cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Caute_cautim
Community Champion

Ransomware protect and architecture

Hi All

 

Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too?   - quite a collaboration.

 

https://www.nccoe.nist.gov/projects/building-blocks/data-integrity/recoverhttps://lnkd.in/gpAsrzX

 

Videos at https://lnkd.in/gdQ8Ykd

 

2 page factsheet on scenarios, architecture and technology partners is at https://www.nccoe.nist.gov/sites/default/files/library/fact-sheets/data-integrity-fact-sheet.pdf

 

 

Regards

 

Caute_cautim

2 Replies
tmekelburg1
Community Champion


@Caute_cautim wrote:

Hi All

 

Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too?   - quite a collaboration.


This is surprisingly timely lol. We're currently going over our BC plan documents with the intent of making them better. Some of the questions this brought to mind was:

 

Do we know at what settings level (system requirements?) our systems need to be at before when can start restoring them from our current backup provider?

 

Does our backup provider have anything published with the minimum system requirements needed to perform the different recovery types? 

 

If so, did anything change with the current Knowledge Base article published by the backup provider? 

Caute_cautim
Community Champion

@tmekelburg1Can I suggest you also read this article as well?

 

https://securityintelligence.com/posts/zero-trust-defend-ransomware-attacks/?utm_medium=OSocial&utm_...

 

Would this also leave an impression on how tackle the problem as well within your BCP?

 

Regards

 

Caute_cautim