This is a post series on cyber crime. For more posts click here or the cybercrime tag below.
Another rant on the Market Ticker, about another victim of ransomware.
Now the question:
Where is your backup design? Who cares about such an infection as it’s instantly obvious it happened (and thus the amount of time that passes before you get hosed is near zero — and thus the changes made to files before you know it happened are also near zero) which means the damage accruing between it starting and you knowing is extremely small. If you have a solid backup paradigm you re-image the impacted computer(s) and restore from the backup previous to the infection. I can literally have machines back online within an hour in an instance like this. Why would you pay $2,400? I’ll tell you why: There was no backup system in place that actually worked on a contemporary basis and thus a restore either would have lost a material amount of data or there was no backup that worked at all. Whoever is doing IT for this office ought to be out on their ass and charged with criminal malfeasance.
This isn’t the first cop department to take this action this either — it’s just another in a line of them.
Here’s the story about the victim.
The problem with Mr. Dellingpole’s argument is that any backup system that works contemporaneously. running on a MS network, which most systems do, is terribly vulnerable to the attack and will, more than likely get hit too. Either the entire system is secure or it’s not and we are dealing with the fundamental insecurity of the system. This is something that no amount of backing up can solve.
In the end the only solutions are to rewrite the communications and operating systems so that they are fundamentally secure, remove barriers and anonymity from users until there is a foundation of trust between or both. At this point there really are no longer any choices.
The week in ransomware.