No company is safe from the onslaught of cryptolocker virus ransomware attacks. The unfortunate nature of these attacks is that human error and simple mistakes can allow entry to a cyberattacker and can result in useless files and systems. That’s precisely why companies concerned about the cryptolocker virus, ransomware of all types, and other forms of malware should consider the secure alternatives available to them in the cloud. Recently, as we explain briefly below, an Evolve IP hosting client learned just how important this protection can be.
The situation in question involves an Evolve IP healthcare customer who was hit by a cryptolocker virus ransomware attack. The attackers were able to successfully encrypt many of the client’s production files, thus preventing the client’s employees from accessing important information and systems. The infection was caused when an employee unintentionally clicked on an email containing the cryptolocker virus. Ransomware attacks of this nature are common, and are exactly what Evolve IP’s response team was prepared for. Follow the link to read more about email vulnerability in our exclusive study Email Vulnerability in Healthcare.
In this situation, Evolve IP’s backup solution prevented the potentially paralyzing effects of the cryptolocker virus ransomware. The client’s data was proactively protected through an extensive series of isolated, offsite backups and replication into our geographically redundant secure cloud environment. In addition to creating daily midnight backups, we capture data snapshots around the clock on a rolling 15-minute schedule. This creates a library of 96 backups every 24 hours from which the client’s systems can be recovered. Further, an independent supplemental data backup procedure—using a different backup methodology— backs up the client’s environment each night as an added measure of protection against data loss.
Unfortunately, despite the fact that rapid incident response is critical, it is common that the cryptolocker virus ransomware and other cyberattacks are not noticed immediately. It is often several hours later that the company realizes that it has been attacked. In this particular case, the healthcare firm realized rather quickly that an attack had occurred and alerted the Evolve IP response team. Using the isolated offsite backups, we were prepared to restore the client’s production systems within 20 minutes. However, to minimize data loss, the response team conducted a manual analysis of the backup file library to identify the recovery point closest to the point of impact (the exact time when the files were encrypted). Within an hour and twenty minutes, the team had pinpointed the first sign of data corruption and was prepared to bring back the client’s environment with minimal disruption to the business.
Explore our website for more information about our full suite of data backup and business continuity solutions, as well as our other cloud-based computing and communications services, including: Unified Communications as a Service (UCaasS), Desktop as a Service (DaaS), Virtual Desktops (VDI), and Call Centers. Or contact us today to discuss your interests with of our technical advisors.Categories: General