{"id":6293,"date":"2017-09-06T18:41:20","date_gmt":"2017-09-06T08:41:20","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=6293"},"modified":"2018-12-11T08:14:20","modified_gmt":"2018-12-10T22:14:20","slug":"talking-about-ransomware","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2017\/09\/06\/talking-about-ransomware\/","title":{"rendered":"Talking about Ransomware"},"content":{"rendered":"<p>The &#8220;Wannacry&#8221;&nbsp;Ransomware strike saw a particularly large number of systems infected and garnered a great deal of media attention.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/2017\/01\/11\/what-can-we-learn-from-the-mongodb-attacks\/ransomware-image\/\" rel=\"attachment wp-att-6104\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6104\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/01\/Ransomware-Image.jpg\" alt=\"Ransomware Image\" width=\"900\" height=\"636\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/01\/Ransomware-Image.jpg 900w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/01\/Ransomware-Image-300x212.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/01\/Ransomware-Image-768x543.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p>As you&#8217;d expect, many companies discussed ransomware and their solutions for it. There was also backlash from many quarters suggesting people were using a ransomware attack to unethically spruik their solutions. It almost seems to be the IT equivalent of calling lawyers &#8220;ambulance chasers&#8221;.<\/p>\n<p>We are (albeit briefly, I am sure),&nbsp;<em>between<\/em> major ransomware outbreaks. So, logically that&#8217;ll mean it&#8217;s OK to talk about ransomware.<\/p>\n<p>Now, there&#8217;s a few things to note about ransomware and defending against it. It&#8217;s not as simplistic as &#8220;I only have to do X and I&#8217;ll solve the problem&#8221;. It&#8217;s a multi-layered issue requiring user education, appropriate systems patching, appropriate security, appropriate data protection, and so on.<\/p>\n<p>Focusing even on data protection, <em>that&#8217;s<\/em> a multi-layered approach as well. In order to have a data protection environment that can assuredly protect you from ransomware, you need to do the basics, such as operating system level protection for backup servers, storage nodes, etc. That&#8217;s just the beginning. The next step is making sure your backup environment itself follows appropriate security protocols. <a href=\"https:\/\/nsrd.info\/blog\/2015\/03\/02\/how-secure-are-your-backups\/\" target=\"_blank\" rel=\"noopener\">That&#8217;s something I&#8217;ve been banging on about for several years now<\/a>. That&#8217;s not the full picture though. Once you&#8217;ve got operating systems and backup systems secured via best practices, you need to then look at <em>hardening<\/em> your backup environment. There&#8217;s a difference between standard security processes and hardened security processes, and if you&#8217;re worried about ransomware this is something you should be thinking about doing. Then, of course, if you really want to ensure you can recover your most critical data from a serious hactivism <em>and<\/em> ransomware (or outright data destruction) breach, you need to look at&nbsp;<a href=\"https:\/\/nsrd.info\/blog\/2016\/11\/16\/falling-in-love-with-the-irs\/\" target=\"_blank\" rel=\"noopener\">IRS<\/a> as well.<\/p>\n<p>But let&#8217;s step back, because I think it&#8217;s important to make a point here about&nbsp;<em>when<\/em> we can talk about ransomware.<\/p>\n<p>I&#8217;ve worked in data protection my entire professional career. (Even when I was a system administrator for the first four years of it, I was the primary backup administrator as well. It&#8217;s <em>always<\/em> been a focus.)<\/p>\n<p>If there&#8217;s one thing I&#8217;ve observed in my career in data protection is that having a &#8220;head in the sand&#8221; approach to data loss risk is a lamentably common thing. Even in 2017 I&#8217;m still hearing things like &#8220;We can&#8217;t back this environment up because the project which spun it up didn&#8217;t budget for backup&#8221;, and &#8220;We&#8217;ll worry about backup later&#8221;. Not to mention the old chestnut, &#8220;it&#8217;s out of warranty so we&#8217;ll do an <a href=\"https:\/\/nsrd.info\/blog\/2010\/03\/17\/the-perils-of-an-icarus-support-contract\/\" target=\"_blank\" rel=\"noopener\">Icarus support contract<\/a>&#8220;.<\/p>\n<p>Now the flipside of the above paragraph is this: if things go wrong in any of those situations, suddenly there&#8217;s a very real interest in talking about options to prevent a future issue.<\/p>\n<p>It may be a career limiting move to say this, but <strong>I&#8217;m not in sales to make sales<\/strong>. I&#8217;m in sales to positively change things for my customers. I want to help customers resolve problems, and deliver better outcomes to their users. I&#8217;ve been doing data protection for over 20 years. The only reason someone stays in data protection that long is because they&#8217;re passionate about it, and the reason we&#8217;re passionate about it is because we are <em>fundamentally&nbsp;averse<\/em> to data loss.<\/p>\n<p>So why do we want to talk about defending against or recovering from ransomware during a ransomware outbreak? It&#8217;s simple.&nbsp;At the point of a ransomware outbreak, there&#8217;s a few things we can be sure of:<\/p>\n<ul>\n<li>Business attention is focused on ransomware<\/li>\n<li>People are talking about ransomware<\/li>\n<li>People are being directly impacted by ransomware<\/li>\n<\/ul>\n<p>This isn&#8217;t ambulance chasing. This is about making the best of a bad situation \u2013 I don&#8217;t want businesses to lose data, or have it encrypted and see them have to pay a ransom to get it back \u2013 but if they&nbsp;<em>are<\/em> in that situation, I want them to know there are techniques and options to prevent it from striking them again. And at that point in time \u2013 during a ransomware attack \u2013 people are interested in understanding how to stop it from happening again.<\/p>\n<p>Now, we have to still be considerate in how we discuss such situations. That&#8217;s a given. But it&nbsp;<em>doesn&#8217;t mean the discussion can&#8217;t be had<\/em>.<\/p>\n<p>To me this is also an <em>ethical<\/em> consideration.&nbsp;Too often the focus on ethics in professional IT is around the basics: don&#8217;t break the law (note: law \u2260 ethics), don&#8217;t be sexist, don&#8217;t be discriminatory, etc. That&#8217;s not really a focus on ethics, but a focus on professional conduct. Focusing on professional conduct is good, but there must also be a focus on the ethical obligations of protecting data. It&#8217;s my belief that if we fail to make the best of a bad situation to get an important message of data protection across, we&#8217;re failing our ethical obligations as data protection professionals.<\/p>\n<p>Of course, in an ideal world, we&#8217;d never need to discuss how to mitigate or recover from a ransomware outbreak during said outbreak, because everyone would already be protected. But harking back to an earlier point, I&#8217;m still being told production systems were installed without consideration for data protection, so I think we&#8217;re a&nbsp;<em>long<\/em> way from that point.<\/p>\n<p>So I&#8217;ll keep talking about protecting data from all sorts of loss situations, including ransomware, and I&#8217;ll keep having those discussions before, during and after ransomware outbreaks. That&#8217;s my job, and that&#8217;s my passion: data protection. It&#8217;s not gloating, it&#8217;s not ambulance chasing, it&#8217;s&nbsp;<em>let&#8217;s make sure this doesn&#8217;t happen again<\/em>.<\/p>\n<hr>\n<p>On another note, sales are really great for my book, <a href=\"https:\/\/www.amazon.com\/Data-Protection-Ensuring-Availability\/dp\/1482244152\/ref=mt_paperback\" target=\"_blank\" rel=\"noopener\">Data Protection: Ensuring Data Availability<\/a>, released earlier this year. I have to admit, I may have squealed a little when I got my first royalty statement. So, if you&#8217;ve already purchased my book: you have my sincere thanks. If you&#8217;ve not, that means you&#8217;re missing out on an epic story of protecting data in the face of amazing odds. So check it out, it&#8217;s in eBook or Paperback format on Amazon (prior link), or if you&#8217;d prefer to, you can buy direct from the <a href=\"https:\/\/www.crcpress.com\/Data-Protection-Ensuring-Data-Availability\/Guise\/p\/book\/9781482244151\" target=\"_blank\" rel=\"noopener\">publisher<\/a>. And thanks again for being such an awesome reader.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The &#8220;Wannacry&#8221;&nbsp;Ransomware strike saw a particularly large number of systems infected and garnered a great deal of media attention. As&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5,13,19,21],"tags":[282,448,1326,1343],"class_list":["post-6293","post","type-post","status-publish","format-standard","hentry","category-architecture","category-backup-theory","category-general-thoughts","category-recovery","category-security","tag-data-protection","tag-icarus","tag-irs","tag-ransomware"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1Dv","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=6293"}],"version-history":[{"count":9,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6293\/revisions"}],"predecessor-version":[{"id":7378,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6293\/revisions\/7378"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=6293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=6293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=6293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}