backup - All Articles - CISO Platform2024-03-29T11:52:03Zhttps://www.cisoplatform.com/profiles/blogs/feed/tag/backupBest ploy against Ransomware : A Perfect Backup Planhttps://www.cisoplatform.com/profiles/blogs/best-ploy-against-ransomware-a-perfect-backup-plan2017-02-17T08:00:00.000Z2017-02-17T08:00:00.000ZAmit Jaokarhttps://www.cisoplatform.com/members/AmitJaokar797<div><p>Last year, cybercriminals attacked the California-based Hollywood Presbyterian Medical Center, encrypting files crucial in running the hospital’s operating systems and demanding a ransome to restore them to working order. The scam worked – after 10 days of futility, the hospital surrendered and paid $17,000 to regain system control.</p><p><a href="http://www.cisoplatform.com/profiles/blogs/best-ploy-against-ransomware-a-perfect-backup-plan" target="_blank"><img width="750" src="{{#staticFileLink}}8669806685,original{{/staticFileLink}}" class="align-full" height="369" alt="8669806685?profile=original" /></a></p><p></p><p>Other hospitals, government agencies and businesses in the U.S. and abroad were targeted similarly last year, leading CNET to dub such ransomware scenarios as the hot hacking trend of 2016 And the numbers are truly staggering. Osterman Research estimates that nearly half of surveyed organizations have been hit with ransomware within the last year, and concludes that ransomware will amount to a $1 billion source of income for cyber criminals in 2016. In a recent report, Kaspersky Security states that in Q3 2016, a business was attacked by ransomware every 40 seconds, and that even after paying the ransom, one in five of them never got their data back.</p><p><span id="docs-internal-guid-6d6c1bfa-4b22-9434-ff3b-da6c4d383756"><span>( Read More:</span> <span><a href="http://www.cisoplatform.com/profiles/blogs/security-metrics-and-dashboard-for-the-ceo-board">Information Security Metrics And Dashboard For The CEO / Board</a> )</span><a href="http://www.cisoplatform.com/profiles/blogs/security-metrics-and-dashboard-for-the-ceo-board"><span><br class="kix-line-break" /></span></a></span></p><p></p><p></p><p></p><p> </p><p><span class="font-size-5"><b>Apple Users Now a Target<br /></b></span></p><p>But while many ransomware instances go unreported due to embarrassment or the desire to not be targeted again, the attacks were thought to be largely focused on the Microsoft Windows software realm, leaving Apple users relatively unscathed. But that changed in 2016 when the first public ransomware targeting Apple systems was discovered by Palo Alto Networks, which found a popular BitTorrent client for Apple’s OS X software for Macs infected with ransomware. Known as “KeRanger,” the ransomware is delivered with a ransom note demanding 1 Bitcoin, which has a current market value over $700. Fixing the problem can also be complicated and time consuming.</p><p>Antivirus software also isn’t having an impact; by the time a computer is infected with ransomware, it’s likely that the antivirus software won’t detect it until it’s too late and the damage has been done. The encryption used by modern ransomware is often too good to crack, leading most security experts to conclude that the best approach to fighting ransomware is to avoid it in the first place.</p><p><span id="docs-internal-guid-6d6c1bfa-4b24-2a9e-9034-b23d4041052b"><span>( Read More:</span> <span><a href="http://www.cisoplatform.com/profiles/blogs/checklist-to-evaluate-siem-vendors">Checklist To Evaluate SIEM Vendors</a> )</span></span></p><p></p><p></p><p> </p><p><span class="font-size-5"><b>Different Backup Approaches</b></span></p><p>It seems the most effective way for Apple users to safeguard their computer files from these nefarious attacks is through regular backups. And, in the event you are hit with ransomware, the solution would lie in simply restoring your system to the state it was before the malware hit your computer. There are several backup and restore approaches to consider for the Apple environment:</p><ul><li><strong>Time Machine</strong> is the backup software application distributed with the Apple operating system, introduced in Mac OS X Leopard. It was designed to work with various storage drives such as Time Capsule. But for Time Machine to be effective, files must be unlocked or closed, which may not be practical for those currently in use. In addition, there is the possibility of a two-step process within OS X that requires users to reinstall the operating system before retrieving the application and files from the backup image.</li><li><strong>File System Snapshots </strong>simplify backup and recovery by taking a point-in-time virtual file system photo. But while this method can be employed to protect active operating systems, depending on files sizes, it can take significantly more time.</li><li><strong>Disk Management Solutions</strong> can create image-based copies of a disk or partition (or multiple disks and partitions) whether active or inactive, at a specific point in time far more quickly. Such robust offerings have the advantage of being able to make consistent sector-level backups (also often referred to as Snapshots) even if data is being currently modified.</li></ul><p> </p><p>Thus, while there are different backup approaches to consider, the bottom line is that a regular, proactive backup strategy – potentially even a multi-pronged approach – is your best defense against crippling ransomware attacks. And while Apple users were once immune from such attacks, they too now need to join the rest of the computer world in being vigilant in protecting themselves. After all, like many things in life, when it comes to avoiding being held hostage by cybercriminals, an ounce of prevention is worth a pound of cure.</p><p></p><p></p><p></p><p><a href="http://www.cisoplatform.com/profiles/blogs/nominations-open-top-100-ciso-awards-2017" target="_blank"><img width="684" src="{{#staticFileLink}}8669810872,original{{/staticFileLink}}" class="align-center" alt="8669810872?profile=original" /></a></p><p> </p></div>NAKIVO Releases Backup & Replication v9.1 Including Data Protectionhttps://www.cisoplatform.com/profiles/blogs/nakivo-releases-backup-amp-replication-v9-1-including-data2020-01-25T02:30:00.000Z2020-01-25T02:30:00.000Zjaideep khandujahttps://www.cisoplatform.com/members/jaideepkhanduja266<div><p>NAKIVO releases its much-awaited Backup & Replication solution v9.1. The new release takes data protection to a new level. The backup functionality extends to the untouched zones. The new release adds support for backup to tape and Linux Server Backup. This would bring a sigh of relief to a large number of enterprises seeking this functionality for a long time. With the release of v9.1, the data protection touches a new height as the new functions include native backup to tape, physical Linux server backup, physical workstation backup, and instant verifications & validations. Nakivo Inc. is a fastly growing software company engaged in protecting virtualized and cloud environments.</p><p>The new features are quite exciting extending the solution’s platform coverage. These key features now ensure an enterprise to cover its complete backup and replication requirements. That means having this solution means holistic data protection for an enterprise.</p><p>Native Backup to Tape means the backups will now be more reliable and cost-effective. As we all know that tape backup is one of the most reliable and cost-effective solutions for long term data retention even today. That means NAKIVO Backup & Replication v9.1 delivers a comprehensive tape management solution. It supports LTO 3 and later tape libraries, AWS VTL, and standalone tape drives. The new solution also covers enterprise-grade tape backup functionalities that include tape device management, tape cartridge management, and tape backup management. Enterprises using NAKIVO Backup & Replication v9.1 can now track all tape cartridges, their content, location, and status. Customers will be able to browse, search, and filter all tape backups. Also, they can see what cartridges are needed for the restoration of a machine to a particular point in time, and so on.</p><p>Physical Linux Server Backup can easily happen with NAKIVO Backup & Replication v9.1. This would include virtual, physical, and cloud servers. So, whether it is Vmware, Hyper-V, or Nutanix AHV in a virtual environment, or physical Windows Server, or AWS EC2 cloud servers, it is all included in v9.1. The best part is its proprietary change tracking technology that helps not only in performing incremental backups of Linux servers but also in improving backup performance and thus lowering storage needs. Recovery of files, folders, and application objects becomes easier as it happens directly from compressed and deduplicated backups. Physical Linux Server machines can now be recovered to Vmware and Hyper-C VMs.</p><p>Physical Workstation Backup has become an utmost important necessity for enterprises with an increase in edge computing. NAKIVO Backup & Replication v9.1 backs up physical Windows workstations comprehensively. Backups remain incremental and compression and deduplication can happen in automatic mode. Files and folders can be recovered from workstation backups as and when needed. Here also, the backups and be restored to Vmware and Hyper-V VMs.</p><p>Instant Verification can do many things instantly and intelligently. For instance, it can recover a VM from its backup. It can also boot a VM replica with networking turned off while checking the OS heartbeat with the help of VMware Tools or Hyper-V Integration services. Instant verification also ensures that backups can be successfully recovered.</p><p>Bruce Talley, CEO, NAKIVO Inc. says,</p><blockquote><p>“NAKIVO Backup & Replication v9.1 goes a step further in protecting business-critical data and applications. Our customers can now protect their virtual, physical, and cloud environments with a single product while improving reliability and extending recovery options.”</p></blockquote><p></p><p><strong>RESOURCES</strong><br /> Trial Download: <a href="https://www.nakivo.com/resources/download/trial-download/" target="_blank">/resources/download/trial-download/</a><br /> Datasheet: <a href="https://itknowledgeexchange.techtarget.com/www.nakivo.com/res/files/v9.1_datasheet_EN.pdf" target="_blank">https:/www.nakivo.com/res/files/v9.1_datasheet_EN.pdf</a><br /> Success Stories: <a href="https://www.nakivo.com/customers/success-stories/" target="_blank">/customers/success-stories/</a></p></div>