Blog Archives

StorageShort – Ransomware 101

Ransomware is capturing more than its fair share of headlines. In this StorageShort, George Crump, Lead Analyst at Storage Switzerland, and Gregg Ogden, Solutions Marketer at Commvault, discuss what ransomware is and what makes it different from other disasters that

Tagged with: , , , , ,
Posted in StorageShort

ChalkTalk Video: Practicing For Ransomware

A successful ransomware attack is a disaster like none other. Much of the environment is probably still up, especially applications. But an important part of it, user files, may be down. And there is a tempting shortcut: Pay the ransom

Tagged with: , , , , ,
Posted in Video

Is your Windows Backup Server at Risk of Ransomware?

Your Windows-based backup server may be at risk to ransomware. That was the take away from a recent talk on ransomware at the VeeamOn conference in New Orleans. A ransomware attack could either begin at your Windows-based backup server or

Tagged with: , , , , , ,
Posted in Blog

ChalkTalk Video: Why is Recovery From Ransomware So Hard?

Recovery from ransomware is different from any other type of recovery. Most are single file restores caused by a user mistakenly deleting a file. At the other end of the spectrum is a complete server or application recovery, where you

Tagged with: , , , , ,
Posted in Video

Product Analysis – How Rubrik Handles Ransomware Recovery

A ransomware attack puts IT in a battle against the malware author. To the victor goes the data. Every organization needs a prevention strategy. It also must realize that at some point the virus will get through, and at that

Tagged with: , , , , , , , ,
Posted in Article

Exploiting Ransomware’s Fatal Flaw

Ransomware has one fatal flaw. Organizations that know how to exploit this flaw can almost eliminate this cyber-attack from their list of concerns. Ironically the flaw is found in their very action it takes to hold organizations hostage – it

Tagged with: , , , , , ,
Posted in Blog

Why Not Build Ransomware Proof Storage?

The best way to protect an organization from a ransomware attack is at its source, primary storage. Ransomware works by compromising a user account and then encrypting all the files that the account can access. A compromised superuser account is

Tagged with: , , , , , , , ,
Posted in Blog

How Data Management Protects Against Cyber-Attacks

The reason that file data is a prime target of ransomware attacks is that most file servers are full of juicy targets that organizations are willing to pay to get back. Payment is, after all, exactly what ransomware is all

Tagged with: , , , , , , , , , ,
Posted in Blog

Should Experts Convince You to Pay for Ransomware?

I may be an analyst for Storage Swiss now, but for 30 years I’ve also been in the news business. So with the emergence of “WannaCry” I’m seeing my two worlds collide. And it’s no surprise it’s over ransomware. We’ve

Tagged with: , , , , , ,
Posted in Blog

How Do You Stop WannaCry?

Preventing the WannaCry attack is simple. Update Windows. Stopping the next ransomware attack may take more prevention steps. WannaCry leverages exploits that were made public when hackers revealed on April 14 a list of exploits that were allegedly developed by

Tagged with: , , , , ,
Posted in Blog