How Safe are Your Computer Files Against Attackers?

Sending
User Review
0 (0 votes)

Even those fortunate enough not to have first-hand experience knows someone who has been troubled by ransomware. The common attack involves an email which at first glance appears to be legit and sent from a known contact. The user is duped into opening email attachments or visiting malicious links that snuck through email filters. From there, the system is compromised, and the virus works to encrypt files on the server, and y our data is held for ransom.

How would you deal with the threat that is continuously evolving, considering mitigation strategies like virus protection and link scanning will never be completely effective? There is a solution – are you ready! Expect that it will happen and be ready for it when it does.

CLOUD – The best protection 

If you have not yet embraced the cloud, changing how you work will provide a huge step. Modernized environments are effectively immune to ransomware. For example, cloud storage like SharePoint Online and OneDrive aren’t typically targeted because these services naturally provide file versioning, so retrieving a ransomed file is a trivial rollback effort.  Ransomware authors are looking for files that are stored locally without backups, or stored on network shares, which may have had backups at one time, (but is anyone monitoring them?)

Moving to the Crestwood CloudFor Crestwood Cloud clients, effective threat mitigation on our cloud servers is included in our service. We provide this through our backup process. It is entirely separate from the virtual machine itself, so it’s not possible for the backups to be compromised by the same attack that affected the virtual machine, potentially going back and corrupting previous backups (contrast with SQL backups saved to the server – effective ransomware should be expect to encrypt all those backups).  We can easily restore any virtual machine to a point before the attack, no matter how much damage was done during the infection. Because of this, our environments are immune to ransomware.

If you take steps ahead of time and think in terms of “when” not “if” the statement above may not be as bold as you think. The prevalence of ransomware is really only a testament to how many organizations neglect their disaster recovery. Learn more about how easy it is to protect yourself from computer threats with the Crestwood Cloud.

Ready for the cloud?  For pricing and more information, contact a cloud expert at sales@crestwood.com.

Leave a Reply