Ransomware has been a threat for some years now, but over the pandemic the dangers went into overdrive. According to threat hunting and intelligence firm Group-IB, ransomware attacks grew by 150% in 2020, with the average demand having risen to a whopping £120,000 ($170,000). There has been a huge amount of talk about the revelation that working from home is more productive than expected. But it has also presented fresh opportunities for cyber criminals.
Employees in the office work on a network that is protected from the wider internet by a firewall, using systems provided by their company that have been locked down by systems administrators. A standard, tried-and-tested company security package will have been installed, and the IT department will have full control over the rollout of patches and updates that ensure any weaknesses discovered are removed as soon as possible.
But once people started to work predominantly from home during the COVID-19 pandemic, most of these protections evaporated. Cyber criminals realised this almost immediately and saw that COVID itself would provide a strong theme for phishing emails that play on our virus anxiety. Remote employees might be using a corporate system at home, which could still be part of a software update regime, but many will not be. A large number will be using their own home systems with an unspecified level of protection. Even if corporate guidelines are to install security software and use VPNs, employees may not do so on their own systems. They may not even know how.
Likewise, their internet connection will probably be domestic broadband delivered through a consumer-grade router. This may have a firewall built in, but the protective ability it provides will vary greatly and will also depend on the home worker’s ability to configure their router’s firewall optimally. All these things make those working from home during COVID exceptionally vulnerable to ransomware.
Preventative measures can only go so far and will never be as effective as what is possible with on-premises systems – which were not exactly impregnable. There have been many high-profile ransomware attacks on corporate networks, and probably many more that have gone unreported. Fortunately, companies can take steps to mitigate against the damage when a ransomware attack does occur, which can be applied to remote workers just as easily as in the office.
Safeguard with Synology Active Backup for Business
One of the strongest defences a company has against ransomware attacks is a consistent backup regime of all its systems. Again, for on-premise workers this is much easier to achieve than for remote workers. It is possible to implement cloud-based backup for remote workers, but the licensing and storage costs for this can rapidly become prohibitive for a large extended deployment of working from home, and even more so if employees use more than one device.
Instead, Synology’s Active Backup for Business can provide backup for both physical and virtual environments. It can secure files, entire systems, and virtual machines, then rapidly restore them when required. Best of all, with compatible Synology Network Attached Storage devices, Active Backup for Business is completely free of licensing, so as many endpoints can be backed up as desired, as often as you like. This includes unlimited Windows endpoints, VMware and Hyper-V virtual machines, and file servers, with no additional cost per endpoint.
The regular, automated backup and rapid restore minimises downtime in the event of a cyber breach. This helps achieve business continuity for greater employee and customer peace of mind. It is particularly important when dealing with remote workers that setting up a backup regime be as painless and uncomplicated as possible. The light-touch approach to deployment implemented by Active Backup for Business entails just a few clicks to enable on a Synology NAS, after which it will begin working behind the scenes.
The value of Synology NAS storage
Ransomware has become increasingly sophisticated. The payload will often be introduced to infected systems up to a year before activation. This means that companies cannot just rely on having a few recent backups. It may be necessary to keep backups over an extended period of many months. So having a solid regime of regular incremental backups and archiving is essential. This will involve a greater amount of storage, but a Synology NAS will provide a very reasonable cost per gigabyte of storage. The efficient use of this storage via de-duping while achieving full data protection provides the best possible security for the capital outlay on capacity.
Backup is not just there to guard against ransomware. It is also there to protect data from the physical theft of the devices it is stored on. Although remote employees can keep their own systems backed up via a local Synology NAS, maintaining backups on the same physical site as the systems being backed up is another point of weakness. Synology Active Backup for Business can seamlessly create a secondary snapshot on another remote NAS held elsewhere, for additional protection.
Ransomware attacks can cause huge corporate destruction, and they are likely to remain frequent in the new post-COVID era of increased working from home. But by making a consistent data security regime using Synology Active Backup for Business an integral part of the corporate IT strategy, disaster recovery can become disaster avoidance. That way, companies can carry on working quickly even if a breach does occur, with minimal downtime.
Consumer choice and the payment experience
A software provider’s guide to getting, growing, and keeping customers
Prevent fraud and phishing attacks with DMARC
How to use domain-based message authentication, reporting, and conformance for email security
Business in the new economy landscape
How we coped with 2020 and looking ahead to a brighter 2021
How to increase cyber resilience within your organisation
Cyber resilience for dummies
See the original article here: ITPro