Hi All
Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too? - quite a collaboration.
https://www.nccoe.nist.gov/projects/building-blocks/data-integrity/recoverhttps://lnkd.in/gpAsrzX
Videos at https://lnkd.in/gdQ8Ykd
2 page factsheet on scenarios, architecture and technology partners is at https://www.nccoe.nist.gov/sites/default/files/library/fact-sheets/data-integrity-fact-sheet.pdf
Regards
Caute_cautim
@Caute_cautim wrote:Hi All
Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too? - quite a collaboration.
This is surprisingly timely lol. We're currently going over our BC plan documents with the intent of making them better. Some of the questions this brought to mind was:
Do we know at what settings level (system requirements?) our systems need to be at before when can start restoring them from our current backup provider?
Does our backup provider have anything published with the minimum system requirements needed to perform the different recovery types?
If so, did anything change with the current Knowledge Base article published by the backup provider?
@tmekelburg1Can I suggest you also read this article as well?
Would this also leave an impression on how tackle the problem as well within your BCP?
Regards
Caute_cautim