productivity of users and responders, exposure
of sensitive data, loss of revenue – current and future costs include:
*Loss of productivity & non-availability is the primary business impact of ransomware
#1 AWS Recovery
Ransomware-as-a-service
Most Popular: RaaS Affiliate Model
RaaS Operator (Seller) RaaS Affiliate (Buyer)
Recruits affiliates on forums Pays to use ransomware
Gives affiliates access to ransomware
through a ‘builder’
Targets victims
Sets up payment portal Sets ransomware demand
Assists with negotiations Communicates and negotiates with
victim
Wall of Shame: Manages dedicated leak
site
Manages decryption keys
❌ The RaaS market is competitive,
sophisticated, BIG, and growing.
❌ Low barrier of entry and versatile
models depending on profit sharing,
flat fees vs monthly subscriptions, etc.
Remote working
❌ Weaker controls on home IT
❌ Higher likelihood of users clicking on
ransomware lure
❌ Firms are negotiating and paying
ransom! This perpetuates and
encourages malicious attacks.
❌ Anonymity of cryptocurrency creates
minimal criminal traceability.
Easy money
#1 AWS Recovery
Why is ransomware surging?
“Ransomware-proofing” the Castle Analogy
Any single element does
not provide a complete
security solution against
ransomware.
Backup and DR is the
last line of defense.
Anti Malware/ Anti
Phishing
Email Filtering/Web
blocking
Software Updates &
Employee Training
Effective Backup
and DR
#1 AWS Recovery
#1 AWS Recovery
How ransomware works
Image source: https://blog.alta.org/2022/03/ransomware-101.html
Satisfy compliance
requirements
Protect
against bugs
Protect against
malicious attacks
Protect against
accidental deletion
Protect against
human error
Capture a
“Golden Copy”
Immutablity = unchanging over time
#1 AWS Recovery
Immutable backups —what are they?
✅Enabled by WORM-compliant data
storage (write once, read many)
✅This ensures that the backup copy
created is not altered or deleted
✅Configurable: A fixed retention period
is configured during which the data
stored in it remains locked
Write Once Read Many
#1 AWS Recovery
Immutable backups + the WORM model
Operational backup & disaster
recovery (DR) built for AWS.
Flexible policies —scheduling from
minutes to months.
Distributed as an AMI through AWS
Marketplace.
Near-zero RTO, recover in seconds
from any type of outage across AWS
regions and accounts.
N2WS #1 backup & recovery for AWS
User-friendly interface with
dashboards, monitoring, alerting,
reporting, and third-party integrations.
#1 AWS Recovery
• Founded in 2012 with a mission to simplify Backup
and Recovery for AWS
• Top rated on AWS Marketplace and AWS Premier
Partner
• Purpose-built for AWS & distributed via AWS
Marketplace
• Thousands of global clients, backing up hundreds of
thousands of EC2 instances
•Winner of 18+ industry awards
N2WS: A pioneer in data lifecycle
management on AWS
#1 AWS Recovery
✅For snapshots you’re uploading to S3 for long-term cost
savings, N2WS provides additional security protection
using S3 Object Lock
✅Retention settings are applied on the version level. Once
you create a bucket with S3 Object Lock, you can’t disable
Object Lock or Suspend Versioning for the bucket
✅Use Object Lock and N2WS to store to any S3 storage
class, including S3 Glacier
✅No additional cost —from N2WS v4.1
LONG-TERM Immutability
https://n2ws.com/blog/amazon-s3-object-lock-part-1 #1 AWS Recovery
Immutable S3 backup using object lock
✅Native snapshots by default cannot be
altered. But the risk of deletion remains.
✅For extra security on short-term, high
availability workloads, copy snapshots to
a DR account and do not give N2WS
permission to delete. If there is a
malicious attack or attempt, this will have
a faster RTO than S3.
✅Protect against BOTH region failure and
account compromise.
#1 AWS Recovery
Create a highly secure “snapshot vault”
SHORT-TERM, HIGHLY AVAILABLE
✅Test your recover operations. Execute
an ad hoc restore to specific points in
time with just a few clicks.
✅ Verify certain resource properties are
recovered (i.e. VPC, subnet, security
group, key pair, instance type)
✅Set recovery order – Determine the
order each target is recovered
✅Easily check issue via logs in the case
of a failed Recovery Scenario
#1 AWS Recovery
Disaster recovery drills & testing
https://aws.amazon.com/blogs/apn/how-to-orchestrate-and-test-recovery-scenarios-with-n2ws/
✅ Automatically copy to Azure blob
storage using Leases for Immutability
protection
✅ Ensures governments are prepared
for a multi-cloud future (new multi-
cloud compliance rules will soon
come into effect)
#1 AWS Recovery
Cloud-native, agentless cross-cloud DR
Available with N2WS Backup & Recovery 4.2
Modern ransomware attacks
disable known backup products
before encrypting data.
The infrastructure-as-a-service
(IaaS) model of N2WS eliminates
the attack surface.
#1 AWS Recovery
Total data sovereignty with N2WS
❌ The Problem ✅ The Solution
N2WS can restore itself
Even if your N2WS server becomes
compromised, N2WS can restore
itself from snapshots using metadata
that is automatically backed up.
Backups continue running
Backups can continue to run
even if N2WS Agent is disabled.
Even without an active Agent,
backups are fully restorable.
Backups are always restorable
N2WS backups can be restored —
even without N2WS— using EC2
console (for native snapshots)
Total data sovereignty with N2WS
Indestructible backups
Backups aren’t kept on any Windows/Linux
machine or network share —so an attacker
can’t destroy them.
#1 AWS Recovery
1 2
3 4
✅Setting up your S3 Buckets with Object Lock
✅Using N2WS Support for Object Lock
✅Using N2WS to create a highly secure
Snapshot Vault
#1 AWS Recovery
Let’s see this in action: live demo
We’ll walk through:
We’re top-rated on the AWS Marketplace and you can install
directly from there or Azure Marketplace.
You can also request a custom quote + plan directly from us.
Sign up for a full-featured 30-day FREE trial: get.n2ws.com/trial
#1 AWS Recovery
How to get started
Get it from
Questions?

Contenu connexe

Tendances

Software defined datacenter SDDC
Software defined datacenter SDDCSoftware defined datacenter SDDC
Software defined datacenter SDDCpsjitha
 
MiXiT - Numérique responsable, ouvrons le capot des fournisseurs Cloud
MiXiT - Numérique responsable, ouvrons le capot des fournisseurs CloudMiXiT - Numérique responsable, ouvrons le capot des fournisseurs Cloud
MiXiT - Numérique responsable, ouvrons le capot des fournisseurs CloudClément DUFFAU
 
Microsoft cloud big data strategy
Microsoft cloud big data strategyMicrosoft cloud big data strategy
Microsoft cloud big data strategyJames Serra
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16David Pasek
 
Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018
Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018
Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018Amazon Web Services
 
Enterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerEnterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerFernando Barrientos
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSDevOps.com
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudSafe Software
 
Cloud migration slides
Cloud migration slidesCloud migration slides
Cloud migration slidesErika Barron
 
The Zen of DataOps – AWS Lake Formation and the Data Supply Chain Pipeline
The Zen of DataOps – AWS Lake Formation and the Data Supply Chain PipelineThe Zen of DataOps – AWS Lake Formation and the Data Supply Chain Pipeline
The Zen of DataOps – AWS Lake Formation and the Data Supply Chain PipelineAmazon Web Services
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computingveena venugopal
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud ComputingJyotika Pandey
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computingprachupanchal
 

Tendances (20)

Software defined datacenter SDDC
Software defined datacenter SDDCSoftware defined datacenter SDDC
Software defined datacenter SDDC
 
MiXiT - Numérique responsable, ouvrons le capot des fournisseurs Cloud
MiXiT - Numérique responsable, ouvrons le capot des fournisseurs CloudMiXiT - Numérique responsable, ouvrons le capot des fournisseurs Cloud
MiXiT - Numérique responsable, ouvrons le capot des fournisseurs Cloud
 
Microsoft cloud big data strategy
Microsoft cloud big data strategyMicrosoft cloud big data strategy
Microsoft cloud big data strategy
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16
 
Cloud Service Models
Cloud Service ModelsCloud Service Models
Cloud Service Models
 
AWS for Backup and Recovery
AWS for Backup and RecoveryAWS for Backup and Recovery
AWS for Backup and Recovery
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018
Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018
Infrastructure as Code: AWS Best Practices (DEV411-R3) - AWS re:Invent 2018
 
Enterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual ControllerEnterprise Storage NAS - Dual Controller
Enterprise Storage NAS - Dual Controller
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
Backup
BackupBackup
Backup
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the Cloud
 
Cloud migration slides
Cloud migration slidesCloud migration slides
Cloud migration slides
 
The Zen of DataOps – AWS Lake Formation and the Data Supply Chain Pipeline
The Zen of DataOps – AWS Lake Formation and the Data Supply Chain PipelineThe Zen of DataOps – AWS Lake Formation and the Data Supply Chain Pipeline
The Zen of DataOps – AWS Lake Formation and the Data Supply Chain Pipeline
 
Security in cloud computing
Security in cloud computingSecurity in cloud computing
Security in cloud computing
 
Security Issues in Cloud Computing
Security Issues in Cloud ComputingSecurity Issues in Cloud Computing
Security Issues in Cloud Computing
 
security Issues of cloud computing
security Issues of cloud computingsecurity Issues of cloud computing
security Issues of cloud computing
 

Similaire à Immutable Backups Slides.pptx

How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudOK2OK
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...OK2OK
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOK2OK
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsOK2OK
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentationParveen Yadav
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.pptArunKumbi1
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computingronak patel
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideHTS Hosting
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Simplified backup for Azure and AWS
Simplified backup for Azure and AWSSimplified backup for Azure and AWS
Simplified backup for Azure and AWSChris Bullock
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...white paper
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Jürgen Ambrosi
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicSagi Brody
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)Amazon Web Services
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicrodvmug1
 
cloud Raid
cloud Raidcloud Raid
cloud Raidgsmenon1
 

Similaire à Immutable Backups Slides.pptx (20)

How to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS CloudHow to Ransomware-Proof your AWS Cloud
How to Ransomware-Proof your AWS Cloud
 
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
Optimize your AWS FEST - N2WS session - Addressing the Relentless Threat of R...
 
Optimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS sessionOptimize your AWS FEST - N2WS session
Optimize your AWS FEST - N2WS session
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
How to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public cloudsHow to centralize + monitor the health of your hybrid, private and public clouds
How to centralize + monitor the health of your hybrid, private and public clouds
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Cloud computing & Security presentation
Cloud computing & Security presentationCloud computing & Security presentation
Cloud computing & Security presentation
 
Cloud Security_Module2.ppt
Cloud Security_Module2.pptCloud Security_Module2.ppt
Cloud Security_Module2.ppt
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
Issues in cloud computing
Issues in cloud computingIssues in cloud computing
Issues in cloud computing
 
Cloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive GuideCloud Security: A Comprehensive Guide
Cloud Security: A Comprehensive Guide
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Simplified backup for Azure and AWS
Simplified backup for Azure and AWSSimplified backup for Azure and AWS
Simplified backup for Azure and AWS
 
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
Safety in the Cloud(s): 'Vaporizing' the Web Application Firewall to Secure C...
 
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
Webinar Fondazione CRUI Commvault:come adattare le strategie di data protecti...
 
Ransomware: The Defendable Epidemic
Ransomware: The Defendable EpidemicRansomware: The Defendable Epidemic
Ransomware: The Defendable Epidemic
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
cloud Raid
cloud Raidcloud Raid
cloud Raid
 

Dernier

WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...masabamasaba
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfonteinmasabamasaba
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareJim McKeeth
 
tonesoftg
tonesoftgtonesoftg
tonesoftglanshi9
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...masabamasaba
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrandmasabamasaba
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrainmasabamasaba
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...Jittipong Loespradit
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...masabamasaba
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesVictorSzoltysek
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisamasabamasaba
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...Shane Coughlan
 

Dernier (20)

WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand%in Midrand+277-882-255-28 abortion pills for sale in midrand
%in Midrand+277-882-255-28 abortion pills for sale in midrand
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM TechniquesAI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
AI Mastery 201: Elevating Your Workflow with Advanced LLM Techniques
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 

Immutable Backups Slides.pptx

  • 1.
  • 2. The current state of ransomware 76% of companies threatened admit to paying a ransom ! 200% increase in new ransomware variants ! #1 cause of loss (at 51%) of total incident costs, followed by hacking ! #1 AWS Recovery $1.54 Million average (mean) ransom. Almost 2X the $812,380 of 2022 ! 92% increase in policy premiums for cyber insurance since last year ! 236.7 Million ransomware attacks in the first half of 2022 !
  • 3. Notable recent ransomware attacks Minneapolis School District —March 2023 • After failing to pay $1 million to keep its information from being leaked, hackers posted online sensitive data going back to 1995 • The event shut down many Minneapolis schools, but the school district downplayed it calling it ‘an encryption event’ and not providing safety protocol in a timely manner (i.e. change passwords, use multi-factor authentication, be vigilant of credit card purchases) Although forced to disclose data breaches, companies and institutions often downplay them… ! ! #1 AWS Recovery Rackspace —December 2022 • The attack caused significant outages and disruptions for its Hosted Exchange services. Beginning Dec. 2, customers were unable to access their mail services in what the cloud service provider called a "security incident." • Four days later, Rackspace confirmed the outages were caused by ransomware and began migrating its Hosted Exchange customers to Microsoft 365. • Rackspace declined to comment on whether it received or paid a ransom
  • 4. To pay or not to pay the ransom? MYTH: Paying ransom guarantees your data back � Only 42% of companies report being able to fully recover data after an attack � Many times bad guys will attack a 2nd time knowing they can extort another payment TRUTH: The only guarantee of returning your data is to have a reliable backup & recovery solution in place. #1 AWS Recovery
  • 5. The biggest cost isn’t the ransom ❌ Data damage ❌ Restoration of host systems and data ❌ Downtime due to attacks (no productivity/revenue) ❌ Forensic investigation ❌ Damage to the reputations of victims Downtime creates loss of productivity of users and responders, exposure of sensitive data, loss of revenue – current and future costs include: *Loss of productivity & non-availability is the primary business impact of ransomware #1 AWS Recovery
  • 6. Ransomware-as-a-service Most Popular: RaaS Affiliate Model RaaS Operator (Seller) RaaS Affiliate (Buyer) Recruits affiliates on forums Pays to use ransomware Gives affiliates access to ransomware through a ‘builder’ Targets victims Sets up payment portal Sets ransomware demand Assists with negotiations Communicates and negotiates with victim Wall of Shame: Manages dedicated leak site Manages decryption keys ❌ The RaaS market is competitive, sophisticated, BIG, and growing. ❌ Low barrier of entry and versatile models depending on profit sharing, flat fees vs monthly subscriptions, etc. Remote working ❌ Weaker controls on home IT ❌ Higher likelihood of users clicking on ransomware lure ❌ Firms are negotiating and paying ransom! This perpetuates and encourages malicious attacks. ❌ Anonymity of cryptocurrency creates minimal criminal traceability. Easy money #1 AWS Recovery Why is ransomware surging?
  • 7. “Ransomware-proofing” the Castle Analogy Any single element does not provide a complete security solution against ransomware. Backup and DR is the last line of defense. Anti Malware/ Anti Phishing Email Filtering/Web blocking Software Updates & Employee Training Effective Backup and DR #1 AWS Recovery
  • 8. #1 AWS Recovery How ransomware works Image source: https://blog.alta.org/2022/03/ransomware-101.html
  • 9. Satisfy compliance requirements Protect against bugs Protect against malicious attacks Protect against accidental deletion Protect against human error Capture a “Golden Copy” Immutablity = unchanging over time #1 AWS Recovery Immutable backups —what are they?
  • 10. ✅Enabled by WORM-compliant data storage (write once, read many) ✅This ensures that the backup copy created is not altered or deleted ✅Configurable: A fixed retention period is configured during which the data stored in it remains locked Write Once Read Many #1 AWS Recovery Immutable backups + the WORM model
  • 11. Operational backup & disaster recovery (DR) built for AWS. Flexible policies —scheduling from minutes to months. Distributed as an AMI through AWS Marketplace. Near-zero RTO, recover in seconds from any type of outage across AWS regions and accounts. N2WS #1 backup & recovery for AWS User-friendly interface with dashboards, monitoring, alerting, reporting, and third-party integrations. #1 AWS Recovery
  • 12. • Founded in 2012 with a mission to simplify Backup and Recovery for AWS • Top rated on AWS Marketplace and AWS Premier Partner • Purpose-built for AWS & distributed via AWS Marketplace • Thousands of global clients, backing up hundreds of thousands of EC2 instances •Winner of 18+ industry awards N2WS: A pioneer in data lifecycle management on AWS #1 AWS Recovery
  • 13. ✅For snapshots you’re uploading to S3 for long-term cost savings, N2WS provides additional security protection using S3 Object Lock ✅Retention settings are applied on the version level. Once you create a bucket with S3 Object Lock, you can’t disable Object Lock or Suspend Versioning for the bucket ✅Use Object Lock and N2WS to store to any S3 storage class, including S3 Glacier ✅No additional cost —from N2WS v4.1 LONG-TERM Immutability https://n2ws.com/blog/amazon-s3-object-lock-part-1 #1 AWS Recovery Immutable S3 backup using object lock
  • 14. ✅Native snapshots by default cannot be altered. But the risk of deletion remains. ✅For extra security on short-term, high availability workloads, copy snapshots to a DR account and do not give N2WS permission to delete. If there is a malicious attack or attempt, this will have a faster RTO than S3. ✅Protect against BOTH region failure and account compromise. #1 AWS Recovery Create a highly secure “snapshot vault” SHORT-TERM, HIGHLY AVAILABLE
  • 15. ✅Test your recover operations. Execute an ad hoc restore to specific points in time with just a few clicks. ✅ Verify certain resource properties are recovered (i.e. VPC, subnet, security group, key pair, instance type) ✅Set recovery order – Determine the order each target is recovered ✅Easily check issue via logs in the case of a failed Recovery Scenario #1 AWS Recovery Disaster recovery drills & testing https://aws.amazon.com/blogs/apn/how-to-orchestrate-and-test-recovery-scenarios-with-n2ws/
  • 16. ✅ Automatically copy to Azure blob storage using Leases for Immutability protection ✅ Ensures governments are prepared for a multi-cloud future (new multi- cloud compliance rules will soon come into effect) #1 AWS Recovery Cloud-native, agentless cross-cloud DR Available with N2WS Backup & Recovery 4.2
  • 17. Modern ransomware attacks disable known backup products before encrypting data. The infrastructure-as-a-service (IaaS) model of N2WS eliminates the attack surface. #1 AWS Recovery Total data sovereignty with N2WS ❌ The Problem ✅ The Solution
  • 18. N2WS can restore itself Even if your N2WS server becomes compromised, N2WS can restore itself from snapshots using metadata that is automatically backed up. Backups continue running Backups can continue to run even if N2WS Agent is disabled. Even without an active Agent, backups are fully restorable. Backups are always restorable N2WS backups can be restored — even without N2WS— using EC2 console (for native snapshots) Total data sovereignty with N2WS Indestructible backups Backups aren’t kept on any Windows/Linux machine or network share —so an attacker can’t destroy them. #1 AWS Recovery 1 2 3 4
  • 19. ✅Setting up your S3 Buckets with Object Lock ✅Using N2WS Support for Object Lock ✅Using N2WS to create a highly secure Snapshot Vault #1 AWS Recovery Let’s see this in action: live demo We’ll walk through:
  • 20. We’re top-rated on the AWS Marketplace and you can install directly from there or Azure Marketplace. You can also request a custom quote + plan directly from us. Sign up for a full-featured 30-day FREE trial: get.n2ws.com/trial #1 AWS Recovery How to get started Get it from