Not logged in » Login
Nov 30 2021

Dos and Don’ts for creating ransomware resilience?

A rising tide of ransomware attacks is threatening the resilience of business and society. Fujitsu provides 7 dos and don’ts for IT leaders to build more secure infrastructures with faster recovery times by prioritizing data according to its value.

Image

 

In our last blog we looked at the principles underlying security transformation in the face of a rising tide of ransomware attacks threatening the resilience of business and society. In this article we will be focusing on how to break the task into manageable proportions by prioritizing data according to its value to your organization.

 

All secure architectures are hybrid

There is no single, best-practice solution to the threat of ransomware. What is right for one organization might not work so well in another.

Similarly, there is no single technology that removes all threats. Any solution will be made up of a variety of technologies and environments, and - except in exceptional circumstances - will be hybrid in nature. As we will see shortly, tape offers many benefits when it comes to data recovery, but it isn’t fast. Most organizations are therefore going to have a mix of on-prem, and public and private cloud options across multiple storage technologies to arrive at a solution that fits their needs.

Let’s take a closer look at how that works. Here we’ve outlined Seven Dos and Don’ts that you can use to start mapping out what your security posture should look like.

1) Don’t put all your eggs in one basket

Not all data is equally valuable and not all threats are equally damaging. You should aim to create multi-tier data protection with a combination of data snapshots, replication, disk and cloud backup, and tape.

2) Follow the golden rule

When you are deciding on which baskets for which eggs, use the 3-2-1 rule of data protection. It’s a cliché for a reason: It works.

3) Horses for courses

Choose a mix of technologies for your 3-2-1 data protection strategy. High-availability, disaster-resilient online storage systems are the basis for always-on business. Snapshot technology backs up hundreds or thousands of VMs, not to mention finding unprotected VMs automatically. And tape…

4) Don’t write off tape

Once derided as a dying technology, tape represents your best defense against malware attacks and is a must-have storage tier for long-term data retention. It prevents cybercriminals getting to your backups by creating an “air-gap” between attackers and your data using electronically and physically disconnected tape copies on removable media that is not in the tape drive. Off-site backup and storage can be the most secure facilities available.

5) Archiving is an opportunity

Archive solutions create an additional level of security for data-driven businesses and an opportunity to detect attacks before they have spread too far. Archiving software features intelligent encryption routines and specific capabilities against ransomware to thwart criminal access to business data.

6) Automate for efficiency

Managing the protection of your data across multiple tiers and sites can be a large and time-consuming task. Data protection appliances drastically reduce IT administrator workloads and deliver high performance backups. And for an all-in-one solution for backup, archiving, second-tier and object storage from mainframe and open systems, the FUJITSU Storage ETERNUS CS8000 is the world’s fastest and most reliable data protection platform, reducing TCO for complex data protection environments by 60%.

7) Meet any target

Don’t be put off. It is possible to meet even the most aggressive RPO-RTO targets to ensure data availability. To get there will involve choices where you will want the help of a trusted vendor, such as Fujitsu together with our eco-system partners.

 

In the next blogs we’ll go into more details describing how Fujitsu and our data protection partners provide solutions to thwart respectively survive a ransomware attack.

 

 

Helga Eppig

 

About the Author:

Helga Eppig

International Product Marketing Storage, Fujitsu

SHARE

Comments on this article

No comments yet.

Please Login to leave a comment.

X

Please login

Please log in with your Fujitsu Partner Account.

Login


» Forgot password

Register now

If you do not have a Fujitsu Partner Account, please register for a new account.

» Register now