Backups, Disaster Recovery, and Crypto-Locking

Backups, Disaster Recovery, and Crypto-Locking

Posted on: August 6, 2019 Posted by: bMobile Route Software

Laptops, desktops, and mobile phones are some of the devices used by a majority to complete their jobs. Of course, these are like any other tool that requires complete protection and periodic maintenance. And as we all know, disaster strikes when we are thinking the least about it. Just remember, when this strikes, your company will be hit with possible data loss, downtime for employees and your business, and financial losses. In many cases, companies that don’t have anything in place often just close up in the face of disaster.

Most everyone knows that you should make backups, and some folks might have even heard of the concept of disaster recovery. But recently, more scary things have been showing up on the news – crypto-locking. These attacks seem to rise alongside the value of Bitcoin and target businesses. This newest trend is where a hacker takes control over your system and encrypts the entire system. Then they will contact you and offer to unlock your system for a fee, usually paid in Bitcoins.

For most people, the idea of having to buy Bitcoins just to get your own information back is daunting. And there are no guarantees that if you pay the fee that the hackers won’t just take the money and run. We’ve seen ransoms of anywhere from a few thousand dollars to tens of thousands of dollars. It all depends on what the hackers think that you are worth.

Here at bMobile, we’ve ran into a handful of these cases in the last few years. It doesn’t happen that often, but if it does happen the best thing you can do is to have a plan in place and be prepared to execute it. You should also either already have an IT staff in place or a contract for an outside IT firm so you don’t have to deal with finding someone in the middle of your disaster.

Virus protection software is also a critical piece of the puzzle. It can make a huge difference running regular scans on your network. In addition, make sure you stay current on patches for your operating systems – flaws and vulnerabilities are addressed with these patches.

To start, make sure you are creating a daily backup. This backup should include all databases and files that are critical to your company’s operations. More importantly, this backup should be stored off-site, preferably in the cloud. There are several benefits to this including making sure the backup is not corrupted by the hackers as well as for disaster recovery. Not all catastrophic events are hacker related. Sometimes Mother Nature throws hurricanes, tornados, floods, and fire into the mix. We’ve seen all of these happen to our clients over the years.

Once you have a good backup in a place you can access, practice restoring it to make sure you can do so when the time comes. In the case of the crypto-locking scenario, you will be able to pinpoint that last good backup before it happened and restore your system to that point. You may wind up losing a day’s worth of work, but it is much better than the other option of paying a large sum of money that may unlock only some or most of your files and usually only after more time is lost while you wait.

When something like this occurs, it is also useful to have your IT staff figure out the point where the hackers got in. Many times it is as simple as a bogus email that has a link in it that once clicked, triggers the process the hackers use to encrypt your system.

Discuss with your staff best practices around opening suspicious emails, not visiting unapproved web sites, and being ‘cyber-aware’. These days, a little common sense and healthy skepticism can make all the difference between having your doors open for business. If you would like to discuss plans for keeping your systems safe and want to get our take on what you should be doing, please give us a call and we’ll be glad to talk to you!

Call: 1+(888) 900-5667


Recent Blog Posts

Top 10 common inventory issues and how to fix them?
February 27, 2023

Inventory management is an essential aspect of any business that deals with physical products. Efficient inventory management can help a company reduce costs, improve customer satisfaction, and increase profits.

Read More
What Is a Warehouse Management System and How to Use It?
February 27, 2023

Warehouse management refers to the processes and systems involved in managing a warehouse's operations, including receiving and storing goods,

Read More
Four ways to keep employee productivity at top-notch levels during the holiday season
December 22, 2022

December is challenging for organizations—not to achieve peak productivity levels but to maintain the least status quo in productivity. The reason is the flurry of activities that are taking place this month.

Read More
3 Differences Between Inventory Management and Warehouse Management
December 20, 2022

Warehouse management and inventory management have a significant impact on companies' profits, as well as on their smooth, efficient and proper operation.

Read More
5 Ways Route Accounting Software Can Help You Stand Out in Bread and Bakery Distribution
June 7, 2021

The bread and bakery industry has been experiencing steady growth due to the rise in

Read More
5 Reasons to Consider Route Accounting Software for Water and Beverages Distribution
June 7, 2021

Companies within the food and beverage distribution industry face stiff competition. These companies strive

Read More
5 Tips for Fleet Managers to Drive Impressive Results.
April 30, 2021

5% to 10% of the average annual budget of the fleet goes in vain.

Read More

Share This Post