NetApp Inc.

08/09/2022 | Press release | Archived content

When ransomware attacks, will your data defenses be ready?

Level 1: The perimeter attack

With a level 1 attack, spammers and phishers will probably target your perimeter. Although most will be bounced by blockers and a firewall, a scammer might break through the perimeter and go for your data. Fortunately, your administrators will quickly wipe out the scammer, and Cloud Secure point-in-time recovery will restore your data to its state before the attack.

Level 2: An imposter among us

More advanced criminals won't just make a direct attack-they'll sneak in with a little espionage. A compromised administrator might look like a trusted user, but they can covertly destroy a lot of data really fast. This more sophisticated attack requires additional protection. NetApp® SnapLock® compliance software makes your data indestructible with backup copies that scammers can't touch. Even if the imposter administrator sneaks past the perimeter, those backup copies aren't open for business.

Level 3: Ransomware's last stand

The cleverest rogue administrators might sneak past all your defenses undetected. They're considered safe users-until they seek to destroy. So how can you stop them? With multi-admin verification. With this added layer of defense, the rogue administrator can't do anything until another administrator verifies that the action is legitimate. So: Nice try, rogue administrator. With this third level of protection, your data is yours alone-hackers will be left licking their wounds.

Ransomware is no match for cyber resilience

With a cyber-resilience strategy, data protection and security are baked into your defense. Hackers won't know what to do when facing your hybrid cloud-because it's armed with solutions that protect against attacks, proactively detect threats, and quickly recover data if something goes wrong.

Check out our solutions for ransomware and discover how to make your infrastructure ransomware's worst nightmare.