Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Don’t Let Malicious Software Hold Your Data for Ransom

    By
    Darryl K. Taft
    -
    June 23, 2016
    Share
    Facebook
    Twitter
    Linkedin

      PrevNext

      1Don’t Let Malicious Software Hold Your Data for Ransom

      1 - Don't Let Malicious Software Hold Your Data for Ransom

      Ransomware is a growing threat, but a simple solution exists to thwart attackers: effective backup. Here we offer tips for an effective backup plan.

      2Protect Distributed Data

      2 - Protect Distributed Data

      Ensure you have an enterprise-grade automated backup solution as an insurance policy in case of an intrusion such as a ransomware strike occurs. Constant, automated backups across devices and desktops in remote locations of your organization provide a secondary store of data as a fallback mechanism in the event of a malicious attack. If you don’t already have a backup solution in place, this step alone offers not only backup and peace of mind, but also information governance. Having a cloud-based backup solution provides offsite storage—and peace of mind.

      3Back Up Distributed Data

      3 - Back Up Distributed Data

      If your teams are distributed across regions, make sure that your current backup policy covers 100 percent of your user base. Review and validate the deployment scope of your current backup plan to ensure that your chosen backup solution is deployed automatically to all end users. At the very least, you should ensure key users are covered by your data protection policy.

      4Know the Scope of Your Data Backup

      4 - Know the Scope of Your Data Backup

      Be sure to know exactly what your backup plan includes. Outside of protecting desktops and email, does your plan include user profiles, user-specific system and app settings or user-created custom folders? You should review, validate and, if needed, modify backup content to ensure that all important data for protected users is being backed up. This may require the expansion of the scope of your backup plan.

      5Reassess How Frequently Distributed Data is Being Backed Up

      5 - Reassess How Frequently Distributed Data is Being Backed Up

      Review, validate and modify backup frequency, if necessary, to ensure automated, periodic backup for all protected users. As a general rule, it is highly recommended that backups occur at minimum of once every four hours, and every two hours for key users.

      6Validate Your Retention Policy

      6 - Validate Your Retention Policy

      How long are you keeping your backups: 14 days? Seven weeks? Six months? Review and validate your retention policy to ensure a sufficient recovery point objective (RPO). This may vary depending on your particular industry and regulations, and internal IT policies. IT, legal and compliance teams will make the call on data retention needs.

      7Reassess Policies Periodically

      7 - Reassess Policies Periodically

      While these measures may be sufficient protection for the foreseeable future, revisit your backup policies periodically (approximately once every six months) to ensure they are aligned with your organization’s requirements. IT often has the primary responsibility for this routine, and in some cases acts in coordination with the legal team.

      PrevNext
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×