Never pay the ransom gangs! If you can restore, you will not pay the ransom. Power your backup to be fearless against ransomware.
Get in touch

Power your backup to be fearless against ransomware

HPE + Veeam together have teamed up to offer unique capabilities by integrating features with HPE's StoreOnce x Veeam V11. 

Enjoy the protection from Experts' choice and power your backup to be fearless against ransomware! 

Table imageTable image

Stage 1: How the infection starts?

1) An email with an attachment is sent by the hacker with a fake identity

2) If the victim (user) opens the attachment, the attachment will install the malware (infected software) on the computer

3) The security control on the user's computer will be breached

Stage 1: How the infection starts?

1) An email with an attachment is sent by the hacker with a fake identity

2) If the victim (user) opens the attachment, the attachment will install the malware (infected software) on the computer

3) The security control on the user's computer will be breached

Stage 2: File encryption

1) The malware encrypts your files then looks for other targets within the network

2) The malware will then spread to all the other machines e.g. servers and computers in the network

3) Usually the victim (user) will not be aware of the occurring malware attack

Stage 2: File encryption

1) The malware encrypts your files then looks for other targets within the network

2) The malware will then spread to all the other machines e.g. servers and computers in the network

3) Usually the victim (user) will not be aware of the occurring malware attack

Stage 3: Backup data corruption x HPE StoreOnce

1) The malware will continue to encrypt the data from the network servers, including the backup data

2) A keylogger will further be installed to steal the network administrator's password

3) Then the stolen credentials will be used to login and delete the Backup and Snapshots (e.g. Backup Console, StoreOnce, Primera, Nimble, etc.)

 If you can restore, you will not pay the ransom! 

Stage 3: Backup data corruption x HPE StoreOnce

1) The malware will continue to encrypt the data from the network servers, including the backup data

2) A keylogger will further be installed to steal the network administrator's password

3) Then the stolen credentials will be used to login and delete the Backup and Snapshots (e.g. Backup Console, StoreOnce, Primera, Nimble, etc.)

 If you can restore, you will not pay the ransom! 

Stage 4: Ransom

1) The victim not only has the files encrypted and destroyed, but also the network servers’ data including the Backups

2) When the victim cannot decrypt the files, he/she would accept to pay the ransom for the decryption key

3) However, in some cases even if the victim is willing to pay, there is no guarantee to rescue the files or the backup data

Stage 4: Ransom

1) The victim not only has the files encrypted and destroyed, but also the network servers’ data including the Backups

2) When the victim cannot decrypt the files, he/she would accept to pay the ransom for the decryption key

3) However, in some cases even if the victim is willing to pay, there is no guarantee to rescue the files or the backup data

HPE StoreOnce Backup Appliances

HPE StoreOnce Backup Appliances leverage intelligent storage to transform your hybrid cloud data protection with greater simplicity, higher performance, and built-in ransomware protection — all at a lower cost than traditional solutions.

Key Benefits:

• Protect more data, faster for less with flash speed, efficient, and non-disruptive data protection

• Deliver rapid recovery on-premises or long-term retention in the cloud

• Secure by design with ransomware protection

HPE StoreOnce Backup Appliances

HPE StoreOnce Backup Appliances leverage intelligent storage to transform your hybrid cloud data protection with greater simplicity, higher performance, and built-in ransomware protection — all at a lower cost than traditional solutions.

Key Benefits:

• Protect more data, faster for less with flash speed, efficient, and non-disruptive data protection

• Deliver rapid recovery on-premises or long-term retention in the cloud

• Secure by design with ransomware protection

It’s time to defend your organization against ransomware!

Let us help you safeguard your business.

Just drop us a line, if you would like to protect your business from cyberattacks.

Hotline: (852) 2856 5678

Email: enquiry@mircoware.com.hk

 

It’s time to defend your organization against ransomware!

Let us help you safeguard your business.

Just drop us a line, if you would like to protect your business from cyberattacks.

Hotline: (852) 2856 5678

Email: enquiry@mircoware.com.hk

 

Questions?
We can help.

Get in touch

More information?
Find us here!