prepping for ransomware in 2017
play

Prepping for Ransomware in 2017 Risks change, and so should you. - PowerPoint PPT Presentation

Prepping for Ransomware in 2017 Risks change, and so should you. THM Group & Infrascale ABOUT THM GROUP Providing custom end-to-end voice & data solu4ons At a Glance Key Focus Founded: 20 years ago HQ: Barrie, Ontario Businesses


  1. Prepping for Ransomware in 2017 Risks change, and so should you. THM Group & Infrascale

  2. ABOUT THM GROUP Providing custom end-to-end voice & data solu4ons At a Glance Key Focus Founded: 20 years ago HQ: Barrie, Ontario Businesses Served: All sizes of Companies SMB to Enterprise Focus Areas : Secure reliable back up and rapid recovery soluEons Business voice & internet soluEons Custom Voice & Audio ProducEons

  3. ABOUT INFRASCALE Unrivaled initial backup speed and a full set of features and tools make it a top choice for off-site data protection. INFRASCALE AT A GLANCE THIRD PARTY VALIDATION Founded: 2011 VISIONARY HQ: Los Angeles, CA Disaster Recovery Partners: 1,000 as a Service Customers: 1M devices protected & counting Data Centers: 7 global data centers Data Protected: 100+ petabytes of data

  4. AGENDA 1 2 3 4 THE MISSION & Q&A AND WHAT SHOULD WHY US? RANSOMWARE PRIZE GIVEAWAY YOU DO TO PREPARE?

  5. OUR MISSION ERADICATE DOWNTIME & DATA-LOSS

  6. THE COST OF DOWNTIME IT downtime costs North American businesses $700 billion annually, mostly due to loss of employee productivity. COST TO FIX [VALU REVENUE LOSS E]% [VALU E]% ANNUAL AGGREGATE COSTS: $700 BILLION PRODUCTIVITY LOSS Source: The Cost of Server, Applicatio [VALU Network Downtime: North American E]% Enterprise Survey and Calculator, IHS I (January 2016)

  7. THE UBIQUITY OF DOWNTIME PERVASIVENESS OF DOWNTIME TOP CAUSES OF DOWNTIME 91 91% % 55% 60% 50% Of those surveyed have 40% had a data center outage in the past 24 months. 30% 22% 18% 20% 47% 47 % [VAL 10% 0% Hardware Human Error SoYware Natu Of companies experienced failure Failure Disas an outage or downtime THIS year. Sources: Ponemon Researc Quorum DR Repo

  8. THE THREAT OF RANSOMWARE How ransomware has become the leading cyber crime in history

  9. HOW BAD IS RANSOMWARE? 2,900 new malware modifications were detected in Q1 2016. Of ransomware victims were 72 % unable to access their data for 3 to 5 days causing $70B in downtime losses. $ 1B+ In ransoms have been paid in 2016 alone and continues to accelerate. 34 % Of SMBs fell prey to phishing emails in 2015. Source : ThreaTrack Security, March 2015 Kaspersky Lab Q1 Threat EvoluEon Report, May 2016) Verizon 2015 Data Breach InvesEgaEons Report Intermedia 2016 Crypto-Ransomware Report

  10. EVOLUTION OF RANSOMWARE PC Cyborg/ High Speed Encryp^on Cryptolocker AIDS The first The evolution of RSA-1024 and A ransomware trojan that ransomware, AES-256 made it easier for bad targeted computers running was delivered actors to encrypt more files, fast. Microsoft Windows via floppy discs. 2006 2014 2010 2016 1986 1989 Locky GPCoder CPcode.ak Cryptowall t & Amjad Malware (aka PGPCoder) Non-encrypted I nfiltrates users‘ rooq Alvi aggressively ransomware Utilized symmetric operating systems via massive sp ded a special that took encryption infected email campaigns m” message in control of the which made it fairly messages and fake compromi ir software to whole easy to hack . downloads ntify piracy. website computer The rise of Bitcoin as cryptocurrency

  11. THREE ALARMING TRENDS WORLDWI TARGETIN NETWOR DE G K REACH BUSINES EFFECT SES Massive phishing attack sent Recent attack crippled the Locky has the ability to to as many as 100 million Hollywood Presbyterian Medical encrypt network shares and email addresses claiming to Center and compelled the drives that your workstation be an Amazon shipping order hospital to pay $17,000. may not normally have update. access to. Ransomware extortionists will wreak havoc on corporate IT infrastructures in 2016 like never before.”

  12. HOW RANSOMWARE ATTACKS Another Business END USER Sync & Share Tools END USER ADMIN END USER Critical Applications & Network Backups

  13. LIMITED OPTIONS There are only two options at this point: Pay the ransom Restore systems Hope they provide the encryption Restore systems to a point key to unlock systems & files BEFORE the infection How long would it take you to restore systems to pre- infection? Would the downtime be costlier or more disastrous than paying the ransom?

  14. DEFENDING FROM RANSOMWARE We know the risk, what can you do about it?

  15. ISN’T ANTI-VIRUS PROTECTION ENOUGH? Antivirus AV software is signature-based is only 47% New threats are created at a rate of 3.5 per second effective. The rise of “crypting” (metamorphic malware Users always have bad digital hygiene (and always will) Needs to be a part of a layered approach

  16. GARTNER’S GUIDANCE 1 Assemble a crisis team 2 Perform regular backups 3 Document storage repositories 4 Evaluate the risk 5 Create a recovery plan Source: Gartner, Use These Five Backup and Recovery Best Prac4ces to Protect Against Ransomware, June 2016

  17. I've never figured out the fuss over ransomware…The single most important thing any company or individual can do to improve security is have a good backup strategy. It's been true for decades, and it's s4ll true today. - Bruce Schneier, Security Guru Infrascale Board MeeEng: April 2016 17

  18. YOU NEED THE 1-2 PUNCH Security Backup & DR Outer- � Must be able perimeter restore files Inner- surgically perimeter � Must be able bring back en Anti Backup systems � Must be fast! virus & DR

  19. HOW TO SURVIVE AN INFECTION Recovering your data when you get Infected

  20. DATA TAKEN? We are the guy you call to get your data back!

  21. WHAT TO DO IF YOU GET INFECTED? 1 2 3 Remove the Figure out Roll back from infected when you a previous machine from were backup (or the infected image) network

  22. RESTORING CRITICAL SYSTEMS Is DB part of a cluster? Repeat each of these steps for each machine connected to 1 2 3 4 5 6 7 8 Ransomware Power down Determine Rebuild server Reconfigure Restore clean Inject old DB (from Establish InfecEon machine date/Eme (OS and soYware DB services DB files restored backup) connecEvity of infecEon installaEon) from backup to rebuilt DB (DB & input sv TOTAL DOWNTIME (BEST CASE): 4-5 hours 1 2 3 4 5 Power down Determine date/Eme Log into DRaaS Boot VM (from last Ransomware machine of infecEon dashboard clean backup) InfecEon TOTAL DOWNTIME: 1-2 minutes

  23. ANOMALY DETECTION

  24. TURN BACK TIME Roll back 2 days or 4 years

  25. DIFFERENCE BETWEEN DRAAS & BACKUP? Disaster Happens Back up and running BACKUP BACKUP RESTORE RUN Hours Hours - Days Disaster Happens Back up and running DISASTER RECOVERY BACKUP RUN RESTORE Hours Minutes Hours - Days

  26. OUR SOLUTION INFRASCALE GUARANTEES SYSTEM FAILOVER FROM ANY DISASTER IN 15 MINS OR LESS AT A FRACTION OF THE COST.

  27. TRADITIONAL DR TRADEOFFS DRaaS Nirvana Warm Site DR SECOND S Hot Site DR RECOVERY TIME Appliance Backup Cold Site DR Offsite Tape Backup Cloud DAYS Backup $$$$$ $ COST

  28. DRAMATICALLY MORE AFFORDABLE OLD WAY On-Premises (ProducEon) Secondary (standby) datacenter <1 Minute Failover People Bandwidth ers | Databases | Load Balancers Servers | Databases | Load Balancers + + = Primary Secondary Opex TOTAL $$$$$ $$$$$ $$$$$ $$$ e Costs: Site Costs: Costs: DR COSTS: 10:1 COST DIFFERENCE NEW WAY On-Premises (ProducEon) Private/Public Cloud <15 Minute People Bandwidth Failover ers | Databases | Load Balancers + + = TOTAL Primary Secondary Opex Included $ $ $ e Costs: Site Costs: Costs: DR COSTS:

  29. THE NEW ROAD TO RECOVERY 3. Users keep working 2. Recover & Virtualize END USER 1. When Ransomwar e attacks…

  30. HOW MUCH OUR CUSTOMERS PAID IN RANSOMWARE 0 $

  31. A TALE OF TWO UNIVERSITIES With Infrascale, I quickly and easily recovered clean versions of our encrypted files with minimal user impact. It was easy-peasey.” University of Virginia Alumni Association TARGET Charlottesville, VA LOCATION Ellen McCree Systems Analyst University of Virg Total downtime: 1.5 hours Alumni Associa IMPACT

  32. PROTECT ALL SYSTEMS BUILT-IN SECURITY SUPPORT ANY OS STORE IN ANY CLOUD RECOVER ANYTHING PROTECT ANY DEVICE FAILBACK ANYTIME BOOT ANYWHERE

  33. THE DATA VALUE PYRAMID Usually Mission critical Protected HQ Core DC Usually Exposed Remote/Branch Offices End-points

  34. YOU NEED A COMPLETE SOLUTION… Infrascale Disaster Recovery Mission critical HQ Core DC Infrascale Remote/Branch Offices Cloud Backup End-points

  35. PROTECT AGAINST MICRO & MACRO DISASTERS HOME (PRIMARY) SITE OFFSITE (SECONDARY) SITE Paired appliance, Cloud, AWS, Azure Physical Servers Virtual Servers Desktops Laptops Databases Deduplication FAILOVER & compression 1024 AES ENCRYPTED Encryption 010010101010111 TRANSFER 256 AES 110001101000110 FAILBACK Cloud Failover Spin Up Spin Up Appliance Server Server

  36. TICKING OFF THE COMPLIANCE MANDATES FIPS SOX HIPAA SSAE 16 CJIS

  37. POLL Would you like to learn more about prepping for Ransomware? A Yes, I’d like to learn more. B Yes, but not immediately. C Not yet, but maybe later.

  38. CALL NOW 1-866-233-7464 GET YOUR FREE EVALUATION 4 3 1 2 5 4 TECT YOUR PROTECT PROTECT MULTI-LAYERED PROTEC BUDGET ALL SYSTEMS AGAINST MICRO NETWORK SECURITY AGAINST & MACRO RANSOMW DISASTERS

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend