According to the latest briefing report from Beazley, ransomware remains the top cyber security threat for businesses. Cases reported by their clients in 2019 is up 131% on 2018.
How well is your business protected from ransomware attacks. Well, these businesses thought they were protected.
Since 2017, ransomware has been evolving and hackers realised that in order to get organisations to pay the ransom they also needed to disrupt backup and recovery processes.
The latest variations of ransomware aim to take advantage of the time it takes for an organisation to identify a breach - usually 190 days!
The ransomware relies on an unwitting employee letting it in and not spotting the breach. It waits for a period of time and then activates.
Put simply, an Attack Loop means you cannot restore your data. As the ransomware lay dormant, it infected, or encrypted, all copies of your backup so you no longer have a clean version to restore from. The Attack Loop starts as soon as you try to recover your data.
The best approach to this is to embed cyber security software inside the backup software, that scans for malware during backups and recoveries. Asigra’s Cloud Backup does exactly this and that is why Proxima recommends Asigra.
The best approach to this is to embed cyber security software inside the backup software that scans for malware during backups and recoveries. Asigra’s Cloud Backup does exactly this and that is why Proxima recommends Asigra and why we partner with Data2Vault to provide you with a managed service.
The Attack Loop service offers three layers of protection against the threat of ransomware infection, the most comprehensive approach available today ...