Recover from Hacks with a Secure Backup System

Recover from Hacks with a Secure Backup System

By Bill Yates

A member of the Dell Expert Network explained to attendees at MSP Expo 2023 why implementing secure data backups have become mandatory is this day and age.

In "Surviving a Cyber Attack and Keeping Critical Data Safe," Kevin McDonough, advisory systems engineer at Dell Expert Network, told attendees the key steps that can be taken to protect your most critical data and avoid costly repercussions.

"All the adversarial groups are starting to work together," McDonough said. "If they want in, they're going to get in," he said.

Even paying the ransom doesn't guarantee you can rebuild, McDonough said. You might get your data back if you pay up, but it will be in bad shape, he said. "They only have to be successful once and they win," he said.

The increase in available computing power has allowed bad actors to increase the pace of attacks they're issuing. If they have the resources, there's really nothing you can do to stop them. "Brute force attacks are becoming more common," he said.

The best you can do to protect your company is to implement a secure backup system that will allow you to recover from any hack, he said. First you detect the problem, then you isolate it, and then you implement recovery operations, he said. "Isolation tied with immutable is how we get invulnerable," McDonough said.

What day of the week do most cyberattacks occur? On Mondays, McDonough said. Why" Because Microsoft issues patches on Tuesday, and everyone knows it, he said.

Hackers have developed multiple ways of attacking your business, he said. Three big issues that concern McDonough now include:

  • Insider-based credentials. If someone gets hold of manager credentials, your most valuable data is at risk. "If they can see it, they can destroy it," McDonough said.
  • Zero Day exploits.  Unpatched vulnerabilities are disseminated quickly among hackers ."They get past your ID and protocols tools each time because there is no signature," he said.
  • Dwell time. Hackers like to sit inside your system and watch what happens. "They understand your entire backup structure," he said, "and they know which things you're replicating."

Obtaining your last clean data set depends upon knowing exactly when the attack occurred, McDonough said. "With a cyber event, you don't know exactly when the attack occurred or started," he said. "The amount of dwell time you see is quite phenomenal."

He said hackers were inside Sony for nearly two months in 2014 before the attack was discovered. Obtaining command and control is their goal, he said. To prevent that from happening, McDonough said to:

  • Create a functional air-gap network.
  • Leave no trace in production as to where data is copied
  • Pass data to backup in malware-free containers
  • Employ advanced immutability and NTP protections
  • Orchestrate all your backup maneuvers from the vault side.

A little resiliency goes a long way, he said. Data in the vault should represent about 25% of your company's complete data set, he said.  On the production side, backup measures are invisible, he said.  Keep production away from backup. "We like to make sure the vault is physically isolated," he said.

"Disaster recovery and cyber recovery are not the same thing," he said. Also, cyber restoration does not equal cyber recovery, he said. Data restoration doesn't involve accessing clean backups, he said. You can't depend upon disaster recovery techniques after a cyberattack, because your backups will likely be taken down too, he said.




Edited by Greg Tavarez
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Communications Correspondent

SHARE THIS ARTICLE
Related Articles

Produce8 App Update: Slash Unproductive Meetings, Boost MSP Efficiency

By: Greg Tavarez    4/25/2024

Produce8 launched a major update to its flagship application designed to provide MSPs and their clients with unmatched insights into how meetings affe…

Read More

MSP Expo Gold Sponsor ThreatLocker Strengthens Zero Trust Focus with $115M Series D Funding

By: Greg Tavarez    4/25/2024

ThreatLocker's recent announcement of a $115 million Series D funding round only highlights further the increasing demand for better endpoint protecti…

Read More

BreachRx Secures $6.5M Seed Funding

By: Stefania Viscusi    4/24/2024

BreachRx closed a $6.5 million seed round, led by SYN Ventures, with additional support from Overline.

Read More

Bigleaf Networks and NHC Partner to Optimize the Edge

By: Greg Tavarez    4/24/2024

New Horizon Communications Corp. (NHC) entered a strategic collaboration with Bigleaf Networks to offer network communications services to organizatio…

Read More

Secure the Everywhere Work Landscape: Ivanti Launches EASM and Platform Upgrades

By: Greg Tavarez    4/24/2024

The recently released Ivanti Neurons for External Attack Surface management, or EASM, helps combat attack surface expansion with full visibility of ex…

Read More