I t’s a casual weekday at work and, armed with a steaming cup of coffee, you tuck, dip, and juke your way past coworkers to avoid spilling the contents of that 12 oz. mug. As you make your way back to your desk, a quick glance at your inbox reveals emails from a slightly familiar sounding domain. At this critical moment, you let down your guard and click on its simplistic message, giving hackers access to your system. An eruption of swearwords follows as you realize what has happened and accidentally knock over that coffee.
Like a clown beckoning a child over from inside a storm drain, these sophisticated cyberattacks bait users with phishing emails that seek to gain access to your system by getting you to click on an attachment with a subtly suspicious file name. In their recent blog, IT Security experts from Barracuda Advanced Technology Group first reported on the latest attacks that are using the Locky variant. At least 20 million attacks have been confirmed in the last 24 hours. Hackers are coordinating attacks to coincide with work hours and sending two variants of ransomware to increase the likelihood of infection, catching hapless users off guard. Locky also has the capacity to change to a different form, known as FakeGlobe, forcing victims to potentially pay for both infections.
Fortunately, for the world of IT, Quantum and Veeam have devised a means to combat ransomware. Quantum has made its mark on storage technology by pioneering the LTO tape technology, while Veeam demonstrates its prowess as an efficient and effective backup software provider, winning the 2017 Gartner Magic Quadrant for Data Center Backup and Recovery. In a recent blog post, Veeam addresses the reality of ransomware both in Linux and Windows systems, and highlights the importance of backup files on different media to secure a backup plan.
Quantum and Veeam have partnered to provide a time-tested solution against ransomware and human error. Quantum’s DXi® appliances integrate with Veeam’s Data Mover Service to give users advanced features like instant VM recovery and synthetic full backups that can be run directly on the DXi. The Scalar tape includes an embedded blade server that runs a Veeam proxy server, enabling users to create tape without a physical server and providing a defense against ransomware. The strategy leveraging these features is the 3-2-1 Data Protection strategy.
3-2-1 Data Protection can be broken down as follows:
- 3 copies of your data
- 2 different types of media (tape, disk, and deduplication)
- 1 air-gapped copy (offline and off site)
What makes this strategy efficient is the diversity of where the data is stored. And as a last line of defense, the cheap and portable method of tape provides an offline copy that guarantees protection from hackers.
Additional ransomware resources:
Look at the latest Quantum Scalar® iBlade™ integration with Veeam, allowing you to integrate tape in your Veeam environment without a physical server.
Click here to read the rest of this post.