Ransomware is more prominent, more sophisticated and more troublesome than ever. Hospitals, homeowners, consumers and corporations – all have made headlines this year as victims of Cryptolocker, TeslaCrypt, Locky and other malicious computer viruses designed to encrypt digital files and render them useless until you pay a hefty ransom to get them back.
Carbonite has a solution to this problem, and it’s important to understand how our backup solutions protect you and your data against cybercriminals. If you take the initiative and protect your files with Carbonite before you’re hit with ransomware, you’ll never need to pay the ransom.
How Carbonite protects computers from ransomware
Carbonite’s versioning capabilities are the key to restoring desktop or laptop computer files that have been encrypted with ransomware. If you’re using a Carbonite personal plan and your computer files get encrypted due to ransomware, you can simply use Carbonite to restore a version of the file that was backed up before the ransomware attack took place.
You will also need to remove the ransomware and delete all infected files before you start restoring clean versions. If your computer becomes infected with ransomware, take the following steps:
- Remove the computer from the network it’s running on so the infection doesn’t spread to other computers. If the computer isn’t running on a network, skip this step.
- Shut down the computer by holding down on the power button.
- Turn the computer back on and select Safe Mode with Networking.
- Reconnect to the Internet then download and run a malware detection and removal tool such as Malwarebytes or Norton Power Eraser.
- Once the virus is removed, delete all encrypted files and restore clean versions from Carbonite’s cloud backup service.
If you run the anti-malware software and believe the computer is still infected, or if you have trouble booting your computer in Safe Mode with Networking, contact an IT professional to help you wipe the computer clean and remove the virus. Another option is to use Carbonite to restore your files to a new or different computer.
Important Note: As soon as your computer is virus-free, contact the Carbonite Customer Care Team and tell them what happened. They’ll be able to guide you through the process of restoring clean versions of your files. Carbonite’s award-winning, U.S.-based Customer Care Team is available seven days a week and can be reached at (877) 222-5488.
How Carbonite protects servers from ransomware
If you’re using a Carbonite Server Backup product to protect the data on your company’s servers, you can restore previous versions of your files the same way Carbonite Personal plan users can. But Carbonite Server Backup has additional features that make the process of recovering from a ransomware attack fast and simple.
Specifically, with Carbonite Server Backup, you have greater control over how many copies of your files Carbonite will save and how long they’ll be retained. This gives you more freedom and flexibility when it comes to determining a Recovery Point Objective (RPO), the point in time you need to go back to in order to retrieve clean versions of your files. For example, if you were attacked with ransomware two days ago, a safe RPO would be three days ago.
Carbonite Server Backup plans also offer “hybrid” protection, which means that users can back data up to a server located on premises as well as to the cloud. Hybrid backup is considered an industry best practice for businesses because it combines the speed and convenience of local backup and recovery with the extra protection of the cloud. With hybrid backup, if your local server becomes damaged or unusable, you’ll still have a copy of your files stored safely in the cloud.
Carbonite Server Backup plans allow users to configure a separate retention policy for backups stored locally and backups stored in the cloud. To configure retention settings for local and cloud backup, simply navigate to the Retention settings section and make your selections.
Retaining past backups allows for quick and easy recovery from ransomware and other malicious computer viruses.
The only way a backup copy is removed is if the retention policy you set expires, or if you manually delete it. Every backup is added to disk or the cloud without overwriting previous backups. Of course, it’s crucial to set a retention policy that meets your needs and stays within your allotted budget.