A New Hope in the Fight Against Ransomware: “Active Protection”
We talk a lot about ransomware here at OzHosting. This is because we know how important your data is to the success of your business. As these attacks are constantly evolving, we believe the best method of protection is a reliable Cloud Backup Solution.
Our cloud backup service has recently received an upgrade to include the latest in data protection: Active Protection. An advanced ransomware protection technology that actively protects all the data on your system including documents, media files, programs, and more.
Below we’ve highlighted the key features of this solution that will be vital to the protection of your business:
Pattern Monitoring & Detection:
Active Protection constantly observes patterns in how your files are being changed or updated. It recognises a set of behaviours that may be typical and expected. Another set of behaviours may signal a suspect process taking hostile action against your files. Active Protection looks at these actions and compares them to with current global malicious behaviour patterns. This approach is exceptionally powerful in identifying ransomware attacks, even from ransomware variants that may have previously been unreported.
Recovery of Corrupted Files:
When ransomware begins to encrypt files, Active Pretention quickly detects and halts this process. As this is a backup service, data that was exposed and encrypted before the process was halted can be recovered from multiple backup sources. Alternative anti-ransomware solutions aren’t commonly able to end an attack once it has started. They also have no way to recover any files already. Active Protection detects and deflects attacks, and restores files of any size!
Automated Whitelist & Blacklist:
Once Active Protection has detected new threats based on already identified patterns as well as learned ones. Results must be adjusted to reduce false positive detection of things that really aren’t ransomware. Active Protection maintains a whitelist (programs that are allowed and expected to perform certain actions) to prevent authorized activities from being falsely tagged as unauthorized.
Self-Defence of Backup Files:
One way that cyber-criminals could choose to compromise files would be to attack the backup software itself. Corrupting the backup files it creates. To protect against this, we have implemented a robust self-defence mechanism that won’t let criminals disrupt the work of the Acronis application or backup file content.
Additionally, Active Protection monitors the Master Boot Record of Windows-based computers. Ensuring that it won’t let any illegitimate changes to be made that could prevent you from being able to properly boot your computer.
—
Need a Cloud Backup solution for your business?
Call our team on (02) 8916 2100 to discuss our free trial options.