Prepping for Ransomware in 2017 Risks change, and so should you. - - PowerPoint PPT Presentation

prepping for ransomware in 2017
SMART_READER_LITE
LIVE PREVIEW

Prepping for Ransomware in 2017 Risks change, and so should you. - - PowerPoint PPT Presentation

Prepping for Ransomware in 2017 Risks change, and so should you. THM Group & Infrascale ABOUT THM GROUP Providing custom end-to-end voice & data solu4ons At a Glance Key Focus Founded: 20 years ago HQ: Barrie, Ontario Businesses


slide-1
SLIDE 1

THM Group & Infrascale

Prepping for Ransomware in 2017

Risks change, and so should you.

slide-2
SLIDE 2

At a Glance Key Focus

ABOUT THM GROUP

Providing custom end-to-end voice & data solu4ons

Founded: HQ: Businesses Served: Focus Areas: 20 years ago Barrie, Ontario All sizes of Companies SMB to Enterprise Secure reliable back up and rapid recovery soluEons Business voice & internet soluEons Custom Voice & Audio ProducEons

slide-3
SLIDE 3

INFRASCALE AT A GLANCE

Unrivaled initial backup speed and a full set of features and tools make it a top choice for off-site data protection.

THIRD PARTY VALIDATION

2011 Los Angeles, CA 1,000 1M devices protected & counting 7 global data centers 100+ petabytes of data Founded: HQ: Partners: Customers: Data Centers: Data Protected:

ABOUT INFRASCALE

VISIONARY

Disaster Recovery as a Service

slide-4
SLIDE 4

1 2 3

THE MISSION & RANSOMWARE WHY US? WHAT SHOULD YOU DO TO PREPARE?

4

Q&A AND PRIZE GIVEAWAY

AGENDA

slide-5
SLIDE 5

OUR MISSION

ERADICATE DOWNTIME & DATA-LOSS

slide-6
SLIDE 6

Source: The Cost of Server, Applicatio Network Downtime: North American Enterprise Survey and Calculator, IHS I (January 2016)

IT downtime costs North American businesses $700 billion annually, mostly due to loss of employee productivity. [VALU E]% [VALU E]% [VALU E]%

COST TO FIX REVENUE LOSS PRODUCTIVITY LOSS

ANNUAL AGGREGATE COSTS: $700 BILLION

THE COST OF DOWNTIME

slide-7
SLIDE 7

Of those surveyed have had a data center outage in the past 24 months.

TOP CAUSES OF DOWNTIME

91 91% %

PERVASIVENESS OF DOWNTIME 55% 22% 18% [VAL

0% 10% 20% 30% 40% 50% 60% Hardware failure Human Error SoYware Failure Natu Disas

Sources: Ponemon Researc Quorum DR Repo

Of companies experienced an outage or downtime THIS year.

47 47% %

THE UBIQUITY OF DOWNTIME

slide-8
SLIDE 8

THE THREAT OF RANSOMWARE

How ransomware has become the leading cyber crime in history

slide-9
SLIDE 9

new malware modifications were detected in Q1 2016.

2,900

Of ransomware victims were unable to access their data for 3 to 5 days causing $70B in downtime losses.

72%

In ransoms have been paid in 2016 alone and continues to accelerate.

$1B+

Of SMBs fell prey to phishing emails in 2015.

34%

Kaspersky Lab Q1 Threat EvoluEon Report, May 2016) Intermedia 2016 Crypto-Ransomware Report

HOW BAD IS RANSOMWARE?

ThreaTrack Security, March 2015 Verizon 2015 Data Breach InvesEgaEons Report

Source:

slide-10
SLIDE 10

t & Amjad rooq Alvi

ded a special m” message in ir software to ntify piracy.

PC Cyborg/ AIDS

The first ransomware, was delivered via floppy discs.

GPCoder (aka PGPCoder)

Utilized symmetric encryption which made it fairly easy to hack.

CPcode.ak

Non-encrypted ransomware that took control of the whole computer The evolution of RSA-1024 and AES-256 made it easier for bad actors to encrypt more files, fast.

Cryptowall Infiltrates users‘

  • perating systems via

infected email messages and fake downloads A ransomware trojan that targeted computers running Microsoft Windows

Locky

Malware aggressively massive sp campaigns compromi website The rise of Bitcoin as cryptocurrency

1986 1989 2006 2010 2014 2016

High Speed Encryp^on Cryptolocker

EVOLUTION OF RANSOMWARE

slide-11
SLIDE 11

Massive phishing attack sent to as many as 100 million email addresses claiming to be an Amazon shipping order update. Recent attack crippled the Hollywood Presbyterian Medical Center and compelled the hospital to pay $17,000. Locky has the ability to encrypt network shares and drives that your workstation may not normally have access to.

WORLDWI DE REACH TARGETIN G BUSINES SES NETWOR K EFFECT

Ransomware extortionists will wreak havoc on corporate IT infrastructures in 2016 like never before.”

THREE ALARMING TRENDS

slide-12
SLIDE 12

END USER

Sync & Share Tools Critical Applications & Network Backups

HOW RANSOMWARE ATTACKS

END USER

END USER

ADMIN

Another Business

slide-13
SLIDE 13

There are only two options at this point:

Pay the ransom Restore systems

How long would it take you to restore systems to pre- infection? Would the downtime be costlier or more disastrous than paying the ransom?

LIMITED OPTIONS

Hope they provide the encryption key to unlock systems & files Restore systems to a point BEFORE the infection

slide-14
SLIDE 14

DEFENDING FROM RANSOMWARE

We know the risk, what can you do about it?

slide-15
SLIDE 15

AV software is signature-based New threats are created at a rate of 3.5 per second The rise of “crypting” (metamorphic malware Users always have bad digital hygiene (and always will) Needs to be a part of a layered approach

ISN’T ANTI-VIRUS PROTECTION ENOUGH?

Antivirus is only

47%

effective.

slide-16
SLIDE 16

Perform regular backups Document storage repositories

1 2

Assemble a crisis team

3

Evaluate the risk

4

Create a recovery plan

5

Source: Gartner, Use These Five Backup and Recovery Best Prac4ces to Protect Against Ransomware, June 2016

GARTNER’S GUIDANCE

slide-17
SLIDE 17

I've never figured out the fuss over ransomware…The single most important thing any company or individual can do to improve security is have a good backup strategy. It's been true for decades, and it's s4ll true today.

Infrascale Board MeeEng: April 2016 17

  • Bruce Schneier, Security Guru
slide-18
SLIDE 18

YOU NEED THE 1-2 PUNCH

Anti virus Backup & DR Security

Outer- perimeter Inner- perimeter

Backup & DR

Must be able restore files surgically Must be able bring back en systems Must be fast!

slide-19
SLIDE 19

HOW TO SURVIVE AN INFECTION

Recovering your data when you get Infected

slide-20
SLIDE 20

DATA TAKEN?

We are the guy you call to get your data back!

slide-21
SLIDE 21

WHAT TO DO IF YOU GET INFECTED?

1

Remove the infected machine from the network Figure out when you were infected Roll back from a previous backup (or image)

2 3

slide-22
SLIDE 22

RESTORING CRITICAL SYSTEMS

Ransomware InfecEon Power down machine Determine date/Eme

  • f infecEon

Rebuild server (OS and soYware installaEon) Reconfigure DB services Restore clean DB files from backup Inject old DB (from restored backup) to rebuilt DB Establish connecEvity (DB & input sv

TOTAL DOWNTIME (BEST CASE): 4-5 hours TOTAL DOWNTIME: 1-2 minutes

Is DB part of a cluster? Repeat each of these steps for each machine connected to

Ransomware InfecEon Power down machine Determine date/Eme

  • f infecEon

Log into DRaaS dashboard Boot VM (from last clean backup)

1 2 3 4 5 6 7 8 1 2 3 4 5

slide-23
SLIDE 23

ANOMALY DETECTION

slide-24
SLIDE 24

TURN BACK TIME

Roll back 2 days or 4 years

slide-25
SLIDE 25

Hours

BACKUP

Minutes

DISASTER RECOVERY

Hours - Days Hours

Back up and running Disaster Happens Back up and running

RESTORE BACKUP BACKUP

Disaster Happens

RUN RESTORE RUN

Hours - Days

DIFFERENCE BETWEEN DRAAS & BACKUP?

slide-26
SLIDE 26

OUR SOLUTION

INFRASCALE GUARANTEES SYSTEM FAILOVER FROM ANY DISASTER IN 15 MINS OR LESS AT A FRACTION OF THE COST.

slide-27
SLIDE 27

Offsite Tape Backup Cloud Backup Appliance Backup Cold Site DR Hot Site DR Warm Site DR

DAYS SECOND S

RECOVERY TIME COST

$ $$$$$

DRaaS Nirvana

TRADITIONAL DR TRADEOFFS

slide-28
SLIDE 28

OLD WAY

On-Premises (ProducEon)

ers | Databases | Load Balancers

People Bandwidth

$$$$$

Primary e Costs:

$$$$$

Secondary Site Costs:

$$$

Opex Costs:

$$$$$

TOTAL DR COSTS:

<1 Minute Failover

NEW WAY

On-Premises (ProducEon)

ers | Databases | Load Balancers

Private/Public Cloud

People Bandwidth

<15 Minute Failover

Secondary (standby) datacenter

Servers | Databases | Load Balancers

+ +

$

Primary e Costs:

$

Secondary Site Costs: Opex Costs:

+ +

Included

=

10:1 COST DIFFERENCE

$

=

TOTAL DR COSTS:

DRAMATICALLY MORE AFFORDABLE

slide-29
SLIDE 29

END USER

  • 3. Users keep

working

  • 2. Recover &

Virtualize

  • 1. When

Ransomwar e attacks…

THE NEW ROAD TO RECOVERY

slide-30
SLIDE 30

HOW MUCH OUR CUSTOMERS PAID IN RANSOMWARE

$

slide-31
SLIDE 31

Ellen McCree

A TALE OF TWO UNIVERSITIES

Systems Analyst University of Virg Alumni Associa

TARGET

University of Virginia Alumni Association Charlottesville, VA Total downtime: 1.5 hours

LOCATION IMPACT

With Infrascale, I quickly and easily recovered clean versions of our encrypted files with minimal user impact. It was easy-peasey.”

slide-32
SLIDE 32

PROTECT ANY DEVICE SUPPORT ANY OS BUILT-IN SECURITY RECOVER ANYTHING STORE IN ANY CLOUD BOOT ANYWHERE FAILBACK ANYTIME

PROTECT ALL SYSTEMS

slide-33
SLIDE 33

THE DATA VALUE PYRAMID

HQ Core DC Remote/Branch Offices End-points Mission critical

Usually Protected Usually Exposed

slide-34
SLIDE 34

YOU NEED A COMPLETE SOLUTION…

HQ Core DC Remote/Branch Offices End-points Mission critical

Infrascale Disaster Recovery Infrascale Cloud Backup

slide-35
SLIDE 35

Physical Servers Virtual Servers Desktops Laptops Databases Cloud Failover Appliance Encryption 256 AES Deduplication & compression

HOME (PRIMARY) SITE OFFSITE (SECONDARY) SITE

Spin Up Server

FAILOVER FAILBACK

Spin Up Server

1024 AES ENCRYPTED TRANSFER 010010101010111 110001101000110

Paired appliance, Cloud, AWS, Azure

PROTECT AGAINST MICRO & MACRO DISASTERS

slide-36
SLIDE 36

TICKING OFF THE COMPLIANCE MANDATES

CJIS HIPAA SSAE 16 FIPS SOX

slide-37
SLIDE 37

B

Not yet, but maybe later.

A

Yes, I’d like to learn more.

Would you like to learn more about prepping for Ransomware?

POLL

C

Yes, but not immediately.

slide-38
SLIDE 38

CALL NOW 1-866-233-7464

GET YOUR FREE EVALUATION

1 2

4

3 5

PROTECT AGAINST MICRO & MACRO DISASTERS MULTI-LAYERED NETWORK SECURITY PROTECT ALL SYSTEMS TECT YOUR BUDGET PROTEC AGAINST RANSOMW

4