Sales Hotline: 1-800-691-1991 8am - 8pm ET
English
White paper

Solution Brief: Veeam Best Practice for Countering Ransomware

Please rate how helpful this article was to you:
3.5 out of 5 based on 3 ratings
Thank you for helping us improve!
An error occurred during voting. Please try again later.
Published: April, 2017

Ransomware attacks are a serious threat to industries worldwide. According to the FBI, ransomware collected $209 million in the first three months of 2016 and is on pace to reach $1 billion in 2016. While healthcare organizations are the most publicized victims, this is a growing threat across all industries.

There are two common types of ransomware; lock screen, such as FakeBsod & Brolo, which lock screens and ask for payment to unlock them and encryption, such as CryptyWall, Lock and TorrentLocker, which encrypt data on a drive and demand payment to unlock it.

With ransomware evolving into a more complex and frequent phenomenon, organizations should follow common best practices for data protection, including the 3-2-1 principle: THREE copies of data on TWO different types of media and ONE copy stored offsite. The 3-2-1 Rule of data protection along with Veeam® Availability Suite™ enables companies to prevent data loss due to ransomware, by quickly and effectively restoring it in case of an attack.

Learn how by following the best practices, Veeam can help customers to avoid data loss caused by a ransomware attack and recover fast and securely.

In this solution brief, you will discover several techniques to fight ransomware, including:

  • The 3-2-1 Rule for data protection
  • How to recover your data after a ransomware attack with Veeam
  • Unique Veeam features that facilitate a rapid file recovery from ransomware
  • And much more!

Ransomware attacks are a serious threat to industries worldwide. According to the FBI, ransomware collected $209 million in the first three months of 2016 and is on pace to reach $1 billion in 2016. While healthcare organizations are the most publicized victims, this is a growing threat across all industries.

There are two common types of ransomware; lock screen, such as FakeBsod & Brolo, which lock screens and ask for payment to unlock them and encryption, such as CryptyWall, Lock and TorrentLocker, which encrypt data on a drive and demand payment to unlock it.

With ransomware evolving into a more complex and frequent phenomenon, organizations should follow common best practices for data protection, including the 3-2-1 principle: THREE copies of data on TWO different types of media and ONE copy stored offsite. The 3-2-1 Rule of data protection along with Veeam® Availability Suite™ enables companies to prevent data loss due to ransomware, by quickly and effectively restoring it in case of an attack.

Learn how by following the best practices, Veeam can help customers to avoid data loss caused by a ransomware attack and recover fast and securely.

In this solution brief, you will discover several techniques to fight ransomware, including:

  • The 3-2-1 Rule for data protection
  • How to recover your data after a ransomware attack with Veeam
  • Unique Veeam features that facilitate a rapid file recovery from ransomware
  • And much more!
Please rate how helpful this article was to you:
3.5 out of 5 based on 3 ratings
Thank you for helping us improve!
An error occurred during voting. Please try again later.