Business Daily Media

The Times Real Estate

.

Cybercriminals are targeting backups: How to protect your business

  • Written by James Bergl, regional vice president ANZ at Datto

Backups are a critical part of any business infrastructure. If your primary data becomes compromised by malicious intent or human error (e.g. accidental deletion), the backup enables the business to be up and running again in the shortest time possible.

However hackers are enterprising people. Backups, a key component of business continuity and disaster recovery (BCDR) plans, are now being targeted by bad actors. If your backup is encrypted due to a ransomware attack, it may appear the only option is to pay the ransom—but even then, can cybercriminals be trusted with their word? If your business’ backup is hit, it means the last line of defence has fallen. So how can businesses improve their cyber resilience and protect their backups? Does your organization has skilled ethical hackers who can tackle these attacks? If not, it is really important to get your employees trained in this field. There is plenty of Ethical Hacking course online from where they can get trained.

Hacking, malware and errors are backups’ biggest threat

According to the Verizon 2020 Data Breach Investigations Report (DBIR), attacks on small and medium sized businesses (SMBs) accounted for 28 per cent of all cyberattacks last year. It also found that malware poses a great threat to SMBs, along with hacking and user error.

In fact, the report found hacking occurred in 45 per cent of breaches, while errors accounted for 22 per cent.

When it comes to compromising backups, hackers are increasingly looking at vulnerabilities in backup software, backup files and the systems where backups are stored.

Backup software by nature requires a high level of access to systems, files and virtual machines. To access this software, hackers are known to steal administrator credentials and use those passwords and logins as a backdoor to infect systems. Some backup software also maintain a configuration database that stores credentials needed to access the backup. By accessing this configuration database, hackers gain access to every connected system.

Other vectors that hackers use include accessing backup files, which are easily identified through their .BAK file extension. If a hacker finds these files, they can simply turn off access or delete the files, making recovery impossible. Remote monitoring and management (RMM) solutions are also a point of compromise, along with remote access to backups, where the hacker obtains easy-to-steal and easy-to-guess passwords.

How to protect your business against backup attacks

There are a number of strategies you can use to protect your backup files against hackers, malware, human error and improve your business’ overall cyber resilience.

The first step you can take is to be proactive and scan for ransomware during backup. Detection and prevention is the best cure for this sort of attack. Most modern backup solutions offer ransomware scanning as an integral part of the package—so use it!

The next step is to make sure backups are kept off-site in a secure location. You need to have an air-gap between your production systems and your backup data so that if your primary data is compromised, there’s no way for the hackers or malware to jump the air-gap and encrypt or otherwise steal your backup data.

If you have offsite backups, they can be used to quickly restore a system that’s been hacked or infected by ransomware. Cloud storage is the perfect solution to this off-prem backup conundrum, allowing business owners to get things up and running quickly after an attack.

It’s critical that you have more than one copy of a backup. With modern backup solutions, granular backups, or snapshots of your data can be captured in increments, from a matter of minutes to up to 24 hours, letting you return to a point in time before your systems were compromised.

Finally, invest in a BCDR solution. This will allow you to recover business operations quickly, either locally, or in the cloud, if your business operations are compromised.

Backups are under attack. Whether it’s hacking, malware or human error, backups can be compromised, so it’s important to prepare your business to be able to recover from an attack and improve overall cyber resilience. With BCDR, as well as offsite backups and malware scanning, you can ensure your organisation is protected.

Five signs that AI is growing faster than the internet did

What do Aussie businesses need to do to keep up? There has been mounting chatter that AI is growing even faster than the rapid acceleration we sa...

Protecting Your Small Business from Cyber Threats This Holiday Season

The holiday season brings a surge of online activity for small and medium businesses (SMBs), with increased sales and customer inquiries offering ...

Essential SEO Strategies: Boosting Your Real Estate Business

In recent years, it is said that more and more people are searching for properties online than those who visit real estate companies in person. For ...

Every Business Needs to Apply a Concrete Strategy

Do you want your website to rank higher in the top results of the Google search engine? Then hire the excellent SEO Services in Australia for your n...

Navigating Cyber Fraud After a Natural Disaster

As Australia enters another long, hot and potentially destructive summer, businesses and residents are preparing for the natural disasters synonym...

8seats messaging startup aims to transform business communication

The new platform brings an innovative approach to unite office-based and desk-less teams 8seats, a next-generation messaging platform for busine...

Sell by LayBy