itb-nz logo
Story image

StorageCraft report suggests firms need a 'ransomware reality check'

12 Dec 2019

It’s time for a ‘ransomware reality check’, because having a recovery plan and actually making sure it works are two entirely different things.

A recent survey of 700 companies in Australia, France, Germany, North America, and the UK found that 68% of respondents have a ransomware recovery plan, yet almost a quarter (23%) don’t test those plans, and 46% test them once a year or less.

The research shows that having a plan just is not enough, suggests StorageCraft vice president of marketing and product management, Shridar Subramanian.

 “Even though ransomware continues to be a scourge on business, with a reported 118% increase of incidents in the first quarter of this year alone, our research shows too many organisations are ill-prepared to protect against it. They must take a reality check and assess and test their ability to protect and recover from a ransomware attack.”

Research results also found that an overwhelming 86% of respondents confirmed they suffered data loss in the past year, with over a quarter (27%) suffering data loss in the last six months.

The research also uncovered issues around the budget and complexity of IT infrastructure, which will add to the challenge of ransomware preparedness.

Almost half (46%) say they don’t have the budget to manage their data and recover from a failure adequately.

However, 49% of respondents reported they have between 3 and 5 different types of systems to manage and protect data. Thirty-three percent have six or more different types of systems.

StorageCraft recommends that organisations assess and test their plans for ransomware prevention, remediation, and recovery.

Critical elements of a successful plan for ransomware remediation and recovery include:

Immutable Snapshots: To ensure unstructured data can be recovered, companies should protect their information with continuous immutable snapshots. Data captured this way is ‘frozen’ and cannot be overwritten or deleted by ransomware attackers. This ensures an organisation can revert to a secure set of data.

Orchestration: A successful recovery process requires that business-critical data and applications are prioritized. Companies using cloud-based recovery should pre-determine the order in which their data and applications will be recovered. This ‘orchestration’ ensures minimal downtime, once data recovery begins.

Immediate Recovery: Considering one minute of downtime costs $5,600 according to industry analyst firm Gartner, the speed of recovery following a ransomware attack is a crucial element of the remediation and recovery process.

Failback: After a successful cloud-based recovery, the last step in remediating a ransomware infection is returning the data infrastructure to its original location and resuming operations as usual. The planned failback process should have a minimal impact on production applications to minimise any additional downtime and adverse effect on the business.

Link image
Businesses ditch legacy systems for cloud-based communications
There are five good reasons why embracing cloud-based communications and collaboration is a business priorityWatch Now
Story image
Competing in the digital era: delivering better services with SD-WAN
The cause of many of the delays and connectivity issues experienced by end-users is the need to backhaul internet traffic. SD-WAN can help with that, writes Vertel commercial director Tony Hudson.More
Story image
AI in the finance sector - and how it will revolutionise banking
With the bar to success set so much higher amid lockdowns, innovation is almost essential, and one of the clearest paths to innovating a business model is through AI.More
Story image
From 1G to 5G: How innovations in cellular have shaped our lives
As we look to the present decade from 2020 onwards, 5G will be at the forefront. The race for 5G is not about merely deploying new infrastructure, but getting the first-mover advantage in who can build and take the leadership role in the host of new applications and services that 5G will enable.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More
Story image
DevOps & IT teams feel pressure to keep digital services online during pandemic
Many DevOps and IT teams spend more than 10 extra hours per week dealing with a 47% rise in incidents.More