Business Daily Media

SME Business News

Cybercriminals are targeting backups: How to protect your business

  • Written by James Bergl, regional vice president ANZ at Datto

Backups are a critical part of any business infrastructure. If your primary data becomes compromised by malicious intent or human error (e.g. accidental deletion), the backup enables the business to be up and running again in the shortest time possible.

However hackers are enterprising people. Backups, a key component of business continuity and disaster recovery (BCDR) plans, are now being targeted by bad actors. If your backup is encrypted due to a ransomware attack, it may appear the only option is to pay the ransom—but even then, can cybercriminals be trusted with their word? If your business’ backup is hit, it means the last line of defence has fallen. So how can businesses improve their cyber resilience and protect their backups? Does your organization has skilled ethical hackers who can tackle these attacks? If not, it is really important to get your employees trained in this field. There is plenty of Ethical Hacking course online from where they can get trained.

Hacking, malware and errors are backups’ biggest threat

According to the Verizon 2020 Data Breach Investigations Report (DBIR), attacks on small and medium sized businesses (SMBs) accounted for 28 per cent of all cyberattacks last year. It also found that malware poses a great threat to SMBs, along with hacking and user error.

In fact, the report found hacking occurred in 45 per cent of breaches, while errors accounted for 22 per cent.

When it comes to compromising backups, hackers are increasingly looking at vulnerabilities in backup software, backup files and the systems where backups are stored.

Backup software by nature requires a high level of access to systems, files and virtual machines. To access this software, hackers are known to steal administrator credentials and use those passwords and logins as a backdoor to infect systems. Some backup software also maintain a configuration database that stores credentials needed to access the backup. By accessing this configuration database, hackers gain access to every connected system.

Other vectors that hackers use include accessing backup files, which are easily identified through their .BAK file extension. If a hacker finds these files, they can simply turn off access or delete the files, making recovery impossible. Remote monitoring and management (RMM) solutions are also a point of compromise, along with remote access to backups, where the hacker obtains easy-to-steal and easy-to-guess passwords.

How to protect your business against backup attacks

There are a number of strategies you can use to protect your backup files against hackers, malware, human error and improve your business’ overall cyber resilience.

The first step you can take is to be proactive and scan for ransomware during backup. Detection and prevention is the best cure for this sort of attack. Most modern backup solutions offer ransomware scanning as an integral part of the package—so use it!

The next step is to make sure backups are kept off-site in a secure location. You need to have an air-gap between your production systems and your backup data so that if your primary data is compromised, there’s no way for the hackers or malware to jump the air-gap and encrypt or otherwise steal your backup data.

If you have offsite backups, they can be used to quickly restore a system that’s been hacked or infected by ransomware. Cloud storage is the perfect solution to this off-prem backup conundrum, allowing business owners to get things up and running quickly after an attack.

It’s critical that you have more than one copy of a backup. With modern backup solutions, granular backups, or snapshots of your data can be captured in increments, from a matter of minutes to up to 24 hours, letting you return to a point in time before your systems were compromised.

Finally, invest in a BCDR solution. This will allow you to recover business operations quickly, either locally, or in the cloud, if your business operations are compromised.

Backups are under attack. Whether it’s hacking, malware or human error, backups can be compromised, so it’s important to prepare your business to be able to recover from an attack and improve overall cyber resilience. With BCDR, as well as offsite backups and malware scanning, you can ensure your organisation is protected.

Business Daily Media Business Development

SAP study finds e-invoicing could save Aussie SMBs over $40,000 a year

Those who have already transitioned report saving time and money, greater accuracy and security    SAP SE (NYSE: SAP) today announced Australian small and medium-sized businesses...

NewsServices.com - avatar NewsServices.com

5 Mistakes of Online Stores Solved by Sales Automation

#1 Recordkeeping is done in office programs (like Excel) Let’s suppose that you own a small online store with some 20-30 items in the assortment, and you make two or three sales per d...

Igor Kovsher - avatar Igor Kovsher

Zoho Boosts Competitive Opportunity for Global Businesses with New Cutting Edge Technology

Zoho Corporation, a leading global technology company, today introduced new apps and services in Zoho One, the operating system for business. The new release empowers businesses to solve...

Vijay Sundaram - avatar Vijay Sundaram

Amadeus and Virgin Australia renew global distribution partnership

Virgin Australia has renewed its multi-year air content distribution partnership with Amadeus, which means travel sellers that are connected to the Amadeus Travel Platform will enjoy a...

Business Daily Media - avatar Business Daily Media

Writers Wanted



NewsServices.com

Content & Technology Connecting Global Audiences

More Information - Less Opinion