Jump to content

Peter2150

Member
  • Posts

    591
  • Joined

  • Last visited

  • Days Won

    18

Posts posted by Peter2150

  1. 1 hour ago, JeremyNicoll said:

    I used to work for a large enterprise.  We did test recovery (of the whole system, from a bare machine upwards) in a machine hall that - for the duration of the test - had no production workload in it.  These tests usually ran from late Friday thru late-Sunday and started with the assumption that emergency services wouldn't allow any of the professional IT people into the machine room.  So instructions were written for, and tested by, non-IT people - so that eg a fireman might be able to do the initial actions which actually had to be done physically rather than electronically/remotely.  It was, of course, expensive to plan, build and test these recovery systems.  We also hosted disaster recovery tests at our site for subsidiary companies in the group. 

    Again interesting, but didn't sound like a real life test.   Best solution for Ransomware is to never let it get near your system.   Hard, but not impossible by any means.

  2. On 12/3/2019 at 1:31 PM, Kevin Zoll said:

    In the case of larger scale ransomware attacks, restoring from backups is not economically feasible.  Which is why many companies, enterprises, and governmental agencies often choose to pay the ransom.  From the financial perspective it is much cheaper, and operational it gets the data back much quicker.

    Interesting.  Actually from what I've run most enterprises folks don't test their backups, so there not sure if they work, or how to use them.  Also people don't realize but when you have a disaster you are going to be under stress.  Not the time to learn a restore process.  For all the beta testers, you want real excitement try beta testing imaging restores.

  3. 21 hours ago, Frank H said:

    Our updates are distributed via CDN.

    Okay after a little homework I get it.   Next question how secure are they.  Apologies is this seems like nit picking, but I need to know.

  4. The context is something like  happened to Quickbooks  Online, where no one knew they were hosted by a third party until the hosting party was hit with a ransomware attack and users were locked out for almost a week.

×
×
  • Create New...