How We Overcame A Ransomware Attack

Spectra’s IT Director, Tony Mendoza, shares how his team prevailed over a ransomware attack by utilizing the best-of-breed business continuity and disaster recovery plans that Spectra developed.

By Tony Mendoza, senior director, IT, Spectra Logic Corp.

If you’re in the storage business, the last thing you want to do is ‘announce’ a ransomware attack[2].

But that’s actually counter-intuitive. We were hit with ransomware, and as a storage business, we feel it is important to share the story in order to help others prepare.

the industries most affected by ransomware

As senior director of IT, I’m not usually involved in the small, day-to-day glitches that occur. I’ve got a great team of IT professionals, and they rarely have to involve me in such normal operations. Thursday morning, May 7, 2020, would prove to be anything but ‘normal operations.’

Start

Prepare Now for a Ransomware Attack

Hackers attack (see how they do it[3]) every 39 seconds, or an average of 2,244 times a day; 51% of businesses have been impacted by ransomware in the last year; and 50% of IT professionals don’t believe that their organization is ready to defend against a ransomware attack. What are we doing wrong? Or more to the point, what could we do better?[4]

Once attacked, how do you get your files without paying a huge ransom? Spectra has you covered. Learn more with these white papers:

Protecting Your Business from Ransomware
Helper code for getting input names from a google form:
      const form = document.querySelector("form");
      console.log(form.action);
      const inputs = form.querySelectorAll("input, textarea");
      [].forEach.call(inputs, (input) => {
        if (input.name.indexOf("entry") === 0) {
          console.log(input, input.name);
        }
      });
    

Protecting your Business from Ransomware

The changing landscape of the data protection industry has evolved from backing up data in order to recover from hardware and network failures, software bugs and human errors, to fighting a mounting wave of cybercrime. Over the years, hardware and software have significantly improved their reliability and resiliency levels. However, cybercrime has now become a bigger threat to data protection.

Attack Hardened Storage

Building Data Resilience from External and Internal Threats

The changing landscape of the data protection industry has evolved from primarily backing up data in order to recover from hardware, software, network failures and human errors, to fighting a mounting wave of cybercrime. Over the years, hardware and software have significantly improved their reliability and resiliency levels but security is a people problem, and people are committing the cybercrimes.

Data Management and Storage Solutions

The strongest defense against risk and the best assurance for full data protection in the event of a disaster is the strategic deployment of a combination of attack-hardened technologies, including Spectra tape libraries[5] and Spectra BlackPearl Solutions.

Click on each of these logos to learn more.

Nobody does data storage better than Spectra Logic[6]. With over 40 years of expertise in helping the world’s biggest brands preserve their data, Spectra provides its customers with disaster recovery protection that is both long term and economical.

[5]
[6]

[2]

DID YOU KNOW?

Nearly 83% of companies pay to retrieve their data in response to a ransomware attack. We can help your company be one of the the ones who doesn't have to.

83%

Source: ZDNet

[4]

How prepared are you for a ransomware attack? We can rank your ransomware preparedness based on this checklist.

Building a Robust Backup Strategy - Your Ransomware Checklist

5 Steps To Take Before An Attack:

Helper code for getting input names from a google form:
      const form = document.querySelector("form");
      console.log(form.action);
      const inputs = form.querySelectorAll("input, textarea");
      [].forEach.call(inputs, (input) => {
        if (input.name.indexOf("entry") === 0) {
          console.log(input, input.name);
        }
      });
    

4 Steps To Take After An Attack:

Helper code for getting input names from a google form:
      const form = document.querySelector("form");
      console.log(form.action);
      const inputs = form.querySelectorAll("input, textarea");
      [].forEach.call(inputs, (input) => {
        if (input.name.indexOf("entry") === 0) {
          console.log(input, input.name);
        }
      });