Tape Media

Tape Drives

Ethernet LTO Tape Drives

Tandberg Data RDX QuikStor

Tandberg Data RDX QuikStation

HP RDX Removable Disk

Quantum SuperLoader 3

Quantum Scalar i3 LTO

Qualstar LTO Tape Libraries

Qualstar Q8 Tape Autoloader

Qualstar Q24 Tape Autoloader

Qualstar Q48 Tape Autoloader

Qualstar Q40 Tape Library

Qualstar Q80 Tape Library

Qualstar Tape Libraries

MagStor M-Series Tape Library

SymplyPro XTL Tape Libraries

Overland NEO Tape Libraries

Overland NEOs StorageLoader

Overland NEOs T24 Loader

Overland NEOs T48 Library

Overland NEOxl 40 Series

Overland NEOxl 80 Series

Tape Drive Autoloaders

HP StoreEver Tape Libraries

HP StoreEver MSL3040

Archiware P5 Software

XenData LTO Archive

Facilis Technology

SnapServer XSR NAS Series

Nexsan Storage

ATTO SAS / Thunderbolt

Cables & Terminators

Barcode Labels

Turtle Storage Cases

Quantum Scalar i3 Warranty

Removable Disk Storage

Imation RDX

Imation RDX Bundles

Tandberg RDXLock WORM

Quantum RDX

HP RDX+ Bundles

IBM RDX

Dell RD1000

Reconditioned Tape Drives


Custom Sequence Barcode Labels for all your Tape Media - DLT, SDLT AIT and LTO FREE LTO BARCODE LABELS

LTO-9 Tape Drives LTO-9 Tape Libraries Now Available

SymplyPro LTO Archiving Solutions LTO-8 and LTO-9

Browse by Manufacturer
Mailing Lists


Proactive Defense Strategies Provide the Best Chance to Defeat Ransomware

LTO tape is arguably the lowest-cost, simplest method of achieving ransomware recovery best practices.

Ransomware is a top concern for senior business leaders because of the severe consequences of a successful attack. Magnetic tape is a multi-tool technology that supports the five key best practices for protecting and recovering data from a ransomware attack

Executive Summary

IDC surveys of worldwide enterprises have shown ransomware to be a top concern of both business leaders and technical leaders. Highlights from this research include the following:

  • More than 90% of organizations surveyed indicated that they have been attacked by malware, and 87% of those organizations have been attacked successfully.
  • One-third of organizations worldwide have experienced a ransomware attack or breach that blocked access to systems or data in the past 12 months.
  • It is not uncommon for organizations to be attacked more than once by ransomware.
  • Only 13% of organizations that reported a ransomware attack indicated they had not paid a ransom.

Moreover, FBI data shows that ransomware attacks have more than doubled since the beginning of 2020, in part driven by the increase of work-from-home (WFH) workers who have opened new attack points for ransom perpetrators.

The consequences of a successful ransomware attack on data are severe. Some of the consequences have immediate impact on organizations, such as lost employee productivity, disrupted operations, "all hands on deck" disaster response, and ransom payments that can reach into the millions of dollars. Ransomware has long-term consequences as well, including lost revenue, permanent loss of customers, unrecoverable data, regulatory fines for data breaches, permanent loss of organizational reputation, and shareholder lawsuits for negligence. Ransomware attacks can also be embarrassing for an organization's leadership.

Organizational leaders must also be prepared to respond to evolving government directives. For example, a recent U.S. Executive Order directed U.S. federal agencies to harden their cybersecurity systems and included the creation of a Cyber Safety Review Board. While not affecting private enterprise directly, it is an indication that all organizations need to take their ransomware response more seriously and to consider deploying an internal group to assess corporate malware/ransomware readiness and response. Such a group should be chartered not only to prepare the organization but also to demonstrate a proactive approach to combat possible allegations of negligence from lawsuits.

As our previously mentioned research illustrates, it's a virtual certainty that organizations will be attacked — the issue is whether organizations are prepared to respond in such a way that minimizes impact and reduces the likelihood of paying a ransom. To give themselves the best chance against ransomware attacks on data, organizations need to adopt five key best practices:

  • Encryption. Data should be encrypted at rest on primary storage and in flight when being sent over a network and when stored in a backup data set. Encryption is the best defense against data theft and exfiltration, whether from external or internal threats, because cybercriminals cannot utilize the data. Of course, organizations must pay careful attention to key management systems so that infiltrators cannot easily access the encryption keys.
  • Immutability. Immutable copies prevent anyone from changing or deleting a data copy. Organizations should have backup copies in immutable formats to ensure data integrity when data needs to be recovered. These immutable copies can further be protected using encryption. IT teams should ensure that immutability cannot be circumvented using simple methods such as system clock resets or policy changes.
  • Air gap. Air gap is a means of taking a data copy, usually a backup copy, offline so that it is physically disconnected from any network and therefore inaccessible to cybercriminals. An air gapped copy should be immutable and encrypted to stymie internal threats who may have physical access to the air gapped copy. It is important to note that to have a data copy in the cloud is not necessarily an air gap. Systems accessible over a network must ensure that the control path and the data path are separated by different access method and credentials.
  • 3-2-1-1 backup strategy. 3-2-1-1 is an update to the old 3-2-1 strategy. This means three copies of the data on two different types of media, with one copy on onsite and offline and one copy offsite and offline.
  • Backup scanning. Malware may lie dormant in systems for many months prior to payload detonation. Therefore, it may not be detected and may be backed up with the rest of the data. Thus, scanning backup data sets for malware before data is restored is critical to avoiding reinfection.

Fortunately, solutions exist that will help organizations implement these best practices without adding complexity to the IT environment.

Benefits

Ransomware and malware are an ongoing arms race with cybercriminals. Attacking organizations is a full-time occupation in which the criminals' full effort is spent finding new ways to succeed. As IT organizations erect defenses against certain attacks, the criminals find ever more creative ways to circumvent them. In fact, IT organizations are inherently on defense, but they must take proactive measures to thwart attacks and to ensure recovery is a priority.

No technology or strategy can guarantee that a ransomware attack can be avoided. Thus, while intrusion detection and prevention tools are important, they simply are not enough. Unfortunately, cybercriminals have learned to attack backup data sets first, through either deletion or encryption. When backups are compromised, criminals significantly increase the chances of forcing the victim to pay the ransom.

The good news (if it can be called that) is that ransomers operate much like a business. That is, they seek to maximize profit with the least possible effort. Thus, they look for soft, profitable targets. Organizations that make themselves difficult targets have the best chance of forcing the cybercriminals to just move on.

Proactive defense strategies not only avoid the likelihood of a successful attack but also help avoid shareholder or other lawsuits based on allegations of negligence. Even if an attack is successful, organizations prepared to respond will suffer the least downtime or other potential consequences. These defenses factor in not only external threats but also internal threats from disgruntled or dishonest employees.

The best defense against data attacks is the assurance of recoverability through data survival. Though this is not a deterrence against attack, because the criminals are unaware of the data survival capabilities, data survival does allow organizations to immediately go into recovery mode without paying the ransom.

Key Trends

New ransomware attacks are constantly emerging, with device command and control being among the most recent methods. However, because data is essential to organizational survival, it is still the most common target for criminals. As noted previously, ransomers have learned to attack the backup first because removing the possibility of data restoration increases the chances that organizations will be forced to pay the ransom to get their data back.

Criminals use four main attack methods to compromise organizational data:

  • Encryption. The hacker encrypts data files and then demands a ransom to provide the encryption key.
  • Corruption. The hacker programmatically scrambles data and demands the organization pay a ransom to get the descrambling program.
  • Deletion. Data deletion is most used against backup data sets; deletion is used to prevent organizations from restoring data without paying a ransom.
  • Theft (exfiltration). Criminals (both internal and external attackers) steal data and then threaten to disclose sensitive information or sell it on the dark web unless a ransom is paid.

Of course, attackers may also use more than one attack method at the same time. Thus, organizations need a complete solution that addresses each possibility holistically.

To complicate data security further, work from home — or work from anywhere — has opened new attack opportunities for malware. In these attacks, hackers use the home systems of employees as the soft spot to attack because many users are not savvy about defensive technologies for home networks, firewalls, and intrusion detection.

These attacks do not target individual users (they're usually not very profitable); rather, they focus on stealing user credentials to access a corporate network. Most such attacks start with phishing scams to personal email accounts outside the purview of IT groups, which may flag the scam. To avoid these scams, organizations must focus on employee training, first teaching users to identify potential phishing scams and then having users diligently deploy firewalls, VPNs, and antimalware software on home systems.

LTO tape is an existing, proven technology that can enable the previously mentioned five best practices and help organizations address these threats.

Considering LTO Tape

LTO tape, also known as Ultrium, has become the de facto industry standard format for magnetic tape. The LTO Program is a group of tape drive manufacturers, tape library manufacturers, and tape media manufacturers that have combined efforts to ensure the progress of LTO tape technology. The LTO standard is now on its ninth generation, with specifications established through Generation 12. The LTO Program has a solid reputation for delivering announced technology on time.

LTO tape is now recognized as a multi-tool technology that can be an indispensable in the fight against ransomware, delivering reliability. The LTO Program can help companies establish best practices against ransomware attacks as noted previously with the following features and methods:

  • Encryption. LTO tape drives have government-grade encryption built in. Because this encryption is at the hardware level, it can be implemented without performance penalty. Encrypted tapes will be useless to anyone without the encryption key.
  • Immutability. LTO tape media contains a tab on the cartridge to make any tape into a write once, read many (WORM) immutable copy. Data may be read, but it cannot be changed or deleted by anyone who does not have physical access to the media.
  • Air gap. The removal of tapes from a library eliminates the physical connectivity needed to access, modify, or delete the data on the cartridges. Physical access is needed to put the media into a device. Tape is arguably the easiest, lowest-cost. and most fail-safe means of establishing an air gap. Without physical access, criminals can't compromise the backup.
  • 3-2-1-1. Tape can serve as the second media type, the onsite/offline copy as well as the offsite/offline copy of data (the 2-1-1 part of the strategy). When combined with encryption and immutability, these copies are arguably the most certain chance an organization has to ensure data survival in the event of a malware attack.
  • Backup scanning. Because there is no assurance that malware has not been backed up to tape (or any other backup system), LTO technology allows tapes to be scanned upon restore to detect and delete malware.

In addition to being a key tool to defeat ransomware, LTO tape has several other unique attributes that add value to the organization:

  • Long-term data retention. LTO media is certified for up to 30 years for data retention integrity. Organizations that need to retain data for several years or several decades can use LTO as a reliable, long-term media with minimal administrative overhead.
  • Low total cost of ownership (TCO). The cost to store data on tape media is extremely low because no power or cooling is required (although temperature extremes on stored tapes must be avoided). Magnetic tape is objectively the lowest-cost way to store data for long periods of time.
  • Rapid data restore. Generation 9 LTO has a restore rate of up to 1,000MBps (assuming 2.5:1 data compression) per drive, more than 8x the throughput rate of a 1Gbps Ethernet link. Organizations can scale tape to match the ingest rate of target systems, making large-scale data operations practical where recall from the cloud simply is not practical.

When using tape, organizations typically implement the following backup strategy: Daily backups are retained for seven days, weekly backups are retained for a month, and monthly backups are retained for a year. This strategy almost certainly ensures that data is available for restore at a point prior to the attack. Other technologies such as snapshot and clones — though useful and necessary — are often deleted on a much shorter-term basis to save disk space. This is especially important in cases where the attack takes place over an extended period of time and therefore the disk-based copies may not be available at the necessary point in time.

Challenges

Ransomware and malware are constantly evolving and will emerge in ways that no one can predict. Thus, no company or organization can be sure that today's solutions will meet tomorrow's threats. Specifically, tape does not address all types of ransomware (nor do other storage technologies) such as device command and control, which has been the method of attack in several recent high-profile ransomware attacks.

Tape is primarily a responsive technology that helps restore lost data but must be combined with other technology such as intrusion detection and prevention. It can also help prevent data exfiltration from backup copies, but it does nothing to address attacks on primary storage, regardless of attack method. Moreover, organizations should not rely on tape alone for their ransomware protection. They must combine tape with other technologies, such as snapshots, mirrors, replication, and other data protection methods to address the range of data loss causes.

Conclusion

Ransomware and malware are threats that will not go away. Cybercrime is simply too profitable for criminals to abandon. Although no one is invulnerable to attack, organizations that take all reasonable steps to prevent attacks and establish assured recovery from ransomware are the most likely to avoid it in the first place or recover most quickly if attacked. Magnetic tape is an established, understood, and proven technology that can be an invaluable tool for defeating ransomware. LTO tape is unique in its ability to meet all five best practices for addressing ransomware and giving organizations the best chance of recovery and avoiding the consequences of an attack.

Contact your BackupWorks Account Rep today at 866 801 2944 and ask about LTO Tape

Search
Shopping Cart
Your cart is empty.

Tandberg Data RDX Quikstor Removable Disk Cartridges

RDX 10 Pack Promotion - celebrating 10 Years of RDX Technology

Quantum Scalar i3 LTO-9 Now Available and Shipping

Free Shipping UPS Ground - $500 min. order


Repair Services - 6 Month Warranty Fast Turnaround

Outlet Center - Refurbished Tape Drives - 6 Month Warranty