Contact Info
19925 Stevens Creek Blvd.,
Cupertino, CA 95014
info@stepaheadsolution.com
408.725.7560
Follow Us

Ransomware Protection

Powered by Datto

Ransomware Protection

Most ransomware uses the AES algorithm to encrypt fles, though some use alternative algorithms. To decrypt fles, cyber extortionists typically request payment in the form of Bitcoins or online payment voucher services, such as Ukash or Paysafecard.

The standard rate is about $500, though we’ve seen much higher. Cyber criminals behind ransomware campaigns typically focus their attacks in wealthy countries and cities where people and businesses can afford to pay the ransom. In recent months, we’ve seen repeated attacks on specific verticals, most notably in the local government sector.

How Step Ahead provides Ransomware Protection?

Step Ahead will help the customer build a cyber security policy if one is not already in place. The following steps will be advised and implement by Step Ahead for its customers.

Awareness & Training

(NIST 800-53 controls AT-2, AT-3)

Access control & Antivirus

(NIST 800-53 controls AC-2, AC-3, AC-5, AC-6)

Backups

(NIST 800-53 controls CP-9, CP-10)

How Ransomware Protection Works?

Step Ahead will take snapshot based, incremental backups as frequently as every five minutes to create a series of recovery points. If your business suffers a ransomware attack, this technology allows you to roll-back your data to a point-in-time before the corruption occurred. When it comes to ransomware, the benefit of this is twofold.

First, you don’t need to pay the ransom to get your data back. Second, since you are restoring to a point-in-time before the ransomware infected your systems, you can be certain everything is clean, and the malware cannot be triggered again.

Step Ahead’s data protection allow users to run applications from image-based backups of virtual machines. This capability is commonly referred to as “recovery-in-place” or “instant recovery.” This technology can be useful for recovering from a ransomware attack, because it allows you to continue operations while your primary systems are being restored and with little to no downtime. Step Ahead leverages Datto’s version of this business saving technology is called Instant Virtualization, which virtualizes systems either locally or remotely in a secure cloud within seconds. This solution ensures businesses stay up-and-running when disaster strikes.

ransomware_protection

Timeline Visual

timeline