Click on the words highlighted in gold[1] for more information.

How We Overcame A Ransomware Attack

By Tony Mendoza, senior director, IT, Spectra Logic Corp.

"With a rough calculation, I figured the ransom would be around $3.6 million, and we had five days to pay it off in bitcoin or we were on our own."

If you’re in the storage business, the last thing you want to do is ‘announce’ a ransomware attack[2].

But that’s actually counter-intuitive. We were hit with ransomware, and as a storage business, we feel it is important to share the story in order to help others prepare[3].

As senior director of IT, I’m not usually involved in the small, day-to-day glitches that occur. I’ve got a great team of IT professionals, and they rarely have to involve me in such normal operations. Thursday morning, May 7, 2020, would prove to be anything but ‘normal operations.’

[2]

Ransomware is a type of malicious software that prevents users from retrieving their data. The malware encrypts the files on your system and IT infrastructure and holds it “hostage” until the demanded ransom is paid.

[3]

Read More

Prepare Now for a Ransomware Attack

Hackers attack (see how they do it[4]) every 39 seconds, or an average of 2,244 times a day; 51% of businesses have been impacted by ransomware in the last year; and 50% of IT professionals don’t believe that their organization is ready to defend against a ransomware attack. What are we doing wrong? Or more to the point, what could we do better?[5]

Once attacked, how do you get your files without paying a huge ransom[6]? Spectra has you covered. Learn more with these white papers:

Protecting Your Business from Ransomware
Helper code for getting input names from a google form:
      const form = document.querySelector("form");
      console.log(form.action);
      const inputs = form.querySelectorAll("input, textarea");
      [].forEach.call(inputs, (input) => {
        if (input.name.indexOf("entry") === 0) {
          console.log(input, input.name);
        }
      });
    

Protecting your Business from Ransomware

The changing landscape of the data protection industry has evolved from backing up data in order to recover from hardware and network failures, software bugs and human errors, to fighting a mounting wave of cybercrime. Over the years, hardware and software have significantly improved their reliability and resiliency levels. However, cybercrime has now become a bigger threat to data protection.

Attack Hardened Storage

Building Data Resilience from External and Internal Threats

The changing landscape of the data protection industry has evolved from primarily backing up data in order to recover from hardware, software, network failures and human errors, to fighting a mounting wave of cybercrime. Over the years, hardware and software have significantly improved their reliability and resiliency levels but security is a people problem, and people are committing the cybercrimes.

Webinar: When Ransomware Hits

Spectra’s IT Director Tony Mendoza shares his first-hand experience on how he and his team were able to prevail over a ransomware attack by utilizing the best-of-breed business continuity and disaster recovery plans that Spectra had previously developed for itself.

Data Management and Storage Solutions

The strongest defense against risk and the best assurance for full data protection in the event of a disaster is the strategic deployment of a combination of attack-hardened technologies, including Spectra tape libraries[7] and Spectra BlackPearl Solutions.

Click on one of the logos to learn more.

Nobody does data storage better than Spectra Logic[8]. With over 40 years of expertise in helping the world’s biggest brands preserve their data, Spectra provides its customers with disaster recovery protection that is both long term and economical.

[7]
[8]

[1]

You will discover something new when you click on the text in gold on this page.

[5]

How prepared are you for a ransomware attack? We can rank your ransomware preparedness based on this checklist.

Building a Robust Backup Strategy - Your Ransomware Checklist

5 Steps To Take Before An Attack:

Helper code for getting input names from a google form:
      const form = document.querySelector("form");
      console.log(form.action);
      const inputs = form.querySelectorAll("input, textarea");
      [].forEach.call(inputs, (input) => {
        if (input.name.indexOf("entry") === 0) {
          console.log(input, input.name);
        }
      });
    

4 Steps To Take After An Attack:

Helper code for getting input names from a google form:
      const form = document.querySelector("form");
      console.log(form.action);
      const inputs = form.querySelectorAll("input, textarea");
      [].forEach.call(inputs, (input) => {
        if (input.name.indexOf("entry") === 0) {
          console.log(input, input.name);
        }
      });
    
[6]

DID YOU KNOW?

Nearly 83% of companies pay to retrieve their data in response to a ransomware attack. We can help your company be one of the the ones who doesn't have to.

83%

Source: ZDNet