Abstract
Ransomware is a malicious form of a software that encrypts the victim’s data and makes it completely inaccessible. The perpetrator then demands a ransom to restore access to the original data. Even though ransomware has been around for many years, it has become a very popular means of attack in recent times. Organizations need to consider additional precautionary measures for dealing with ransomware threats. Relying on an antivirus software alone is not enough to protect devices and/or data from the ransomware attacks. The entire IT ecosystem—including software, storage, networks, and hardware—needs to be hardened.
This presentation provides a brief introduction on ransomware and how it works. It covers various ways to detect ransomware threats, protect your data, and, if applicable, recover the data from ransomware attacks. It helps you understand requirement SEC-17a-4(f), the different characteristics of primary, secondary, and cloud object storage, and the solutions to protect data from ransomware. The presentation also describes how some of the in-built security features of existing storage products can help defend against ransomware and proposes newer functionality that can be developed to strengthen the protection mechanisms.