We're in the business of helping people, so when a business owner reached out for assistance during a ransomware attack they had experienced, our first question was, "When was your most recent backup?" The owner said his CTO assured him they backed up their Amazon Web Services infrastructure.
Well, they had one snapshot from several years ago, which wouldn't do anything for them. Of course, we always feel bad for giving business owners awful news. But, sometimes, even as experts without the absolute minimum being done technically, we're only left with a few options in ways we can help. So we reversed-engineered and created a decryption application based on the ransomware sample we recovered during our investigation. Recovering over 3 TB of data in the process. While that's not always a possibility, in this case, many things went right for us during the investigation.
Is there a better way to handle ransomware attack recovery? YES!
But the issue wasn't that the owner needed to be made aware of the practice of doing backups. Instead, there needed to be a process for testing those backups to ensure business continuity.
And if you're thinking, "My business is too big for this to happen to me." the client in this example does just over 3 million a year in revenue. As an owner, hacker rules apply, and you can trust, but you have to verify.
What backup best practices should we follow?
3-2-1-1-0 (The evolution of the 3-2-1 rule) States that every organization should have the following:
Three copies of the data
They should consist of the primary data storage and two additional copies of the data. Think local NAS server, cloud storage, and 2 external hard drives for off-site/offline rotation. (This or some variation of this is what we do for our clients.)
Two different kinds of media
Split the data between storage technologies (i.e., tape drives, external hard drives, solid-state drives, cloud solutions), hard drive manufacturers, series or versions, physical server internal storage, and NAS servers.
If you must use physical disks in different physical servers as part of your strategy (think physical server and NAS server), break up the purchase date or buy drives from different suppliers, and consider using different manufacturers in production versus backup storage.
One offline copy of the data
This copy should be disconnected (or disconnectable) from the internal network infrastructure in the event of a breach of your systems locally.
One off-site copy of the data
This copy should be contained off-site in the event of a natural disaster or any other catastrophic failure that may occur. Again, multiple cloud off-site copies are a good idea here. For example, some of our customers use multiple cloud platforms to store copies of their data.
Zero errors
Check regularly to ensure the backed-up data is usable and works by
simulating an outage to see how long it really takes to bring you "back online." Tabletop exercises and "fire drills" are great ways to easily ensure best practices are followed and identify issues with the business continuity process.
If your organization still needs to develop a business continuity plan, consider working with a Managed Service Provider like ours that has your business's operations in mind. We'd much rather meet customers before a disaster than after. Oddly enough, it ends up being cheaper too!. Click here to learn more about our managed services!
Comments
Post a Comment