Protecting your data from Ransomware (2024)

Ransomware is malicious software that denies users access to a computer system or data until they pay a ransom. These kinds of attacks are making headlines more often, including this past week when the BBC reported that travel money service Travelex’s operations have been disrupted since January 1 after falling victim to a ransomware attack. The attacks are pervasive enough that the FBI issued an alert on ransomeware late last year, warning that “losses from ransomware attacks have increased significantly, according to complaints received by IC3 and FBI case information.”

Ransomware, like other types of malware, is by no means a new threat, but it’s one that’s becoming increasingly complex and harmful. While there are signs that traditional consumer-targeted attacks are decreasing, attackers are shifting their attention to organizations in search of higher returns. In fact, ransomware extortion is so successful that attackers now offer ransomware as a service (RaaS) that criminals can subscribe to for a fee to help scale their operations. The Travelex incident is one such attack.

Business detections of ransomware rose 365% between Q2 2018 and Q2 2019. Industries with legacy infrastructure, such as education, healthcare, manufacturing, transportation, and government are particularly vulnerable to these attacks. As of September of last year, the MS-ISAC (Multi-State Information Sharing & Analysis Center) received approximately 60% more reported ransomware incidents affecting state, local, tribal, and territorial governments in 2019 than for the entire year of 2018.

While the problem is pervasive, a lack of adequate funding for cybersecurity means organizations are finding it difficult to harden their systems against ransomware attacks. According to the National Association of State Chief Information Officers, less than 3% of state IT budgets are dedicated to cybersecurity in most states. When a ransomware attack hits, the cost to recover is often more than the committed annual budget for cybersecurity. And recovering data isn’t the only cost after an attack. In addition to paying a ransom or losing critical data, organizations may also face forensic and legal costs, be required to provide credit monitoring services for customers or employees, and will likely experience lost revenue from operational downtime. The true costs of a ransomware attack for a small business can exceed $700,000—and can be even more for larger organizations.

What can you do about ransomware?

One way to mitigate the effects of ransomware is to have reliable backups of your data. However, constantly backing up data can be costly, resource intensive, and hard to get right. Even if backups are running, regularly testing them across an organization is also difficult to do correctly and comprehensively. Because of these challenges, cloud storage companies can be one of the most effective lines of defense against these attacks. Cloud service providers offer frequent snapshots of your data without your IT team having to configure, manage, and test backups themselves, and these snapshots sit on top of an infrastructure already designed to maintain the durability of your data. As the Center for Internet Security notes, “Using cloud services could help mitigate ransomware infections since many retain previous versions of files, allowing you to roll back to the unencrypted form.”

Malware is an issue that threatens both individuals and enterprise customers. This is a challenge Dropbox Business is well-positioned to solve. The advantage of a file sync service like Dropbox over traditional timed backups is that a new snapshot is made anytime you create or update a file. These snapshots are available to Dropbox customers for up to 180 days.

In 2018, around 40% of all Dropbox customer support tickets about file restorations were account rollback requests, many of which were related to malware infections. Fortunately, our support agents can use our version history capabilities to revert accounts back to a state before they were infected by ransomware.

We are working hard to stop the cycle of ransomware that puts our customers’ data at risk. As a result, we developed a self-service tool our customers can use when a crisis occurs. To recover quickly in an emergency when every minute counts, we created Dropbox Rewind. This powerful capability enables Dropbox customers to pick the exact point in time to which they need to revert their account and syncs changes across all connected devices.

Do not let ransomware deny you access to your data. Cloud services like Dropbox Business are an important tool in the fight against ransomware. Read this help center article to learn more about how Dropbox Business can help you recover from a ransomware attack.

Protecting your data from Ransomware (2024)

FAQs

How can we protect data against ransomware? ›

Ransomware backup strategies
  • Develop a disaster recovery plan. ...
  • Keep at least one backup offsite or offline. ...
  • Store backups in multiple locations. ...
  • Choose a reasonable backup interval. ...
  • Regularly perform software updates. ...
  • Educate employees on backup protocol. ...
  • Limit employee access to backups. ...
  • Test backups.

Does a VPN protect you from ransomware? ›

Many believe a Virtual Private Network (VPN) significantly protects against ransomware attacks. Not only is this myth incorrect, but your VPN is actually a potential attack vector for malicious actors.

Which software will help to defend against ransomware? ›

Best ransomware protection software compared
BrandRatingType
2. Bitdefender4.9 ★ ★ ★ ★ ★Antivirus
3. TotalAV4.7 ★ ★ ★ ★ ★Antivirus
4. Avira4.2 ★ ★ ★ ★ ☆Antivirus
5. ESET NOD324.3 ★ ★ ★ ★ ☆Antivirus
1 more row

Can ransomware steal your data? ›

Data Loss: Some ransomware attacks encrypt data as part of their extortion efforts. Often, this can result in data loss, even if the company pays the ransom and receives a decryptor.

What data does ransomware target? ›

Birthdates, physical addresses, and Social Security Numbers (SSNs) are some of the most common sensitive personal details. By targeting this type of data, ransomware actors can monetize the information and sell it on the dark web as part of a full identity profile.

What is the 3 2 1 rule for ransomware? ›

3 – Keep three copies of any important file: one primary and two backups. 2 – Keep the files on two different media types to protect against different types of hazards. 1 – Store one copy – or “go bag” – off-site (e.g., outside the home or business facility).

What is the first action to take against ransomware? ›

Power down devices if you are unable to disconnect them from the network to avoid further spread of the ransomware infection. Note: This step will prevent your organization from maintaining ransomware infection artifacts and potential evidence stored in volatile memory.

What is the biggest risk when it comes to ransomware attacks? ›

One of the biggest dangers is financial loss. The ransom demands can be very costly, and if businesses do not have the money to pay, they may lose everything.

Can hackers see through VPN? ›

Man-in-the-middle attacks involve hackers intercepting, viewing, or even tampering with your data while it's in transit. However, with a good VPN on your device, your internet activity will be encrypted, meaning hackers won't be able to view it — even if they intercept it.

What VPN do hackers use? ›

Hackers exploit vulnerabilities in outdated VPN protocols such as PPTP and L2TP/IPSec, which are known for weak encryption standards and can be easier to compromise than more secure, updated protocols.

Can you be hacked while using a VPN? ›

Like all software, VPNs (Virtual Private Networks) are frequently targeted by hackers. And while industry leaders have made their protection nearly impossible to crack, some smaller VPN providers have vulnerabilities that lead to millions of user records being exposed every year.

Should I set up OneDrive for ransomware protection? ›

OneDrive includes built in ransomware detection and recovery as well as file versioning so you can restore a previous version of a file. And when you edit Microsoft Office files stored on OneDrive your work is automatically saved as you go. Use a secure, modern, browser such as Microsoft Edge.

Can Windows Defender remove ransomware? ›

As proven in Curtis' testing, Microsoft Defender for Endpoint is a valuable component of a cybersecurity solution, certainly when it comes to protecting your files and data against ransomware. With hundreds of ransomware programs ready to encrypt your files, Defender offers peace of mind for threat detection.

How do I know if I have ransomware? ›

Another sign of ransomware is locked files. If you suddenly find that you are unable to access your files, it may be a sign that your data has been encrypted. Often displays pop-up messages on your screen, demanding payment in exchange for the decryption key.

How is ransomware prevented or removed? ›

intercepting proxies, which block known-malicious websites. internet security gateways, which can inspect content in certain protocols (including some encrypted protocols) for known malware. safe browsing lists within your web browsers which can prevent access to sites known to be hosting malicious content.

How does ransomware stop the target from accessing their data? ›

This is a type of malicious software or “malware” designed to block access to computer systems, and the data held within them, using encryption. Ransomware is a type of malware that attempts to unlawfully encrypt files on a host computer system.

Top Articles
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 6305

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.