Backup your data and set your own version/ generation limit
meaning you can go back to any point in time to restore data.
According to Purplesec.us
You've seen them in the news - organizations with their data stolen and payments to the perpetrators for it to be returned. Despite your best efforts, new strains of ransomware and other malware continue to threaten your enterprise and customer data.
While you still have the chance, protect your data.
Ransomware is a form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.
Ransomware, among other cyber threats, has evolved into a case of “when,” not “if.” To ensure your data can be recovered, you need a solution with the best technology, people, and processes.
It is necessary for organizations to continuously measure the readiness of their recovery processes (such as anomaly detection, immutable backups, and air gaps). These evaluations are performed to find and fix problems, validate the recovery of data and business applications, and reduce their risks. To resume business operations quickly after an attack, fast restores are needed.
When ransomware does occur, you need to have a validated copy of your backup data that can be quickly restored to resume business operations. For a trusted and protected backup data copy, organizations need a layered approach that encompasses multiple security tools, resources, controls, best practices, and strategies. These various layers of security controls are applied within Commvault and around the Commvault infrastructure to help ensure the backup data is secured and recoverable. These steps provide the confidence that when an attack does occur, your backup data is ready.
Ransomware is often spread through email phishing messages that contain malicious links or through drive-by downloading. Drive-by downloading happens when a user unintentionally visits a contaminated site, and malicious software (malware) is downloaded onto the user’s computer or mobile device. A drive-by download usually exploits a browser, application, or operating system that is out of date or has a security flaw. Ransomware then uses these vulnerabilities to find other systems to spread to.