Protect and secure your data from cyber attacks
Data Protection
Data Security
Data Insights
The 5 Steps to Cyber Resilience
Cloud & SaaS
Enterprise
Industries
Hackers are attempting to exploit Windows and backup applications’ vulnerabilities to impersonate privileged backup users. They grant themselves backup privileges that allow them to lock the victim’s system, prevent legitimate user access, and lock and/or remove backup files to create double extortion opportunities. With Windows being the most common operating system in the world and, according to the Common Vulnerabilities and Exposures (CVE) database, the most prone to security issues, ransomware hackers are specifically targeting organizations running backup applications on Windows.
While Veritas NetBackup customers can choose to use Windows, some backup solution providers only support Windows, making their customers vulnerable with NO options to mitigate these attacks. Veritas supports alternative operating systems and best practices that provide customers immunity from this type of nefarious activity.
Don’t become a victim! Assess your data protection strategy and take steps to prevent these types of attacks.
In addition to implementing the safeguard recommendations described in the Threatpost article, here are five backup-specific best practices you can use to reduce or eliminate vulnerabilities.
Top 5 Ransomware Resilience Best Practices:
Deploy the most up-to-date data protection infrastructure on hardened OS platforms using technologies like Security-Enhanced Linux. These hardened platforms provide host-based Intrusion Detection (IDS) and Prevention (IPS) by blocking rogue connections and denying malicious code execution.
NetBackup Feature:
The Veritas portfolio consisting of Veritas Flex and Flex Scale-based Appliances offers the entire NetBackup Platform on performance- and cost-optimized hardware as a single turnkey solution. Security-Enhanced RedHat Linux limits the IT attack surface from malware, while the deduplication engine offers optimized, encrypted, and immutable storage to limit risk from possible data exfiltration. For organizations looking to deploy on their own infrastructure, it’s best to deploy the most recent version of NetBackup (currently v9.1) on Security-Enhanced Linux.
Following these best practices will ensure your organization is protected against ransomware attacks, as outlined in the Threatpost article. In the event of a successful attack, recovery of data and applications becomes the most critical action to take. Unlike other data protection solutions on the market, NetBackup provides one-click recovery to existing or new production environments or an isolated recovery environment. This simplifies the recovery process and reduces the time it takes to get your business back online.
Written By
Dylon Mills
Senior Principal Product Manager, Enterprise Data Protection