Contact Info
19925 Stevens Creek Blvd.,
Cupertino, CA 95014
info@stepaheadsolution.com
408.725.7560
Follow Us
Step Ahead - Ransomware Protection

Ransomware Protection

Ransomware Protection

Most ransomware uses the AES algorithm to encrypt fles, though some use alternative algorithms. To decrypt fles, cyber extortionists typically request payment in the form of Bitcoins or online payment voucher services, such as Ukash or Paysafecard.

The standard rate is about $500, though we’ve seen much higher. Cyber criminals behind ransomware campaigns typically focus their attacks in wealthy countries and cities where people and businesses can afford to pay the ransom. In recent months, we’ve seen repeated attacks on specific verticals, most notably in the local government sector.

How Step Ahead provides Ransomware Protection?

Step Ahead will help the customer build a cyber security policy if one is not already in place. The following steps will be advised and implement by Step Ahead for its customers.

Step Ahead - Cyber Security Awareness & Training

Awareness & Training

(NIST 800-53 controls AT-2, AT-3)

Step Ahead - Cyber Security Monitoring

Access control & Antivirus

(NIST 800-53 controls AC-2, AC-3, AC-5, AC-6)

Step Ahead - Cyber Security Remediation

Backups

(NIST 800-53 controls CP-9, CP-10)

How Ransomware Protection Works?

Step Ahead will take snapshot-based, incremental backups as frequently as every five minutes to create a series of recovery points. If your business suffers a ransomware attack, this technology allows you to roll-back your data to a point-in-time before the corruption occurred. When it comes to ransomware, the benefit of this is twofold.

Firstly, you don’t need to pay the ransom to get your data back. Secondly, since you are restoring your data to a point-in-time before the ransomware infected your systems, you can be certain everything is clean and the malware cannot be triggered again.

Step Ahead’s data protection allows users to run applications from image-based backups of virtual machines. This capability is commonly referred to as “recovery-in-place” or “instant recovery.” This technology can be useful for recovering from a ransomware attack, because it allows you to continue operations while your primary systems are being restored with little to no downtime. Step Ahead leverages Datto’s version of this business saving technology is called Instant Virtualization, which virtualizes systems either locally or remotely in a secure cloud within seconds. This solution ensures that businesses stay up-and-running when disaster strikes.

ransomware_protection
Timeline Visual
timeline