Access your Pro+ Content below.
Wanna laugh? Data protection techniques give ransomware the boot
This article is part of the Storage magazine issue of July 2017, Vol. 16, No. 5
You have to feel badly for all the organizations that were victimized in May by the WannaCry gang and watched helplessly as their lifeblood data got stitched up into an unrecognizable and unreadable form. Given the circumstances and how dire the effects might be on some companies, it's pretty easy to resist saying "I told you so" to the storage jockeys caught with their defenses down. Hopefully, those outfits that bit the bullet and bitcoined their way out of encryption hell are back in business and wiser for the experience. But if this ransomware episode plays out like previous attacks, a lot of companies will pay up and still not get their data back. As the old saying goes, there's no honor among thieves. Defending against this type of security breach is a lot different from defending against other insidious attacks. What makes ransomware different is that it's all about storage. The bad app locks up your storage, and you either unravel the rogue code's encryption or start learning about blockchain technology and shipping ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
The storage piece of the HCI market is complex and confusing. Know the most important features to consider as you evaluate your options.
Enterprises look for the best deal from the vendor with the best reputation when turning to the cloud to tame growing data volumes for archiving, backup and more.
Many vendors offer highly scalable object storage-based products with file interfaces, making the technology more accessible than ever as an alternative to NAS.
There are many factors to consider when choosing between caching and tiering storage techniques to optimize storage. Knowing how and when to use either can make a big difference.
Columns in this issue
Done right, data protection such as cloud-based disaster recovery is the best countermeasure organizations have against insidious ransomware attacks.
Catalogic Software's approach to snapshot creation and management delivers pragmatic features to DevOps and more with the release of ECX 2.6.
Maximizing the value of incoming and outgoing data as a core business strategy demands transforming your IT infrastructure into a more agile and flexible entity.
Object storage, unlike traditional file and block storage, is well-suited to manage vast amounts of unstructured data.