Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too? - quite a collaboration.
Videos at https://lnkd.in/gdQ8Ykd
2 page factsheet on scenarios, architecture and technology partners is at https://www.nccoe.nist.gov/sites/default/files/library/fact-sheets/data-integrity-fact-sheet.pdf
@Caute_cautim wrote:Hi All Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too? - quite a collaboration.
This is surprisingly timely lol. We're currently going over our BC plan documents with the intent of making them better. Some of the questions this brought to mind was:
Do we know at what settings level (system requirements?) our systems need to be at before when can start restoring them from our current backup provider?
Does our backup provider have anything published with the minimum system requirements needed to perform the different recovery types?
If so, did anything change with the current Knowledge Base article published by the backup provider?
@tmekelburg1Can I suggest you also read this article as well?
Would this also leave an impression on how tackle the problem as well within your BCP?