Best Practices for Enterprise Data Protection
Veeam is using October to alert Europe’s citizens to the threat of ransomware. The number of these attacks increased by 151 percent worldwide in the first six months of 2021.
Edwin Weijdema, Global Technologist at Veeam
Edwin Weijdema, Global Technologist at Veeam reports: “Ransomware is evolving in many ways. Current threats can either simply encrypt data and demand a ransom, or even act as blackmail by deleting data or threatening to sell previously stolen data. We therefore believe that when it comes to fighting ransomware, recovering the data is the only option. Don’t pay a ransom and focus on training your employees to adopt best practices and recovery strategies.“
Five tips to serve the defense that Veeam from the US National Institute of Standards and Technology (NIST) has adopted official best practices for companies to protect data:
Entrepreneurs need to know their networks to know which areas are particularly at risk. In addition, you should identify your most important data and assets for yourself and shield them particularly well. In doing so, it helps to train employees to set up some kind of human firewall. It also requires a business continuity contingency plan that includes important contacts and actions and is kept in a safe place.
In addition to prevention, it is important to be able to limit and weaken the effects of an attack. Secure passwords that occur only once are among these tips. Likewise, multi-factor authentication and the removal of unused devices from the network to avoid shadow IT. The data itself is best protected by a data backup. Veeam’s 3-2-1-1-0 rule is useful for backup: three copies of all important data on two different media, one outside the company. A copy should be unalterably programmed, or physically present, and regular testing guarantees error-free recovery.
The faster an event is detected, the faster it can be answered. Ransomware in particular is preparing quickly and must be prevented from moving sideways through the network as early as possible. Alarms, warnings, and well-written security policies help a lot here. Setting up traps, such as a deliberately idle administrator account, also helps, because a virtual tripwire – in which a suspicious activity gets caught – immediately sounds the alarm.
Good reactions need a thoughtful plan, not affect actions. Detection, communication, control and remediation must be coordinated and calm in the event of an attack. For this reason, executives should never blame the IT department or other employees for an incident from the gut. This does not help to react calmly, but fuels fear, resentment and stress.
Not all hacker attacks can be prevented. Therefore, a modern data backup including a plan for the rapid recovery of data is needed to maintain operation.
Rick Vanover, Senior Director, Product Strategy at Veeam
Measures must be prioritized and backups must be out of the reach of malware. In addition, the development of backup systems must focus on recovery performance, not just the time required for backup alone. Important are the recovery SLAs in the form of RPO and RTO values that are acceptable to the particular company.
“Everyone needs to be prepared for a ransomware attack against their data,” explains Rick Vanover, Senior Director, Product Strategy at Veeam“But IT security is not just about having a plan, it’s about creating a culture so that all employees are aware of their role in protecting critical data and systems.“
Learn more about Veeam’s leadership in modern data protection and read the latest Whitepaper 5 Ransomware Protection Best Practices . In it, you’ll learn where to start on your journey to protect against ransomware.