Despite the availability of advanced security tools and technologies, no enterprise is ever truly ransomware-proof; it’s a matter of “when,” not “if.”
When an attack occurs and criminals hold an organisation’s data hostage, are there any alternatives to paying the ransom?
For Antoine Yang, Account Manager at data management firm Synology, rewarding the criminals should never be an option, especially when there’s a perfectly good strategy to protect enterprise data.
“There’s no system that is entirely immune to ransomware attacks, which makes backups crucial. Secure backups enable organisations to recover their data without paying the ransom,” he stated during a keynote address at the Cloud & IT Infrastructure Frontiers 2024 conference organised by Jicara Media.
On the count of 3-2-1
Implementing a 3-2-1 backup strategy can solve many data recovery challenges in the event of a data breach or a natural disaster, Yang explained. The strategy involves keeping three copies of any given data, storing two on separate devices or equipment, and housing the third offsite.
However, the job doesn’t end with creating backup copies. Enterprises must ensure the availability, integrity, and security of their data afterwards.
To simplify this process, Synology offers a centralised backup system that can aggregate data from physical servers, PCs, virtual machines, and the cloud through a single portal.
“You can choose from a variety of on-premises and cloud destinations as your secondary or third backup copy when using Synology to back up your data. Synology’s built-in technologies, along with its native cloud service, ensure that a third copy is kept remotely, achieving restoration and disaster recovery capabilities,” Yang noted.
To ensure that data stored on Synology’s platforms can be recovered, the company has enabled a function that detects silent data corruptions and initiates immediate repair, acting as a first line of defence to guarantee data reliability.
Moreover, to ensure data immutability, Synology has introduced WORM storage (Write-Once-Read-Many), which locks data saved to a particular appliance, preventing any modifications for a specified period.
Finally, using its built-in hypervisor, Synology records a video after backup completion. This provides visual confirmation of the backup image.
In terms of recovery, Yang remarked that enterprises can access file-level recovery or full bare-metal recovery: “You can recover specific files or folders without affecting the entire system. We provide a self-service portal that allows you to restore individual files. In the event of a system compromise, we ensure that you can recover your entire system, including the operating system and application data, all at once.”
Powering Toyota’s data strategy
Like the chassis of a car, Synology supports enterprises like Toyota in implementing a robust yet flexible data management strategy.
With over 10 million vehicles manufactured annually, Toyota’s IT system capacity continues to grow. According to Yang, the Japanese carmaker in Vietnam has 80TB of storage requirements and faces urgent needs for ransomware protection and ensuring business continuity.
“Toyota chose us, utilising Active Backup for Business (built-in software) to centralise data from an 80TB virtual machine cluster onto a Synology server. They added an additional layer of protection with offsite backups using the Replication method. This solution helped Toyota secure their data and maintain uninterrupted operations,” Yang revealed.
After deploying Synology’s solutions, Yang said Toyota was able to save 75% on costs compared to their previous backup solution.
Backup security and monitoring
With hybrid cloud emerging as the current preferred cloud strategy among enterprises, leveraging cloud monitoring tools to protect on-premises storage or backup appliances from potential failure is crucial, Yang said.
To this end, Synology developed its Active Insight application, which provides real-time monitoring and analytics.
“We don’t just monitor your hardware to prevent ransomware attacks; we also provide actionable insights to mitigate those risks. By continuously monitoring backup devices, Active Insight can immediately respond to security incidents, such as unfamiliar access, intrusions, or file changes — all of which are early signs of ransomware attacks,” Yang explained.
The solution features a monitoring dashboard where users can centralise oversight of multiple devices, Yang added. The monitoring application also allows visibility into file operations, including user folders and file labels.
“Active Insight provides instant alerts and security monitoring, allowing it to quickly respond to any suspicious activities and provide detailed reports on vulnerabilities,” Yang continued.
In conclusion, enterprises should not be beholden to ransomware. Beyond implementing detection and response technologies, data recovery ensures that companies do not find themselves back at square one should a data breach occur. Implementing a 3-2-1 backup strategy, complemented by actionable insights, is a smart way to protect data while ensuring easy access and recovery.