- Managed firewalls
- Virus-catching email filters
- Incremental backups for greater recovery options
Protect your business
from ransomware attacks
Ransomware attacks are on the rise. Each attack has unique features, but they all have two things in common:
1. The difference between a slowdown and a devastating shutdown is multi-layered monitoring.
2. The only way to guarantee the complete and safe recovery of all data is constant secure data backup.
What Happens During a Typical Ransomware Attack
First, the virus enters your system through an email attachment, website link, or infected data stick. These aren’t the obvious sort of bad links and attachments that you warn your granny about. They are very hard to identify as nefarious. The virus can also enter through security vulnerabilities in your browser (which is why you should always install all suggested security patches.)
Next, the virus sends as much information about your systems as it can to the hackers who created it. They use this information to create an encryption key, which they send back to the virus on your computer — or your entire network.
Finally, once back in your system, the encryption key does one of these three things:
1. Encrypts individual files and folders and demands payments when you try to open them.
2. Freezes your screen with their payment demand.
3. Interrupts the Master Boot Record (a section of the computer’s hard drive that allows the operating system to boot up) and shows a payment demand on the screen.
The HIPAA-HITECH Backup Requirements
Remember when we said that the only way to guarantee the complete and safe recovery of all data is >constant secure data backup? If you have a health care business, you have to have this kind of backup anyway, in order to meet HIPAA-HITECH requirements. According to these rules, your data must be:
- Backed up off-site
- Encrypted during transfer
- Encrypted or destroyed at rest
- Retrievable in its original form
How To Protect Your Data
CMIT Solutions of Gilbert and Mesa will install a network defense system, monitor your computers and servers, implement the backup solution that’s right for you, and regularly test the restoration process. This is the best way to prevent and recover from a ransomware attack.