SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
© 2016 Unitrends 1
Uni*
r
Take the Ransom Out of Ransomware
© 2016 Unitrends 2
© 2016 Unitrends 3
"To be honest, we often advise people just to pay the ransom."
Joseph Bonavolonta,Asst. Special Agent, FBI Cybercrime Boston Division
© 2016 Unitrends 4
What is Ransomware?
© 2016 Unitrends 5
 Encrypts victims files with strong
unbreakable encryption
 Demands payment for private
key to unlock data
 Payment typically around $200
to $500 in bitcoins
Ransomware Malware
© 2016 Unitrends 6
 Ransomware is not new
 Recent advances have made it a much larger risk
 Early ransomware was “scareware” and “nagware”
 Didn’t permanently lock files.
 Was easily removed or avoided
 Criminals had difficulty in collecting fees anonymously
 Hacker community not as organized
Long History of Ransomware
© 2016 Unitrends 7
A Growing Menace
© 2016 Unitrends 8
 Cryptolocker
 TorrentLocker
 CryptoWall
 CBT-Locker
 TeslaCrypt
 Locky
 Etc.
Many Variations and Copycats
© 2016 Unitrends 9
Popular Tools of RansomwareVariants
Anonymity Online
Electronic Payment
Unbreakable Encryption
• AES
• RSA
• “Curve” ECC
Network to C&C Server
• Tor
• I2P
• POST/HTTPS
• Hardcoded URLs
© 2016 Unitrends 10
Requires both Public and PrivateKey
© 2016 Unitrends 11
 Spam Email Campaigns
 CBT Locker & Torrent Locker
preferred vector
 Requires interaction from user
 Can affect fully patched systems
 Exploit Kits
 CryptoWall and TelsaCrypt
preferred vector
 Does not require any interaction
 Uses vulnerable installed software
Infection Vectors
BOTH ARE HIGHLY EFFECTIVE WAYS INTO YOUR SYSTEMS
© 2016 Unitrends 12
Get 1 Free
Macs
vulnerable
Voice Enabled
Highly
Localized
Ransomware Continuing to Advance
© 2016 Unitrends 13
How does an enterprise make
sure they never have to pay?
© 2016 Unitrends 14
Play Defense
Play Offense
Don’t forget about your backup players
© 2016 Unitrends 15
 Keep software up to date
 Use virus detection and antivirus prevention
 Educated users on security protocols such
 Avoid clicking untrusted emails and attachments
 Watch out for obvious and not so obvious file
extensions
Offense: StartWith Basic Protection
© 2016 Unitrends 16
 Disable Active-X content in Microsoft offices apps
 Have firewalls block Tor, I2P and restrict ports
 Block active ransomware variants from calling home to encryption key servers
 Block binaries from running from popular ransomware installation paths
(e.g. %TEMP%)
Defense: Be Proactive with counter-measures
© 2016 Unitrends 17
Backups are Crucial
© 2016 Unitrends 18
Real World Examples
© 2016 Unitrends 19
3 copies of your data
2 different types of media
1 copy off-site
StartWith The Rule of Three
© 2016 Unitrends 20
 Backup all data on all systems – not just critical data
 Replication and Continuous Data Protection is great for low RTO/RPO but can
backup the malware with your data
 Create archives that are physically isolated from your production systems
 You can use the archive to go back in time if necessary
 Create “bare metal” images of core systems so you can get back to a known
systems state quickly
 Setup DR Services so you can spin up new VMs for critical systems while you
recover your local production systems
 Prepare NOW! Don’t wait until it too late!
Backup Best Practices: Make Sure You Never Pay
© 2016 Unitrends 21
Local
On
Premise
or
Physical
Appliance
2nd
Site
Public &
Private
Cloud
 Local backup for fast recovery
 Archiving to Cloud offsite
 Fully automated
 Can be isolated
Cloud Can Help
© 2016 Unitrends 22
 Instant Recovery Capabilities
 Be able to spin up workloads from backups in minutes while productions is
cleaned
 Ability to protect Windows, Windows Server, Apple Macs, etc.
 Linux based backup software – not Windows based
 Make sure your backups don’t get encrypted too!
DifferentiatingFeatureOf Backup Solution Against
Ransomware
© 2016 Unitrends 23
Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence
Keep Your Business Running
With Unitrends
© 2016 Unitrends 24
Re-imagineRecovery for your digital world
Unitrends Connected Continuity Platform™ brings togetherthe
industry’s leading portfolio of cloud-empoweredcontinuity services
in a single, super intuitive platform that gives you unmatched
flexibility as your business needs evolve.
Discover the power of the platform to capitalize on the potential of cloud,
reduce your overall spend on IT and gain total confidence in the recovery
point to come.
© 2016 Unitrends 25
Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence
© 2016 Unitrends 26
Protect Everything You Have
Everywhere You Need Continuity
Guaranteed Recovery and Continuity
Within a Single Intuitive Platform
Unitrends Connected Continuity Platform
© 2016 Unitrends 27
Protect Everything You Have
Protect your ideas/business
Protect Your Ideas/Business
© 2016 Unitrends 28
Everywhere you need continuity
Local
On Premise or
Physical
Appliance Virtual Appliance
/ Software
2nd Site
Public &
Private Cloud
© 2016 Unitrends 29
Recovery Assurance allows you to have absolute certainty in your
recovery
 Usable in your local environment, your DR site, or the Unitrends Cloud
 Fully automated, flexible application-aware testing
 Recover confidently from Certified Recovery Points
Guaranteed Recovery via Recover Assurance
Recovery
Assurance
© 2016 Unitrends 30
IncredibleEasy to Use UI and Automated Reports
© 2016 Unitrends 31
Transforming Continuity
On Premise All-In-One Data Protection
• Deploy as a virtual or physical backup appliance
• Adaptive inline deduplication (20 to 1 ratio)
• Instant Recovery Options for VMs and windows
• Built-in real-time replication engine
DRaaS
Spinup critical workloads in
less than 1 hour
Forever Cloud
Best value for cloud storage &
long term retentionRecovery Assurance
• Automated Backup &
DR failover testing
• Assured recovery in
the cloud & on
premise
© 2016 Unitrends 32
Scalable and Flexible
 Industry’s #1 hybrid cloud
solution
 Deployment options to fit any
environment
 All-in-one software that runs on
your hardware
Recovery Assurance
 Automated testing of backup
and DR
 100% confidence in the
recovery point to come
 RPO/RTO Actual reporting
Intuitive UI
 One simple interface
 Real time alerts and
reporting
 Enterprise
management
What Makes UnitrendsUnique
© 2016 Unitrends 33
About Unitrends
15,000+ customers globally
8,000+ registered partners globally
EBs of data protected
30PB+ of Cloud Data Managed
Industry leading 98% Customer Satisfaction
Worldwide HQ: Burlington, MA
International HQ: London, UK
Global Datacenter Presence
USA (multiple), Canada, U.K., Germany, Australia
Canada
USA (Multiple)
UK
GermanyMadrid
Sydney
© 2016 Unitrends 34
Unitrends is Redefining Recovery For Your Digital World
How can we help you protect what matters most to you?
Are you ready to never worry
about recovery again?
Can you imagine not spending
time on “backup”?
© 2016 Unitrends 35
Try Us Out – Visit www.Unitrends.com
Unitrends
Enterprise Backup
Get a free trial
7 New Rules of Recovery
Download now

Contenu connexe

Tendances

Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryBright Technology
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemClickSSL
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomwareCharles Steve
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityLai Yoong Seng
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attackskevinmass30
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomwareRaghavendra P.V
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INVijay Sarathy Rangayyan
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.marketingunitrends
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware EventArt Ocain
 
Crack the Code
Crack the CodeCrack the Code
Crack the CodeInnoTech
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatETech 7
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomwareSophos Benelux
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...SaraPia5
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions ErnestStaats
 

Tendances (20)

Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your System
 
Evolution of ransomware
Evolution of ransomwareEvolution of ransomware
Evolution of ransomware
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
WannaCry? No Thanks!
WannaCry? No Thanks!WannaCry? No Thanks!
WannaCry? No Thanks!
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Industry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacksIndustry reactions to wanna cry ransomware attacks
Industry reactions to wanna cry ransomware attacks
 
Wannacry & Petya ransomware
Wannacry & Petya ransomwareWannacry & Petya ransomware
Wannacry & Petya ransomware
 
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-INWannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
WannaCry (WannaCrypt) Ransomware - Advisory from CERT-IN
 
ITPG Secure on WannaCry
ITPG Secure on WannaCryITPG Secure on WannaCry
ITPG Secure on WannaCry
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Ransomware Detection: Don’t Pay Up. Backup.
Ransomware Detection:  Don’t Pay Up. Backup.Ransomware Detection:  Don’t Pay Up. Backup.
Ransomware Detection: Don’t Pay Up. Backup.
 
Anatomy of a Ransomware Event
Anatomy of a Ransomware EventAnatomy of a Ransomware Event
Anatomy of a Ransomware Event
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
 
IT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest ThreatIT security in 2021: Why Ransomware Is Still The Biggest Threat
IT security in 2021: Why Ransomware Is Still The Biggest Threat
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Safeguard your enterprise against ransomware
Safeguard your enterprise against ransomwareSafeguard your enterprise against ransomware
Safeguard your enterprise against ransomware
 
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
TIC-TOC: Ransomware: Help your Customers be Prepared with Dominique Singer an...
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 

En vedette

How to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicHow to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicTripwire
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and MitigationNoel Waterman
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessRobin Rafique
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro AreaSims Recycling Solutions
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Technology
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew JamesKonica Minolta
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testingTestplant
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮NSFOCUS
 
Pramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingPramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingTidemark Systems Inc.
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysPanos Kontopoulos
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterTegile Systems
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEStefanini
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITSymplified
 

En vedette (15)

How to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicHow to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware Epidemic
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area5 Reasons to Recycle in the D.C. Metro Area
5 Reasons to Recycle in the D.C. Metro Area
 
TXT Next Presentation
TXT Next Presentation TXT Next Presentation
TXT Next Presentation
 
Presence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visualesPresence Agent y Presence Scripting para personas con limitaciones visuales
Presence Agent y Presence Scripting para personas con limitaciones visuales
 
Innovation In The Workplace Andrew James
Innovation In The Workplace   Andrew JamesInnovation In The Workplace   Andrew James
Innovation In The Workplace Andrew James
 
Getting started with performance testing
Getting started with performance testingGetting started with performance testing
Getting started with performance testing
 
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮Rsa2012 下一代安全的战略思考-绿盟科技赵粮
Rsa2012 下一代安全的战略思考-绿盟科技赵粮
 
Pramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social SharingPramata Tech Dinosaurs ePaper - Social Sharing
Pramata Tech Dinosaurs ePaper - Social Sharing
 
Top 10 Business Continuity Disasters
Top 10 Business Continuity DisastersTop 10 Business Continuity Disasters
Top 10 Business Continuity Disasters
 
Wedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDaysWedia Social Media presentation at DigitalDays
Wedia Social Media presentation at DigitalDays
 
Why Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenterWhy Consider #FlashStorage in your #DataCenter
Why Consider #FlashStorage in your #DataCenter
 
Visual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDEVisual Studio 2013 - Recursos da IDE
Visual Studio 2013 - Recursos da IDE
 
New Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & ITNew Research: Cloud, Cost & Complexity Impact IAM & IT
New Research: Cloud, Cost & Complexity Impact IAM & IT
 

Similaire à Ransomware Protection with Unitrends Backup

How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomwaremarketingunitrends
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to usPeter Wood
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?marketingunitrends
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinarmarketingunitrends
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First marketingunitrends
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomwaremarketingunitrends
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointingmarketingunitrends
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Netgear Italia
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastDiana Frolova
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationHostway|HOSTING
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůMarketingArrowECS_CZ
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery SolutionsManuel Daza
 

Similaire à Ransomware Protection with Unitrends Backup (20)

How to Take the Ransom Out of Ransomware
How to Take the Ransom Out of RansomwareHow to Take the Ransom Out of Ransomware
How to Take the Ransom Out of Ransomware
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
All your files now belong to us
All your files now belong to usAll your files now belong to us
All your files now belong to us
 
Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?Is Your Use of Windows Backup Opening the Door to Hackers?
Is Your Use of Windows Backup Opening the Door to Hackers?
 
The 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery WebinarThe 7 New Rules of Recovery Webinar
The 7 New Rules of Recovery Webinar
 
Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First Haunted by Your Backup Renewal: 4 Questions to Ask First
Haunted by Your Backup Renewal: 4 Questions to Ask First
 
Tech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of RansomwareTech Demo: Take the Ransom Out of Ransomware
Tech Demo: Take the Ransom Out of Ransomware
 
Panda Security - Endpoint Protection
Panda Security - Endpoint ProtectionPanda Security - Endpoint Protection
Panda Security - Endpoint Protection
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Death, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger PointingDeath, Taxes and Backup Vendor Finger Pointing
Death, Taxes and Backup Vendor Finger Pointing
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
Webinar NETGEAR - Acronis e Netgear per la protezione dei dati - le novità di...
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
Ransomware: Mitigation Through Preparation
Ransomware: Mitigation Through PreparationRansomware: Mitigation Through Preparation
Ransomware: Mitigation Through Preparation
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Understanding the Cloud
Understanding the CloudUnderstanding the Cloud
Understanding the Cloud
 
Novosco ransomware webinar presentation
Novosco ransomware webinar presentationNovosco ransomware webinar presentation
Novosco ransomware webinar presentation
 
Disaster Recovery Solutions
Disaster Recovery SolutionsDisaster Recovery Solutions
Disaster Recovery Solutions
 

Dernier

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 

Dernier (20)

GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 

Ransomware Protection with Unitrends Backup

  • 1. © 2016 Unitrends 1 Uni* r Take the Ransom Out of Ransomware
  • 3. © 2016 Unitrends 3 "To be honest, we often advise people just to pay the ransom." Joseph Bonavolonta,Asst. Special Agent, FBI Cybercrime Boston Division
  • 4. © 2016 Unitrends 4 What is Ransomware?
  • 5. © 2016 Unitrends 5  Encrypts victims files with strong unbreakable encryption  Demands payment for private key to unlock data  Payment typically around $200 to $500 in bitcoins Ransomware Malware
  • 6. © 2016 Unitrends 6  Ransomware is not new  Recent advances have made it a much larger risk  Early ransomware was “scareware” and “nagware”  Didn’t permanently lock files.  Was easily removed or avoided  Criminals had difficulty in collecting fees anonymously  Hacker community not as organized Long History of Ransomware
  • 7. © 2016 Unitrends 7 A Growing Menace
  • 8. © 2016 Unitrends 8  Cryptolocker  TorrentLocker  CryptoWall  CBT-Locker  TeslaCrypt  Locky  Etc. Many Variations and Copycats
  • 9. © 2016 Unitrends 9 Popular Tools of RansomwareVariants Anonymity Online Electronic Payment Unbreakable Encryption • AES • RSA • “Curve” ECC Network to C&C Server • Tor • I2P • POST/HTTPS • Hardcoded URLs
  • 10. © 2016 Unitrends 10 Requires both Public and PrivateKey
  • 11. © 2016 Unitrends 11  Spam Email Campaigns  CBT Locker & Torrent Locker preferred vector  Requires interaction from user  Can affect fully patched systems  Exploit Kits  CryptoWall and TelsaCrypt preferred vector  Does not require any interaction  Uses vulnerable installed software Infection Vectors BOTH ARE HIGHLY EFFECTIVE WAYS INTO YOUR SYSTEMS
  • 12. © 2016 Unitrends 12 Get 1 Free Macs vulnerable Voice Enabled Highly Localized Ransomware Continuing to Advance
  • 13. © 2016 Unitrends 13 How does an enterprise make sure they never have to pay?
  • 14. © 2016 Unitrends 14 Play Defense Play Offense Don’t forget about your backup players
  • 15. © 2016 Unitrends 15  Keep software up to date  Use virus detection and antivirus prevention  Educated users on security protocols such  Avoid clicking untrusted emails and attachments  Watch out for obvious and not so obvious file extensions Offense: StartWith Basic Protection
  • 16. © 2016 Unitrends 16  Disable Active-X content in Microsoft offices apps  Have firewalls block Tor, I2P and restrict ports  Block active ransomware variants from calling home to encryption key servers  Block binaries from running from popular ransomware installation paths (e.g. %TEMP%) Defense: Be Proactive with counter-measures
  • 17. © 2016 Unitrends 17 Backups are Crucial
  • 18. © 2016 Unitrends 18 Real World Examples
  • 19. © 2016 Unitrends 19 3 copies of your data 2 different types of media 1 copy off-site StartWith The Rule of Three
  • 20. © 2016 Unitrends 20  Backup all data on all systems – not just critical data  Replication and Continuous Data Protection is great for low RTO/RPO but can backup the malware with your data  Create archives that are physically isolated from your production systems  You can use the archive to go back in time if necessary  Create “bare metal” images of core systems so you can get back to a known systems state quickly  Setup DR Services so you can spin up new VMs for critical systems while you recover your local production systems  Prepare NOW! Don’t wait until it too late! Backup Best Practices: Make Sure You Never Pay
  • 21. © 2016 Unitrends 21 Local On Premise or Physical Appliance 2nd Site Public & Private Cloud  Local backup for fast recovery  Archiving to Cloud offsite  Fully automated  Can be isolated Cloud Can Help
  • 22. © 2016 Unitrends 22  Instant Recovery Capabilities  Be able to spin up workloads from backups in minutes while productions is cleaned  Ability to protect Windows, Windows Server, Apple Macs, etc.  Linux based backup software – not Windows based  Make sure your backups don’t get encrypted too! DifferentiatingFeatureOf Backup Solution Against Ransomware
  • 23. © 2016 Unitrends 23 Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence Keep Your Business Running With Unitrends
  • 24. © 2016 Unitrends 24 Re-imagineRecovery for your digital world Unitrends Connected Continuity Platform™ brings togetherthe industry’s leading portfolio of cloud-empoweredcontinuity services in a single, super intuitive platform that gives you unmatched flexibility as your business needs evolve. Discover the power of the platform to capitalize on the potential of cloud, reduce your overall spend on IT and gain total confidence in the recovery point to come.
  • 25. © 2016 Unitrends 25 Unitrendscloud-empowered all-in-onecontinuitysolutionsincrease yourITconfidence
  • 26. © 2016 Unitrends 26 Protect Everything You Have Everywhere You Need Continuity Guaranteed Recovery and Continuity Within a Single Intuitive Platform Unitrends Connected Continuity Platform
  • 27. © 2016 Unitrends 27 Protect Everything You Have Protect your ideas/business Protect Your Ideas/Business
  • 28. © 2016 Unitrends 28 Everywhere you need continuity Local On Premise or Physical Appliance Virtual Appliance / Software 2nd Site Public & Private Cloud
  • 29. © 2016 Unitrends 29 Recovery Assurance allows you to have absolute certainty in your recovery  Usable in your local environment, your DR site, or the Unitrends Cloud  Fully automated, flexible application-aware testing  Recover confidently from Certified Recovery Points Guaranteed Recovery via Recover Assurance Recovery Assurance
  • 30. © 2016 Unitrends 30 IncredibleEasy to Use UI and Automated Reports
  • 31. © 2016 Unitrends 31 Transforming Continuity On Premise All-In-One Data Protection • Deploy as a virtual or physical backup appliance • Adaptive inline deduplication (20 to 1 ratio) • Instant Recovery Options for VMs and windows • Built-in real-time replication engine DRaaS Spinup critical workloads in less than 1 hour Forever Cloud Best value for cloud storage & long term retentionRecovery Assurance • Automated Backup & DR failover testing • Assured recovery in the cloud & on premise
  • 32. © 2016 Unitrends 32 Scalable and Flexible  Industry’s #1 hybrid cloud solution  Deployment options to fit any environment  All-in-one software that runs on your hardware Recovery Assurance  Automated testing of backup and DR  100% confidence in the recovery point to come  RPO/RTO Actual reporting Intuitive UI  One simple interface  Real time alerts and reporting  Enterprise management What Makes UnitrendsUnique
  • 33. © 2016 Unitrends 33 About Unitrends 15,000+ customers globally 8,000+ registered partners globally EBs of data protected 30PB+ of Cloud Data Managed Industry leading 98% Customer Satisfaction Worldwide HQ: Burlington, MA International HQ: London, UK Global Datacenter Presence USA (multiple), Canada, U.K., Germany, Australia Canada USA (Multiple) UK GermanyMadrid Sydney
  • 34. © 2016 Unitrends 34 Unitrends is Redefining Recovery For Your Digital World How can we help you protect what matters most to you? Are you ready to never worry about recovery again? Can you imagine not spending time on “backup”?
  • 35. © 2016 Unitrends 35 Try Us Out – Visit www.Unitrends.com Unitrends Enterprise Backup Get a free trial 7 New Rules of Recovery Download now