Data is everywhere.
Protecting it is everything.
Datto's solutions safeguard businesses from IT disasters, human error, and malicious activity.
With Datto defending your business, you are guaranteed business continuity with uninterrupted access to data on-site, in transit, and in the cloud.
What is Ransomware?
Malicious software that locks your files and demands payment to access them.
Ransomware is a term for the many variations of malware that infect computer systems, typically by social engineering schemes.
A cryptovirology attack encrypts critical files and systems and renders them inaccessible to the owner.
Ransomware sometimes marks the files for permanent deletion or publication on the internet. The perpetrators then demand a payment (usually in untraceable cryptocurrency like Bitcoin) for the private key required to decrypt and access the files. Infamous ransomware examples include CryptoLocker, CryptoWall, Locky, Cerber, KeyRanger, SamSam, TeslaCrypt, TorrentLocker, and Reveton.
Who are Ransomware Perpetrators?
Cybercriminals who profit greatly by violating businesses that rely on data as a lifeblood.
Ransomware cybercriminals are organized and profitable. It is estimated that this type of attack earns criminals $10 million to $50 million per month.
There are entire ransomware outfits working out of office buildings, making the stealthy and disruptive pieces of malicious software, and designing deceptively simple schemes to infiltrate small to medium sized businesses.
The criminals are business-minded innovators. Recently, a Ransomware-as-a-Service organized cybercrime ring was discovered, which infected around 150,000 victims in 201 countries in July 2016; splitting profits 40% to malware authors and 60% to those who discover new targets.
The overhead is low, the profits are high, the Bitcoin is anonymous, the list of targets is endless, the technology is not overly complicated, and the odds of getting caught are low. Ransomware perpetrators are sophisticated, profit-hungry, cybercriminals on the lookout for unsuspecting SMBs to violate.
Could my business be a Ransomware victim?
In a word: Yes.
Ransomware perpetrators cast a wide net. They target small to medium sized businesses with IT security loopholes, valuable data, and a modest budget to pay the ransom.
If data is important to your business, you are a target.
To get in to your systems, they may send a phishing email to your staff. Because 94% of people can’t distinguish between a real email and a phishing email 100% of the time, they get in. And if they don’t, they try again until someone somewhere clicks the link.
Hardware, software, systems, and data centers – when they fail, your business doesn’t have to.
The 2016 Cyber Resilience Report found that 66% of companies in 61 countries experienced at least 1 cyber incident in the last year, caused primarily by phishing & social engineering, malware, spear phishing, denial of service, and out-of-date software, rendering the organization’s own network either contaminated or inoperable.
Due to global climate change, natural disaster occurrences have increased and intensified.
Since 2010, we have suffered 2,018 natural disasters (averaging 336 per year). The US is second only to China for the number of natural disasters. Natural disasters have cost the global economy $2.5 trillion since 2000. 80% of businesses suffering a major disaster go out of business in three years.
Human Error Disasters
The most frequent, most common, and often most detrimental cause of disasters that can disrupt business continuity is unintentional human error.
70% of the successful attacks on businesses came from internal threats like employees and contractors. Even small data losses - those with fewer than 100 files lost - cost between $18,120 and $35,730. A single poor choice by a single employee can lead to catastrophic data loss.
What could happen?
Disasters of all kinds cause downtime that is damaging to a business.
Disaster planning must encompass disasters of all types and sizes: fires, floods, fraud, ransomware, cyber-attacks, power or IT system failure, human error, acts of terror, and other unthinkable scenarios.
While the type of disaster varies, the impact is typical: data and operational downtime that is truly disastrous.
The devastating effect of downtime caused by disaster include irreparable damage to data, reputation, customer relationships, income, and business vitality.
The best offense is a good defense; you must protect your business by understanding your vulnerabilities, safeguarding against the risks, and preparing for the worst possible business disruption with a plan for business continuity and disaster recovery that will shield your data, protect your business, and keep your systems available and reliable no matter what happens.
How can I protect my business?
Your disaster recovery plan must ensure that your entire business infrastructure can be recovered within seconds.
You need a holistic, integrated disaster recovery plan that is reliable, simple, and quick. DRaaS offers a disaster recovery plan that is visible, scalable, and affordable.
Business-critical data, systems, desktops, servers, and the entire infrastructure must be protected and recoverable.
With secure local virtualization solutions, if disaster strikes, your entire infrastructure (physical or virtual) is virtualized instantly, empowering you to continue your business operations without losing any data, incurring any damage, or experiencing any downtime.
Businesses face a huge liability if a user deletes or overwrites a file, an email, or a record unintentionally; or if an employee leaves the company and takes their files with them. C2C Backup and Recovery unlinks critical business information from the user who created it and hands control back to the company.
Insider threats can be detrimental to a business and protecting your data from your trusted employees is an endless battle between a need for security and need for access. Work confidently knowing that even malicious attacks can be “undone” when a prior backup is restored.
Public companies, healthcare providers, financial organizations, and others with strict regulations must ensure that data is encrypted and protected in transit and at rest. SOC 2 Type II compliance, as well as compliance with the HIPAA Security Rule and Safe Harbor, ensures that rigorous standards for data security are met.
Add, delete, and archive users easily as C2C Backup and Restore enables your company to archive or export entire user accounts to save on licensing fees, easily swap user names, and save on third party storage fees and manual backup resources.
How Commuserv can help your business
get protected with Datto
No matter what or where the cybercriminals target, SIRIS will protect physical, virtual, and cloud infrastructures and data. The business continuity offered by Siris will protect you from ransomware.
Even if ransomware damages your data on cloud-based applications like Office 365, Google Apps, or SalesForce, using Backupify protects the data that is the lifeblood of your business.
Ransomware attacks are commonly spread through traditional file syncing, when one user’s infection can spread to others; By using Datto Drive, you can easily roll back to a backup created before the attack.