Commvault
Ransomware Overview
- Jordan Cannata (Unlicensed)
- tdopko@commvault.com (Unlicensed)
- Carl Brault (Unlicensed)
Quick Links to Topics:
Millions of computers have been infected with ransomware type malware, such as WannaCry, CryptoLocker, CBT-Locker, Tesla Crypt, and more. Ransomware malware takes a user system hostage by encrypting popular file types, such as Office Files, image and video files that are present on the computer. The criminal organization behind the malware then asks the user for money to receive the key that allows decrypting the data, thus the name, ransomware.
This type of virus spreads itself very quickly when it can infiltrate a company network; making it hard to limit the damages when systems are not properly monitored. Therefore, a system administrator must find ways to be alerted as soon as possible to react to an infection. To help detect such attacks, Commvault® software provides various tools to combat ransomware.
Ransomware spreading on an organization network
Prevention and Detection
The first line of defense against an attack is prevention and detection. Prevention methods minimize the risks of an attack being triggered. Unfortunately, malware could still be executed even with the best prevention possible. Having reliable detection systems enables an administrator to quickly stop infections and avoid attacking additional systems and data. By implementing a sound strategy, less data will be recovered on infected systems.
Ransomware Protection Strategy
Implementing the best protection possible against malware attacks must be planned properly. Simply having a good anti-virus does not sufficiently counter modern infection systems. The strategy must prevent and detect attacks, react once potential threats are detected and ultimately, recover infected data.
Recommended ransomware protection strategy
Copyright © 2021 Commvault | All Rights Reserved.