Building a Ransomware Recovery Strategy

Posted on

Building a Ransomware Recovery Strategy with Rubrik

A ransomware attack can blindside an organization and potentially cause long-term and permanent damage. According to research, ransomware demands could exceed $1.4 billion in the U.S. in 2021. Typically, ransomware spreads via spam, phishing emails or websites. Today, ransomware can be divided into two main types: crypto ransomware and locker ransomware. Crypto ransomware encrypts files but allows the user interface to be accessed. Locker ransomware denies complete access to computer resources and demands payment to unlock the device. Let’s take a look at what a ransomware data recovery strategy looks like and why you need one.

How Do You Begin Building a Recovery Strategy?
Begin by determining which data systems and sets are crucial to your business operations. This is the best way to identify what is essential. It is important when creating your plan, that you work under the assumption that one or more of your essential data sets has been encrypted by ransomware—and that you are unable to pay the ransom or decrypt it. Then, set your recovery time objectives (RTOs) and recovery point objectives (RPOs). All of this will help you better determine your ransomware backup strategy. Your next step will be a cost analysis that will help you determine if you will pay a potential ransom or not. Yes, some ransomware attackers will deliver a legitimate decryption key while others will ask for a hefty sum of money with no intention of ever returning your data. If that’s the case, it is often cheaper and safer to recover everything yourself.

We have partnered with Rubrik, a leading provider cloud management and backup recovery, to provide key insights and helpful e-books about preventing ransomware attacks, building a remediation plan and choosing the best recovery solution for your business. Download any of our free resources below and contact us today for help building custom, more secure strategy for your business.

Download for Free:
  1. From Ransomware Vulnerability to Resilience
  2. How to Develop a Ransomware Remediation Plan for Cyber Resiliency
  3. How to Buy Backup and Recovery: A Customer’s Evaluation

Share this on Social:

Related Resources