Millions of Ransomed Files Recovered with Syncplicity

Millions of Ransomed Files Recovered with Syncplicity

SANTA CLARA, June 28, 2017 -- The risk of data loss due to ransomware is not new, but the latest outbreaks, such as "Petya" and “WannaCry”, underscore the importance of having an effective prevention and recovery plan in place. To date, over a million files have been restored from ransomware breaches using Syncplicity.

Over the last 18 months we have seen a significant rise in the number of incidents and we’ve assisted our customers in healthcare, manufacturing, hi-tech, education and others with their enterprise data recovery efforts. 

What makes Syncplicity different from traditional backup and other Enterprise File Sync and Share (EFSS) solutions is our unique any-folder sync capability and real-time document protection. Some common misconceptions:

  • 'It's okay, we have OneDrive', you may be thinking. Most EFSS solutions will only 'backup' the files placed in the 'Magic Folder'. If an end-user system is compromised and the malware spreads to network devices, you have no means to recover these files. With Syncplicity any and all folders can be synced to your cloud or on-premises StorageVault, including 'My Documents', 'Desktop', 'C:\User', etc.
  • 'No problem, we have nightly backups', you say. Those crafty end-users seem to find a way to disable and delay the schedule backup. Local files that are updated frequently are typically the most valuable for worker productivity; yet daily backups often miss these. With Syncplicity, documents are backed up instantly in real-time. Each time a document is Saved, a new version is instantly synced to your private cloud or Syncplicity's cloud.

Critical Steps you should discuss with your teams today:

  • Immediately confirm your windows systems have been patched per Microsoft Security Bulletin MS17-010 and CVE-2017-0199. Ensure you have an effective patch management process for all your servers, user devices, VMs, and cloud instances.
  • Ensure your backup and recovery strategy includes critical business documents and make sure your recovery tests include ransomware scenarios.

To learn about proactive steps to prevent data loss and what to do if you are impacted by a ransomware breach:

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics