Intelligent CIO North America Issue 12 | Page 35

EDITOR ’ S QUESTION

Our advice to customers that are building their ransomware survival kit is that it is critically important to have the strategy , policies and tools in place to both avoid ransomware attacks , as well as to recover – quickly , efficiently , affordably and completely .

Ransomware continues to evolve and become increasingly intelligent and ruthless , employing such capabilities as watching for cloud account credentials , deleting backups and cloud storage , and then encrypting everything and demanding a ransom .
One needs only to read today ’ s news to know that no matter the size , location or industry of your organization the likelihood of getting targeted by bad actors is more likely than not .
This is due to the fact that for those that are not thoroughly armed with both protection and recovery capabilities , ‘ the business model works spectacularly for the criminals ’ as Joseph Blount , the Colonial Pipeline CEO , explained recently when discussing the cyberattack that would ultimately cost his company tens of millions of dollars .
Indeed , ransomware continues to evolve and become increasingly intelligent and ruthless , employing such capabilities as watching for cloud account credentials , deleting backups and cloud storage , and then encrypting everything and demanding a ransom . The right backup however , can be an organization ’ s ransomware recovery panacea .
Today , many of the major cloud providers support object locking , also referred to as Write-Once-Read- Many ( WORM ) storage or immutable storage .
Users can mark objects as locked for a designated period of time , preventing them from being deleted or altered by any user .
Our advice is to find a backup solution that has been engineered to integrate seamlessly with this new object lock feature to create immutable backups .
Users can set a retention period for immutable backups stored on supporting cloud platforms .
Within this immutable retention period , backups cannot be deleted by any user , even if ransomware or a malicious actor acquires the root credentials .
In addition , the backup should provide powerful policy-based scheduling that allows it to predict when those backups will leave the retention policy and protect any files that will no longer be retained , ensuring businesses always have point-in-time backups to restore within the immutable retention policy window . p
The right backup however , can be an organization ’ s ransomware recovery panacea .
JG HEITHCOCK , GM , RETROSPECT
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 35