Backup Your Data and Isolate Your Backups Offline

Implement a layered data backup strategy and isolate backups you create offline to mitigate the impact of a potential ransomware attack.
The prevalence and impact of ransomware has become clearly apparent. Ransomware is a type of malware designed to block access to a computer system until a sum of money in the form of untraceable Bitcoin is paid. It does this by encrypting a victim’s files until they have made the payment demanded by the attacker.
While backing up your files on a regular basis may reduce the devastation caused by a potential ransomware attack, backups are becoming less reliable as ransomware evolves. Threat actors are getting smarter, attacking backups to prevent recovery.
That being said, there are various best practices that users should engage in to protect their backups from ransomware.
Supplement backups with additional copies and third-party tools.
Keep multiple copies of important files at multiple locations.
Isolate backups - The more barriers that exist between an infected system and its backups, the harder it will be for ransomware to attack these backups.
Test your backups! Perform restoration exercises on a regular basis to identify any issues that may exist with your backups.
Want to learn more ways to protect your backups from malware? Get in Touch >>
CyberSecurity Month
- Avoid Phishing Emails
- Be Cautious of Spam Email
- Be Wary of Malicious URLs
- Protect Against Spoofing & Sender Fraud
- Protect the Privacy of Your Email with TLS
- Don’t Rely on Native Microsoft 365 Email Protection Alone
- Implement TLS to Keep Your Email Secure
- Endpoint Security Is Not Enough
- Conduct Regular Email Security Audits
- Configure Email Account Settings with Security in Mind
- Learn How To Spot Threats to Business Email
- Backup Your Data and Isolate Your Backups Offline
- Protect Business Email from Phishing Attacks
- Avoid Sending Sensitive Information Over Email
- Learn About Malicious Links
- Prevent Zero-Day Attacks
- Business Email Is for Business Only
- Learn How To Identify Social Engineering Attacks
- Know Your Email Risk
- Safeguard Your Inbox from Malicious Mail
- Understand How Phishing Attacks Are Carried Out
- Know the Steps in a Spear Phishing Attack
- Familiarize Yourself with the Anatomy of a Whaling Attack
- Understand How Malware Attacks Work
- Learn the Steps in a Ransomware Attack
- Understand the Phases of a Business Email Compromise (BEC) Attack
- Know What Zero-Day Attack Is & How It Works
- Familiarize Yourself with the Phases of an Account Takeover (ATO) & Lateral Phishing Attack
- Learn the Steps in a Social Engineering Attack
- Understand the Types of Email Viruses to Be on the Lookout For