Ransomware is malware that finds and encrypts your organization’s files, often including your backups. Those files are only released if you pay a high ransom. Protecting your firm against ransomware is critical. Veeam and ExaGrid integrate to keep your backups safe so your firm can recover in the event of a ransomware attack. This blog outlines how these solutions help keep you protected and provides tips for protecting yourself against ransomware.
Veeam and ExaGrid
Veeam is one of the top cloud data management firms in the country. It automates core backup and recovery capabilities so you can recover anything, anywhere, at any time. Automated backups with built-in visibility ensure you have up-to-date, viable backups in the event of a ransomware attack. For example, Veeam’s SureBackup scans your backups for any hidden malware and notifies you if your backup may not be recoverable.
Veeam integrates seamlessly with ExaGrid, which provides the storage solution. ExaGrid offers a two-tiered architecture. The first tier is the Disk-cache Landing Zone, which enables fast backups and restores. The second tier is a non-network-facing tier called the Long-term Retention Repository. It stores long-term retention backup data away from the first tier.
10 Ransomware Defense Tips
Veeam and ExaGrid are one aspect of a multilayered approach to ransomware defense. Here are more tips:
Tip #1: Use Different Credentials for Backup Storage
The worst thing you can do is use DOMAIN\Administrator for everything. The best practice is to not join any backup server and/or component to the domain.
Tip #2: Give Each Backup Admin Individual Access
This allows you to track exactly who is doing what; visibility is essential.
Tip #3: Utilize Offline Storage
Why should you use offline storage? Ransomware attacks connected shares, and offline data can’t be directly accessed. Veeam Cloud Connect backups aren’t connected directly to the backup infrastructure and use a different authentication mechanism and API.
Tip #4: Leverage Different File Systems/Protocols for Backup Storage
Options for different file systems/protocols include Linux repositories, deduplication appliances, ReFS, and XFS.
Tip #5: DataLabs and Secure Restore
Veeam’s SureBackup performs tests in an isolated DataLabs environment. Secure Restore is a multi-step process to recheck when you restore.
Tip #6: Document Your Recovery Plan
You should create, document and test your disaster recovery plans. Make sure to have C-level executive and stakeholder signoff. Veeam’s Availability Orchestrator is one tool you can use to create dynamic documents and implement automated tests.
Tip #7: Have Visibility into Suspicious Behavior
Use monitoring software to detect suspicious virtual machine behavior. For example, Veeam ONE offers 24/7 real-time monitoring and alerting, with more than 340 preset alarms and 145+ reports.
Tip #8: Backup Microsoft Office 365 Data
Ransomware strains have been found that encrypt Office 365 emails in real time. While Microsoft offers some security tools, it’s your data and your responsibility to protect it. Veeam Backup for Microsoft Office 365 protects your Microsoft data, including Microsoft Exchange Online, SharePoint Online, OneDrive for Business, Microsoft Teams, and more.
Tip #9: Know Your Resources
Veeam, ExaGrid, and Peters all offer educational resources to help you defend your data from bad actors.
Tip #10 Master the 3-2-1 Rule
This tip can help you recover from any scenario, including ransomware attacks. You should have:
- 3 copies of your data on
- 2 different media
- 1 of which is off-site
Peters offers decades of experience in delivering cybersecurity support to a variety of organizations. Learn more about our IT security solutions.