{"id":2333,"date":"2021-09-24T07:40:57","date_gmt":"2021-09-24T07:40:57","guid":{"rendered":"https:\/\/antidos.com\/blog\/?p=2333"},"modified":"2022-09-05T11:00:11","modified_gmt":"2022-09-05T11:00:11","slug":"backup-after-a-ransomware-attack","status":"publish","type":"post","link":"https:\/\/antidos.com\/blog\/backup-after-a-ransomware-attack\/","title":{"rendered":"How To Recover Your Backup After a Ransomware Attack?"},"content":{"rendered":"<p>According to <a href=\"https:\/\/purplesec.us\/resources\/cyber-security-statistics\/ransomware\/\" rel=\"nofollow noopener\" target=\"_blank\">ransomware statistics<\/a>, the average cost of a ransomware incident almost <strong>doubled<\/strong> from <strong>$4300 in 2018 <\/strong>to <strong>$8100 in 2020<\/strong>. The estimated global damages from ransomware went up from <strong>$8 billion in 2018 to $20 billion in 2020. <\/strong>What\u2019s even worse, the average cost of downtime due to ransomware attacks grew <strong>6 times from $46,800 in 2018<\/strong> to <strong>283,000 in 2020<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2334 size-full aligncenter\" src=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2021\/09\/ransomware-incident-.jpg\" alt=\"estimated global damages from ransomware \" width=\"500\" height=\"540\" srcset=\"https:\/\/antidos.com\/blog\/wp-content\/uploads\/2021\/09\/ransomware-incident-.jpg 500w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2021\/09\/ransomware-incident--278x300.jpg 278w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2021\/09\/ransomware-incident--370x400.jpg 370w, https:\/\/antidos.com\/blog\/wp-content\/uploads\/2021\/09\/ransomware-incident--270x292.jpg 270w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Despite this, a <a href=\"https:\/\/www.keepersecurity.com\/ransomware-impact-report-2021.html\" rel=\"nofollow noopener\" target=\"_blank\">survey <\/a>conducted by Keeper Security showed that <strong>49%<\/strong> of the companies targeted by ransomware attacks ended up paying ransom. One of the primary reasons for this was lack of backup or having backup that they are unable to retrieve after a ransomware attack.<\/p>\n<p>&nbsp;<\/p>\n<h2 id='how-to-recover-your-backup-after-a-ransomware-attack'  id=\"boomdevs_1\" >How to Recover Your Backup After A Ransomware Attack?<\/h2>\n<p>Here are some ways you can retrieve your data backup after a ransomware attack.<\/p>\n<h2 id='1-keep-multiple-types-of-backups'  id=\"boomdevs_2\" >1.\u00a0\u00a0 Keep Multiple Types of Backups<\/h2>\n<p>Backups take storage space and most business don\u2019t have an unlimited amount of storage space to store those backups. This makes it difficult for businesses to store backups for a long time. This is why you should keep different types of backup. For instance, you can take complete backup once and take iterative backups of data periodically. Make sure the frequency of interactive backups is higher so you don\u2019t miss out on critical data.<\/p>\n<h2 id='2-safeguard-your-backup-catalog'  id=\"boomdevs_3\" >2.\u00a0\u00a0 Safeguard Your Backup Catalog<\/h2>\n<p>Did you know that most advanced ransomware attacks target your backup catalog instead of a data backup? Yes, you read that right. Cyberattackers target backup catalog because it contains all the metadata of your backup such as index and bar codes of the disks as well as the complete path of disk location where your data is actually stored. This is why it is important to protect your backup catalog. Businesses must invest in a backup solution that offers security features to secure backup catalog, otherwise, it will be tough to restore your data without a stable backup catalog.<\/p>\n<h2 id='3-backup-all-your-critical-data'  id=\"boomdevs_4\" >3.\u00a0\u00a0 Backup All Your Critical Data<\/h2>\n<p>If taking backup of all your data seems like a daunting challenge for you, you must at least take backup of all the sensitive data. You don\u2019t want to be in a situation where you have backed up all of your data stored in the dedicated server but leave out one server which has critical business data stored on it. All your efforts will go down the drain if an attacker targets that server and manages to hack it or steal data from it. Even if all your data is lost, you might still be able to retrieve your critical business data to ensure business continuity. Although restoring your business to full capacity might take days or even weeks,\u00a0 at least the ransomware attack won\u2019t shut down your entire business.<\/p>\n<h2 id='4-isolate-your-data-backup'  id=\"boomdevs_5\" >4.\u00a0\u00a0 Isolate Your Data Backup<\/h2>\n<p>Another mistake most businesses make is that they tend to store the backup of their data at one place even if they have multiple copies. Instead, you are better off storing different copies of your data backup across different locations. For instance, you can store one copy on an offsite server and one on the cloud. This will secure your data backups and allow you to retrieve your data in case of a ransomware attack.<\/p>\n<h2 id='5-take-a-backup-of-your-business-processes'  id=\"boomdevs_6\" >5.\u00a0\u00a0 Take a Backup of Your Business Processes<\/h2>\n<p>Advanced ransomware attacks not only impact your data, they can also paralyze your business processes. Hackers know that a company will have no choice but to pay the ransom to ensure business continuity if they can shut down their key business processes. Moreover, hackers also know that the more business processes they can target with a <a href=\"https:\/\/hostnoc.com\/7-effective-ways-to-protect-your-business-from-ransomware-attacks\/\" rel=\"nofollow noopener\" target=\"_blank\">ransomware attack<\/a>, the longer it will take the business to restore operations, providing them more opportunities to aggravate the damage.<\/p>\n<p>&nbsp;<\/p>\n<p>When VanDyke became a target of ransomware, it took them weeks to restore operations as they had to restore all PCs and servers from scratch. This also includes downloading and reinstalling all the software and configuring everything from scratch. Most businesses don\u2019t even have many recovery servers which can prolong the restoration process.<\/p>\n<h2 id='6-accelerate-data-recovery-with-hot-disaster-recovery-sites'  id=\"boomdevs_7\" >6.\u00a0\u00a0 Accelerate Data Recovery with Hot Disaster Recovery Sites<\/h2>\n<p>Did you know that <strong>one-third<\/strong> of IT directors think that they cannot recover from a ransomware attack in less than 5 days? Some companies are investing heavily into tapes while others are investing into hot disaster recovery sites. The latter not only gives you one click access to your data but can also drastically reduces the data recovery time. These hot sites are more common than ever before and if you have already migrated to a cloud, having a hot recovery site is a must-have.\u00a0\u00a0\u00a0\u00a0 Yes, you might have to invest handsomely to build and maintain a hot site, but it will pay off rich dividends down the line as you don\u2019t have to worry about weeklong recovery time. This also minimizes the cost you have to bear due to downtime <a href=\"https:\/\/hostnoc.com\/spot-ransomware-attack\/\" rel=\"nofollow noopener\" target=\"_blank\">caused by ransomware attacks<\/a>, which makes it a great investment.<\/p>\n<h2 id='7-harness-the-power-of-automation'  id=\"boomdevs_8\" >7.\u00a0\u00a0 Harness The Power of Automation<\/h2>\n<p>In today\u2019s dynamic business world, automation is your best friend. You can also use it to your advantage when taking backup of your data. You can create a script which copies your infrastructure and copy it to establish it in another zone. This reduces the restoration time from days to minutes. The only downside with this approach is that it demands a large initial investment upfront as well as technical expertise to create that type of script. Add to that the number of security controls that you need to place, and it puts most businesses off. Despite this, it has more advantages than disadvantages so you should seriously consider this option.<\/p>\n<p>How do you retrieve your backup after a ransomware attack? Share it with us in the comments section below.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to ransomware statistics, the average cost of a ransomware incident almost doubled from $4300 in 2018 to $8100 in 2020. The estimated global damages from ransomware went up from $8 billion in 2018 to $20 billion in 2020. What\u2019s even worse, the average cost of downtime due to ransomware attacks grew 6 times from [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2335,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47,49],"tags":[],"class_list":["post-2333","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-ddos-attack"],"_links":{"self":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2333","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/comments?post=2333"}],"version-history":[{"count":2,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2333\/revisions"}],"predecessor-version":[{"id":2505,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/posts\/2333\/revisions\/2505"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media\/2335"}],"wp:attachment":[{"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/media?parent=2333"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/categories?post=2333"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antidos.com\/blog\/wp-json\/wp\/v2\/tags?post=2333"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}