DiscoverCyber HeroesHow To Respond To (And Recover From) A Ransomware Attack
How To Respond To (And Recover From) A Ransomware Attack

How To Respond To (And Recover From) A Ransomware Attack

Update: 2023-03-09
Share

Description

As it turns out, ransomware isn’t ‘technically’ the attack vector, it's more of the symptom or the 'ultimate goal'. Most ransomware cases use phishing as the means of compromising a network, that’s the most popular attack vector in 2023.


Regardless, a ransomware attack seeks to encrypt or exfiltrate a company's sensitive data or proprietary information. Money is then demanded to provide either a decryption key or to not release the data into the public domain.


To address this very real threat, Mat talks to Curtis Preston (aka Mr. Backup), a data protection expert who specialises in disaster recovery and backups. Curtis brings incredible insight and more than a touch of humour to an otherwise dry subject.


Stepping through the ransomware-style cybercrime from A-Z, they discuss the preventative nature of using password manager apps and multi-factor authentication before taking a deep dive into the most common forms of attack vectors for businesses in 2023 and how businesses can be better prepared in the event that they become a victim of a ransomware attack.



  • Where does the term ‘air gap back up’ come from and what are the modern-day options?

  • What are the differences between cloud-based server backup versus using a backup SAAS?

  • What are the pros, cons and considerations of cloud-based backups versus ‘on-premises’ backups?


If you want to understand the answers to these questions then this episode of the CyberHeroes Podcast is for you.


Importantly, they also discuss the realities for businesses who have taken the steps to consider ‘cyber’ in their Business Continuity and Disaster Recovery planning versus the repercussions for those who have not.


As always the aim is to help you, the listener better able to protect your people, profits and reputation from cyber criminals.


If you get value from this then be sure to subscribe and why not share it with someone you know who would also benefit from sharing it?


Now settle in and enjoy.


References:


Check out Curtis Preston (aka Mr. Backup) on Twitter


Check out Curtis Preston on LinkedIn 


Check out Curtis' books, including Modern Data Protection HERE


Check out the Restore It All podcast HERE


Check out Druva HERE - a secure SaaS-based platform for data backup, disaster recovery and cyber resilience

Comments 
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

How To Respond To (And Recover From) A Ransomware Attack

How To Respond To (And Recover From) A Ransomware Attack

Mat Lock & Brad Lilly