{"id":26893,"date":"2021-12-13T15:00:29","date_gmt":"2021-12-13T15:00:29","guid":{"rendered":"https:\/\/www.n-able.com\/?p=26893"},"modified":"2022-01-06T13:33:54","modified_gmt":"2022-01-06T13:33:54","slug":"business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption","title":{"rendered":"Business continuity after a ransomware attack: the case for end-to-end encryption"},"content":{"rendered":"<p class=\"p1\">Imagine the scenario: you get an urgent call from one of your customers. All her files seem to be corrupted. And then there\u2019s that email demanding payment via Bitcoin for restoration. She needs your immediate help to get her business up and running. Later on, she\u2019ll demand to know how you let her business be vulnerable to this attack.<\/p>\n<p class=\"p1\">You had installed firewalls, required strong passwords, and conducted email phishing drills\u2014and still your customer was attacked.<\/p>\n<p class=\"p1\">What else might have prevented this situation?<\/p>\n<h2 class=\"p3\">Encrypted cloud file storage<\/h2>\n<p class=\"p1\">Traditional file backups utilities are not sufficient because they can be vulnerable to the same attacks that penetrated your customer\u2019s network in the first place. Furthermore, if a ransomware attack corrupts user files, the corrupted files will be copied to the backups (or the backups might be deleted entirely), resulting in data loss. Some vendors recommend offline backups, but these are complex to manage and security risks still exist (they have to be <i>online<\/i> frequently).<\/p>\n<p class=\"p1\">A better solution would have the following attributes:<\/p>\n<h3><span class=\"s2\">\u2022 <\/span>Cloud service<\/h3>\n<p class=\"p4\">Using an external cloud service provider for backups (as opposed to on-premises management) can not only save costs but also add another layer of security to your customer\u2019s network.<\/p>\n<h3><span class=\"s2\">\u2022 <\/span>Immutable copies of all file versions<\/h3>\n<p class=\"p4\">It\u2019s not enough to merely retain a copy of the latest versions of files; the service must retain <i>all prior<\/i> versions. Immutability means the service does not allow any prior version to be deleted or modified. Thus, in the event of an attack, an organization\u2019s data can be restored to the point right before the attack occurred.<\/p>\n<h3><span class=\"s2\">\u2022 <\/span>End-to-end encryption (E2EE)<\/h3>\n<p class=\"p4\">E2EE means that data is encrypted on a client device and stays encrypted until reaching another authorized client. Significantly, this means that nobody other than the customer\u2019s intended recipients can see data\u2014not even the cloud service provider or you as the MSP. Even if you or the cloud service provider are attacked, your customer\u2019s data is safe.<\/p>\n<h3><span class=\"s2\">\u2022 <\/span>Authentication by cryptographic keys instead of passwords<\/h3>\n<p class=\"p4\">We all know that most breaches start with a compromised password. If the cloud service requires a cryptographic key to authenticate a user, there are no passwords to guess or breach.<\/p>\n<h3><span class=\"s2\">\u2022 <\/span>Admin restrictions<\/h3>\n<p class=\"p4\">After a successful password breach, attackers often acquire administrative credentials because admins can access all user data. This can make you, the MSP, a \u201ccentral point of attack,\u201d which means you\u2019re a high-value target for an attacker. The ideal scenario is to require multiple admins to authorize any invasive operation so that an attack on a single admin won\u2019t compromise an entire organization.<\/p>\n<h2 class=\"p3\">How does this work in practice?<\/h2>\n<p class=\"p1\">There are thousands of use cases for encrypted cloud file storage. Just about every use case for storing files on a user\u2019s PC or on a centralized on-premises server can be better addressed by encrypted cloud storage. I\u2019ve listed some examples below to help you start to see how this can work for your customers:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><strong>A manufacturing company<\/strong> needed an easy but secure way for customers to share design documents, parts lists, and QA data. Email is insecure and can\u2019t readily handle large files as attachments. Traditional cloud storage didn\u2019t adequately protect sensitive customer data\u2014and hence the supplier\u2019s reputation. The business chose encrypted cloud storage to secure files.<\/li>\n<li class=\"li1\"><strong>A software company\u2019s human resources department<\/strong> needed to protect and store sensitive personnel files such as personal contact information, performance reviews, etc. HR had been using Google Drive but decided to shift to encrypted cloud storage to better protect employees\u2019 sensitive data from everything from the prying eyes of IT admins to external attacks based on passwords and server compromises.<\/li>\n<li class=\"li1\"><strong>A hedge fund<\/strong> needed to protect proprietary trading strategies and confidential client data. Originally using local PC and MSP-managed server storage, the fund decided to move to encrypted cloud storage to simplify data management (including the cost and complexity of backups and hardware\/software maintenance).<\/li>\n<li class=\"li1\"><strong>A security consultant<\/strong> wanted to store and share working documents and final reports with clients. The consultant viewed this data as extremely sensitive\u2014an attacker breaching the auditor would basically get a roadmap to client vulnerabilities. Encrypted cloud storage provided an easy way to share information, but with the security that was essential to business.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p5\"><em>Randy Battat is CEO at PreVeil<\/em><\/p>\n<p>&nbsp;<\/p>\n<p class=\"p6\"><strong><span class=\"s3\"><a href=\"http:\/\/www.preveil.com\/\" target=\"_blank\" rel=\"noopener\">PreVeil<span class=\"s4\"><i>\u00a0<\/i><\/span><\/a><\/span><i>is a member of the N&#8209;able MSP\u00a0<\/i><a href=\"https:\/\/www.n-able.com\/partnerships\/technology-alliance-program?promo=blog\"><span class=\"s5\"><i>Technology Alliance Program (TAP)<\/i><\/span><\/a><i>. TAP is a growing group of trusted vendors we\u2019ve teamed up with to offer a variety of third-party integrations and services to help MSPs better serve their customers. This blog is part of the TAP blog series through which we will provide you relevant and interesting guest blog contributions from our TAP members.<\/i><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Randy Battat from Technology Alliance Program (TAP) partner PreVeil looks at how MSPs can help customers protect their businesses with encrypted cloud storage.<\/p>\n","protected":false},"author":25,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-26893","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Business continuity after a ransomware attack: the case for end-to-end encryption - N-able<\/title>\n<meta name=\"description\" content=\"Technology Alliance Program (TAP) partner PreVeil look at how MSPs can help customers protect their businesses with encrypted cloud storage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business continuity after a ransomware attack: the case for end-to-end encryption - N-able\" \/>\n<meta property=\"og:description\" content=\"Technology Alliance Program (TAP) partner PreVeil look at how MSPs can help customers protect their businesses with encrypted cloud storage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-13T15:00:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-06T13:33:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/12\/211210_NA_Blogbanner_TAP_Preveil_ss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/12\/211210_NA_Blogbanner_TAP_Preveil_ss.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\"},\"headline\":\"Business continuity after a ransomware attack: the case for end-to-end encryption\",\"datePublished\":\"2021-12-13T15:00:29+00:00\",\"dateModified\":\"2022-01-06T13:33:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption\"},\"wordCount\":807,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"articleSection\":[\"Security\",\"Technology Alliance Program\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption\",\"url\":\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption\",\"name\":\"Business continuity after a ransomware attack: the case for end-to-end encryption - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/es#website\"},\"datePublished\":\"2021-12-13T15:00:29+00:00\",\"dateModified\":\"2022-01-06T13:33:54+00:00\",\"description\":\"Technology Alliance Program (TAP) partner PreVeil look at how MSPs can help customers protect their businesses with encrypted cloud storage.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Technology Alliance Program\",\"item\":\"https:\/\/www.n-able.com\/es\/blog\/category\/technology-alliance-program\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Business continuity after a ransomware attack: the case for end-to-end encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/es#website\",\"url\":\"https:\/\/www.n-able.com\/es\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/es#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/es?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/es#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/es\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g\",\"caption\":\"Guest\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Business continuity after a ransomware attack: the case for end-to-end encryption - N-able","description":"Technology Alliance Program (TAP) partner PreVeil look at how MSPs can help customers protect their businesses with encrypted cloud storage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption","og_locale":"es_ES","og_type":"article","og_title":"Business continuity after a ransomware attack: the case for end-to-end encryption - N-able","og_description":"Technology Alliance Program (TAP) partner PreVeil look at how MSPs can help customers protect their businesses with encrypted cloud storage.","og_url":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2021-12-13T15:00:29+00:00","article_modified_time":"2022-01-06T13:33:54+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/12\/211210_NA_Blogbanner_TAP_Preveil_ss.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/12\/211210_NA_Blogbanner_TAP_Preveil_ss.jpg","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Escrito por":"Guest","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption"},"author":{"name":"Guest","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7"},"headline":"Business continuity after a ransomware attack: the case for end-to-end encryption","datePublished":"2021-12-13T15:00:29+00:00","dateModified":"2022-01-06T13:33:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption"},"wordCount":807,"publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"articleSection":["Security","Technology Alliance Program"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption","url":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption","name":"Business continuity after a ransomware attack: the case for end-to-end encryption - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/es#website"},"datePublished":"2021-12-13T15:00:29+00:00","dateModified":"2022-01-06T13:33:54+00:00","description":"Technology Alliance Program (TAP) partner PreVeil look at how MSPs can help customers protect their businesses with encrypted cloud storage.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/es\/blog\/business-continuity-after-a-ransomware-attack-the-case-for-end-to-end-encryption#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Technology Alliance Program","item":"https:\/\/www.n-able.com\/es\/blog\/category\/technology-alliance-program"},{"@type":"ListItem","position":2,"name":"Business continuity after a ransomware attack: the case for end-to-end encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/es#website","url":"https:\/\/www.n-able.com\/es","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/es#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/es?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/es#organization","name":"N-able","url":"https:\/\/www.n-able.com\/es","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/es#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/es#\/schema\/person\/ee8cad7f258c4c0bbd8df129da8ba8c7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d82fa769eb9bf6d68cd57319e4d53994c06b1df8611c56b3842cc27f4cec1020?s=96&d=mm&r=g","caption":"Guest"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/26893","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/comments?post=26893"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/posts\/26893\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/es\/wp-json\/wp\/v2\/media?parent=26893"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}