Set Up Ransomware Protection
  • 1 Minute to read
  • Dark
    Light
  • PDF

Set Up Ransomware Protection

  • Dark
    Light
  • PDF

Article summary

Ransomware is a type of cyber attack where malware designed to encrypt files on a device is used, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption.

Automatic Ransomware Protection and Recovering Compromised Content

CTERA Edge Filers from version 7.6 include CTERA Ransom Protect to stop any ransomware attack as soon as it is identified. Taking proactive measures against ransomware attacks helps safeguard your data and ensures the continuity of your operations. CTERA Ransom Protect is able to detect and block ransomware attacks within seconds.

Once a ransomware attack has been identified, every affected file is listed. You can then go through the list and rollback the affected files to the state immediately prior to the attack using snapshots.

The CTERA Portal retains previous file versions, by using snapshots. Snapshots are read-only copies of files as they were at a particular point-in-time. A new snapshot is created every 30 seconds. The snapshots are saved for a specified period, as defined in the retention policy by the global administrator or team administrator. You can restore a version of any file prior to the date that the content was compromised.

For more details, see:

Note

Storage node vendors also provide ways to protect the data from disasters and ransomeware attacks. For example, with an Amazon S3 storage node, you can use AWS versioning, as described, for version 8.1.x, in Using Amazon S3 Versioning to Protect Against Ransomware Attacks.


Was this article helpful?

ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence