{"id":34543,"date":"2022-06-16T15:00:48","date_gmt":"2022-06-16T14:00:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=34543"},"modified":"2022-06-16T11:07:32","modified_gmt":"2022-06-16T10:07:32","slug":"how-to-respond-to-a-ransomware-attack-the-right-way","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way","title":{"rendered":"How to Respond to a Ransomware Attack the Right Way"},"content":{"rendered":"<p class=\"p3\">It seems that every day we see another ransomware headline. But too often, backup and data protection solutions treat ransomware recovery just like any other type of recovery. The truth is recovery from ransomware has different requirements (and different best practices) than recovery from fire, flood, or hardware failure.<\/p>\n<p class=\"p3\">Here are some of the major differences between these two types of disasters:<\/p>\n<table class=\"t1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td class=\"td1\" valign=\"top\" width=\"33%\">\n<p class=\"p4\"><b>Consideration<\/b><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td2\" valign=\"top\" width=\"33%\">\n<p class=\"p4\"><b>Physical\/Natural Disaster<\/b><\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\" width=\"1%\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td3\" valign=\"top\" width=\"32%\">\n<p class=\"p4\"><b>Cyber Attack<\/b><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Recovery time<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p5\">Close to instant<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p5\">Reliable and fast<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Impact of disaster<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p5\">Regional, typically contained<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p5\">Global, spreads quickly<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Data volume impacted<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p5\">Comprehensive, all data<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p5\">Selective, targets foundational services<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td class=\"td4\" valign=\"top\">\n<p class=\"p5\">Recovery technique<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td5\" valign=\"top\">\n<p class=\"p5\">Standard DR, failback<\/p>\n<\/td>\n<td class=\"td1\" valign=\"top\">\n<p class=\"p4\">\n<\/td>\n<td class=\"td6\" valign=\"top\">\n<p class=\"p5\">Selective, part of incident response plan<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p class=\"p3\">When ransomware isn\u2019t the issue, you want the fastest possible recovery back to your original device or location. You want to minimize downtime and get back to normal as quickly as possible. This is what many backup and disaster recovery solutions are built to do.<\/p>\n<p class=\"p3\">However, when cyber criminals attack your network, a more nuanced response is called for. Of course, you want to minimize downtime and become operational as quickly as possible, but instantly restoring back to your original location can actually cause more problems.<\/p>\n<p class=\"p3\">There are two major risks:<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">Potentially restoring malware back into your production environment<\/li>\n<li class=\"li3\">Contaminating what has essentially become a crime scene, making forensic investigation difficult or impossible<\/li>\n<\/ul>\n<p class=\"p6\">In this scenario, you\u2019ll be best served by a data protection software that reduces the size of the attack surface and helps you recover to a secondary or sandbox environment while investigation is underway.<\/p>\n<h2 class=\"p7\">Reducing the Attack Surface<\/h2>\n<p class=\"p8\"><span class=\"s2\"><a href=\"https:\/\/www.n-able.com\/products\/cove-data-protection?promo=blog\" target=\"_blank\" rel=\"noopener\">Cove Data Protection<\/a><\/span>\u2122 reduces the attack surface in two ways. First, it isolates backup copies by default. Cove was built cloud-first, meaning that every backup is sent offsite, isolated in our private cloud, with no need for a local appliance to act as the \u201cmiddleman.\u201d This puts your primary online backup storage off the local network, out of the reach of ransomware.<\/p>\n<p class=\"p8\">But cloud-first doesn\u2019t have to mean cloud-only. If you choose to, you can keep an optional local copy for recovery at LAN speed, using an existing network share or the hardware of your choice and Cove\u2019s LocalSpeedVault (LSV) feature. The difference is that, if ransomware attacks this local copy, your primary backup storage is unaffected.<\/p>\n<p class=\"p8\">By contrast, traditional image backup products were built local-first, later bolting on additional mechanisms to push those backups to offsite storage. This adds varying levels of cost and complexity, often requiring additional licenses and manual configuration. Some vendors provide cloud storage, others leave it up to the customer to find, purchase, configure, and manage. Cove includes cloud backup storage, with <a href=\"https:\/\/www.n-able.com\/resources\/cove-data-protection-worldwide-data-centers\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">30 data centers<\/span><\/a> to help you keep data in region.<\/p>\n<p class=\"p8\">The second way Cove reduces the attack surface is by taking the backup application itself off your network. <span class=\"s3\">Bad actors typically operate by attacking the applications and data your business needs, then <\/span>going after backup copies and the infrastructure used to recover those backups<span class=\"s4\">\u2014<\/span>your data protection application.<\/p>\n<p class=\"p8\">Because Cove is a fully hosted SaaS application, your recovery mechanism is also safely off the local network, ready for you to log in and begin the recovery process from anywhere.<\/p>\n<p class=\"p8\">With Cove, your backup files and your disaster recovery infrastructure are all off the network, resulting in a much smaller attack surface for malware and putting you in a much better position for recovery.<\/p>\n<p class=\"p8\">There are other considerations to keep in mind when recovering from ransomware. That\u2019s why N&#8209;able worked with <a href=\"https:\/\/www.arcasrisk.com\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Arcas Risk Management<\/span><\/a> to deliver a webinar on World Backup Day. You can listen to the full discussion with Arcas on \u201cCyber-Response Missteps that Can Cost You,\u201d here: <a href=\"https:\/\/youtu.be\/ON28_27swIo\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">https:\/\/youtu.be\/ON28_27swIo<\/span><\/a><\/p>\n<p class=\"p10\"><i>Carrie Reber is senior product marketing manager for N&#8209;able.<\/i><\/p>\n<p><strong>If you are interested in finding out more about Cove Data Protection N&#8209;able will be at stand R49 at InfoSec Europe 2022.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Carrie Reber looks at why ransomware has different requirements (and different best practices) than recovery from fire, flood, or hardware failure.<\/p>\n","protected":false},"author":28,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-34543","post","type-post","status-publish","format-standard","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Respond to a Ransomware Attack the Right Way - N-able<\/title>\n<meta name=\"description\" content=\"Ransomware has different recovery requirements and best practices compared with fire, flood, or hardware failure. Find out more here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Respond to a Ransomware Attack the Right Way - N-able\" \/>\n<meta property=\"og:description\" content=\"Ransomware has different recovery requirements and best practices compared with fire, flood, or hardware failure. Find out more here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-16T14:00:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/220613_blogbanner_ransomware_SEO_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"990\" \/>\n\t<meta property=\"og:image:height\" content=\"518\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Carrie Reber\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/220613_blogbanner_ransomware_SEO_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carrie Reber\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"3\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way\"},\"author\":{\"name\":\"Carrie Reber\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/c0911f42b939cba6bdff2d5fa1c9065d\"},\"headline\":\"How to Respond to a Ransomware Attack the Right Way\",\"datePublished\":\"2022-06-16T15:00:48+01:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way\"},\"wordCount\":651,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Uncategorised\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way\",\"name\":\"How to Respond to a Ransomware Attack the Right Way - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2022-06-16T15:00:48+01:00\",\"description\":\"Ransomware has different recovery requirements and best practices compared with fire, flood, or hardware failure. Find out more here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Uncategorised\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/uncategorised\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Respond to a Ransomware Attack the Right Way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/c0911f42b939cba6bdff2d5fa1c9065d\",\"name\":\"Carrie Reber\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/0c4b7ade913232ec93b13e93417316d5af0ebc8786a8861a419fb9d34786b888?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0c4b7ade913232ec93b13e93417316d5af0ebc8786a8861a419fb9d34786b888?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0c4b7ade913232ec93b13e93417316d5af0ebc8786a8861a419fb9d34786b888?s=96&d=mm&r=g\",\"caption\":\"Carrie Reber\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Respond to a Ransomware Attack the Right Way - N-able","description":"Ransomware has different recovery requirements and best practices compared with fire, flood, or hardware failure. Find out more here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way","og_locale":"de_DE","og_type":"article","og_title":"How to Respond to a Ransomware Attack the Right Way - N-able","og_description":"Ransomware has different recovery requirements and best practices compared with fire, flood, or hardware failure. Find out more here.","og_url":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2022-06-16T14:00:48+00:00","og_image":[{"width":990,"height":518,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/220613_blogbanner_ransomware_SEO_ss.jpg","type":"image\/jpeg"}],"author":"Carrie Reber","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/06\/220613_blogbanner_ransomware_SEO_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Carrie Reber","Gesch\u00e4tzte Lesezeit":"3\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way"},"author":{"name":"Carrie Reber","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/c0911f42b939cba6bdff2d5fa1c9065d"},"headline":"How to Respond to a Ransomware Attack the Right Way","datePublished":"2022-06-16T15:00:48+01:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way"},"wordCount":651,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Uncategorised"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way","url":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way","name":"How to Respond to a Ransomware Attack the Right Way - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2022-06-16T15:00:48+01:00","description":"Ransomware has different recovery requirements and best practices compared with fire, flood, or hardware failure. Find out more here.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/how-to-respond-to-a-ransomware-attack-the-right-way#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Uncategorised","item":"https:\/\/www.n-able.com\/de\/blog\/category\/uncategorised"},{"@type":"ListItem","position":2,"name":"How to Respond to a Ransomware Attack the Right Way"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/c0911f42b939cba6bdff2d5fa1c9065d","name":"Carrie Reber","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/0c4b7ade913232ec93b13e93417316d5af0ebc8786a8861a419fb9d34786b888?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/0c4b7ade913232ec93b13e93417316d5af0ebc8786a8861a419fb9d34786b888?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0c4b7ade913232ec93b13e93417316d5af0ebc8786a8861a419fb9d34786b888?s=96&d=mm&r=g","caption":"Carrie Reber"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/34543","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=34543"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/34543\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=34543"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}