Preview only show first 10 pages with watermark. For full document please download

Protect Against Wannacry, A Ransomware “weapon Of

   EMBED


Share

Transcript

Protect Against WannaCry, a Ransomware “Weapon of Mass Destruction” Massive. Unprecedented. A weapon of mass destruction. That’s how cyber security experts describe the ransomware worm, WannaCry that has shaken organizations the world over. To date, hundreds of thousands of computers in 150 countries have been crippled, from healthcare systems in the UK to universities across Asia—and the threat isn’t over. Now, new WannaCry variants are being detected—variants lacking the kill switch that mitigated the harm of their original. How can you address your WannaCry threat? Immediately address your Windows vulnerability Malicious actors have exploited the known Microsoft vulnerability, EternalBlue, underscoring the importance of immediately installing security patches and maintaining supported software and operating systems. As such, we recommend organizations: • Continue to install new security patches • Upgrade to a supported version of Microsoft OS • Patch Arcserve UDP Appliances and RPS servers • Block legacy protocols, like SMBv1, to protect against future evolutions of the malware • Promptly patch their systems with Microsoft’s MS17-010 security update Don’t pay the ransom Manual decryption by attackers is required in the case of WannaCry. Given the intense search for those responsible, ransom payments are expected to remain untouched in Bitcoin addresses and requests for decryption to go unanswered. That said, files stored outside of Desktop, Documents, or removable media may still be recoverable using the undelete tool. Assess your backup and disaster recovery strategy WannaCry has drawn the critical need for ransomware remediation into sharp focus. As such, we recommend all organizations take immediate steps to ensure they’re empowered to successfully backup and recover their data: • Examine your RPOs and RTOs. • Confirm all data sources are backed up. Ensure your critical systems are backed up as Identify any servers or sources of data missing from frequently as possible, and that system recovery your data protection plan and apply the correct level will deliver against your business requirements. of data availability to ensure they’re recoverable. • • Access the backup server as a user. • The 3-2-1 rule. When logging into your secure server, make sure Store at least three different copies of your data on you’re logging in as a user, not as an administrator. two different media, with at least one copy stored Never use your administrator account when opening offsite. It’s critical that your backup strategy features email or searching the web. redundancies and leverages storage options not vulnerable to attack—like tape, offline disk, and cloud. Protect the protector. Make sure your backup files are stored on a secure • Practice the principle of least privilege. server with access limited only to those that When configuring accounts, only grant the degree of absolutely require it. These files are your best chance access privileges absolutely required by each role. at remediation, so ensure they’re secure. Real-world ransomware recovery “The last ransomware attack was unbelievably major. It hit 45 different servers, spread itself, and just went crazy. The executive suite actually moved into my office for a period of time, if that tells you anything.” With Arcserve UDP, the IT network administrator was able to swiftly restore the backup from the previous evening, sidestepping a $30,000 ransom. Circumvent ransom demands with Arcserve Unified Data Protection Relied upon by 48,000+ customers in 150 countries around the world, award-winning Arcserve UDP delivers the enterprise-grade capabilities and ease-of-use required by small and overstretched IT teams. Get the unparalleled flexibility you need to recover from both massive ransomware attacks and ordinary, everyday disasters, while meeting the unique needs of your business: • Effortlessly deploy Arcserve as a software, • appliance, or cloud solution • • coverage as your organization grows—from 1TB to 1PB, and beyond Protect physical and virtual data, no matter where it lives—onsite, offsite, offline, and in the cloud • Instantly stand-up critical applications with virtual standby or Instant Virtual Machine Easily identify actual RPOs and RTOs, set-up automated testing, and identify unprotected Seamlessly scale your backup and recovery • machines with Assured Recovery capabilities Recover your data from file-based and image-based backups, or continuously available solutions And, do it all from a single, elegantly simple management console Ensure you’re protected Contact your Arcserve representative or call +1 844 639 6792 to get started today For more information on Arcserve, please visit arcserve.com