the point of compliance

Storage Concepts to Protect Against Ransomware

Ransomware remains a threat to business data. It’s becoming increasingly common to hear stories of businesses becoming victims of malware, their infrastructure infected and taken hostage by trojan viruses, and their data encrypted against the company’s will. When it comes to data security, then, there is no such thing as paying too much attention. This is true of all data and all storage tiers. How can business efficiently protect their data against cyber-attacks and prevent damage caused by ransomware?

Affected companies are advised not to accede to attackers’ demands and pay the requested ransom. A brochure from the German Federal Office for Information Security (Bundesamt für Sicherheit in der Informationstechnik, BSI) shows the danger of ransomware and provides recommendations for how to respond to an attack. Payment of the ransom is no guarantee that the encrypted files will actually be released. Instead, there is a risk that the attackers recognise that the infected company is willing to pay and demand even more money.

The more advisable strategy is to secure files using a dedicated storage strategy that guarantees the maximum possible level of data protection. This will not protect against criminal attacks, but it will help to limit the damage that attackers cause by encrypting company data.

Backup Plans

With a reliably implemented and carefully thought out backup strategy, you will meet a basic requirement for restoring access to data that has been infected with ransomware – or rather, for restoring access to the backup copy of that data. Three questions arise, in light of the constant increase in data volumes and legal regulations:

Storage Optimization

In other words, dealing with the threat of malware also means optimizing your storage infrastructure. A smart storage strategy offers more than just the potential for cost savings. In fact, optimizing your storage architecture can contribute significantly towards protecting you against malware.

The protection of data against ransomware is not an issue to be considered alone. It can be connected very closely to fundamental aspects of your storage architecture and archiving strategies. When it comes to audit-compliant archiving, for example, data needs to be saved in a format that prevents unauthorised deletion or manipulation.

Security for Your Archived Data

A storage solution – a combination of storage hardware and software – that meets the requirements for revision-safety may protect data using WORM (write once, read many) functionality. This is the principle by which data can be written only once, after which it cannot be edited or overwritten. The PoINT Storage Manager is a storage software system offering exactly this kind of WORM protection. It also “hides” archive media from ransomware: if the archive storage system is integrated via the PoINT Storage Manager, a direct file system access becomes impossible.

If data on offline storage media is also automatically replicated, it is then effectively – doubly, in fact – protected against ransomware infection. The storage software used should therefore also support the maximum possible range of storage technologies, allowing you to seamlessly integrate offline storage media like tape or optical drives into your storage infrastructure.

This way, the PoINT Storage Manager helps you to efficiently relieve the load on your primary storage system and therefore your backups, too. At the same time, it also helps you to redundantly secure your archive by replicating data to offline systems.

Conclusion

Protect your data against ransomware with regular backups, a thoughtfully implemented storage infrastructure and a secure archiving strategy. A reliable storage and archiving software system will not just help you to meet legal requirements – it will also enable a strategy for ensuring the security and availability of your data in spite of the threat posed by malware.

White Paper