One of the biggest cybersecurity threats facing organizations today is ransomware. Ransomware is a scourge affecting governments and businesses of all sizes. It wreaks havoc on computer systems and can cost organizations millions to repair the damage. The global crisis that has emerged due to COVID-19 has spawned examples of the most insidious behavior as cybercriminals and scammers have targeted the weak and vulnerable. Mobile apps that appear to be COVID-19 tracking maps turn out to be spyware. Ransomware attacks on hospitals, health agencies, and medical research firms are increasing. The global crisis has created a sense of urgency for those combating COVID-19, so they are seen as more likely to pay the ransom. There are no signs that these attacks are slowing down any time soon, so what\u2019s the best way to keep your organization\u2019s data safe from harm?\r\n\r\nWhat is ransomware?\r\n\r\nBefore we address any potential solutions to ransomware we should provide a definition of what ransomware is. One of the most common forms of ransomware is known as \u201ccrypto ransomware.\u201d A crypto ransomware attack typically encrypts valuable files or the contents of an entire disk to prevent users from accessing it. The organization affected is told that they have to pay a ransom to regain access to their data. If that data hasn\u2019t been backed up somewhere, or worse, if the backup is also encrypted, the victim has to face losing their data or paying the cybercriminal. Imagine having the lives of sick and dying patients in your hands, or working on an antiviral vaccine and having your data held hostage? I can\u2019t. Would you pay to restore access? We are told not to pay, but can you fault those that do, especially in a global crisis?\r\n\r\nThe impact of downtime\r\n\r\nThe impact of downtime to enterprises under a ransomware attack are typically financial due to the loss of revenue or idle time for employees. But when the attack is on governmental, medical and emergency responders, the cost of downtime can be calculated in the health and lives of the people that institution serves.\r\n\r\nHow do I prevent a ransomware attack?\r\n\r\nOften, organizations can avoid paying the ransom if they opt to restore affected data from backups. Backup data is not immune to ransomware, but a diligent program of keeping multiple versions, different recovery points (yearly, monthly, weekly, daily), and a geographical separation between backup copies, goes a long way to reduce the impact of ransomware attacks. A common rule of thumb for backing up data is known as the \u201c3-2-1 rule\u201d. This describes keeping 3 copies of your data, 2 on different media, and 1 offsite. Offsite makes sense because if you can \u201cair gap\u201d a backup copy, it can be protected better than if it were attached to your network. Unfortunately, \u201cair gapping\u201d usually means keeping it \u201coffline\u201d and powered down in a salt mine somewhere. That limits your access to the backup and in some cases it can take days to locate it and bring it back online. In the case of a global emergency and where time is off the essence, you\u2019ll want millisecond access, not hours or days.\r\n\r\nRansomware and the cloud\r\n\r\nHow can you get millisecond access to offsite data? The answer is of course, cloud storage. Many organizations have started using cloud object storage as part of their 3-2-1 backup strategy. Storing data in the cloud is less expensive than on-prem, gives you near-instant access to your data, and adds an additional level of protection. Notice that I wrote \u201cadds\u201d. Data in the cloud can still be affected by ransomware. Although the vast majority of attacks are initiated on-premises from URL downloads, direct files, exploit kits, and infected USB flash drives, those viruses can be uploaded to the cloud in a backup job. They may not be able to affect previous backup jobs, but that recovery point will not be available. Recently we\u2019ve seen examples where cybercriminals have been able to access victims networks through exposed remote desktop services and gain access to cloud credentials and use them to delete previous backups or download them to servers under the cybercriminals control. With the backups either deleted or under the cybercriminal\u2019s control, they then deploy the ransomware. Less common, but also a vulnerability is a cloud object bucket (the basic container that holds your data) that was misconfigured and left open to the public. In these cases the contents of the bucket are exposed. All major cloud platforms operate on the basis of a shared responsibility model when it comes to compliance and security. Of course, the best defense is preventing attackers from gaining access to your network in the first place and to monitor for suspicious activity. Organizations should use network monitoring software, intrusion detection systems.\r\n\r\nFight ransomware with immutable buckets\r\n\r\nWhen you create a Wasabi storage bucket you have the option of making it immutable for a configurable retention period (in increments of days, weeks, months or years). \u201cImmutable\u201d means that any data written to that bucket cannot be deleted or altered in any way, by anyone, throughout its storage lifetime as defined by you. If desired, you can also configure the storage bucket to automatically delete the data after the retention period has expired. Wasabi immutable storage buckets prevent encryption by crypto ransomware. It can also help you comply with certain government and industry regulations like the Health Insurance Portability and Accountability Act (HIPAA), Financial Industry Regulatory Authority (FINRA), Markets in Financial Instruments Directive (MiFID) and Criminal Justice Information Services (CJIS) for securing and preserving electronic records, transaction data and activity logs. By adequately protecting and retaining data you can avoid expensive regulatory fines and penalties, and costly legal actions and settlements.\r\n\r\nWasabi is one of the few cloud service providers capable of providing immutability features. We believe that:\r\n\r\n \tNo one person should be able to encrypt or destroy data that is in an immutable bucket; and\r\n \tNobody should be able to touch a production system anonymously.\r\n\r\nThis means when using Wasabi immutable buckets, no one can delete or alter your data\u2013not even a systems administrator.\r\n\r\nIn the case of ransomware, like everything else, a good defense is the best offense. There are a variety of anti-malware and decryption products available to protect your system, but one of the simplest ways to keep your data safe is by performing regular backups, ideally keeping at least one backup copy offsite. Cloud storage providers provide encryption on the fly and at rest, but you should also take advantage of optional immutable features that exist.\r\n\r\nWhat to do if my business is hit by ransomware?\r\n\r\nThat\u2019s a hard question. Before COVID-19 and the ransomware assault on medical and emergency responders, I would have agreed with the advice of the FBI and never pay. Paying cybercriminals only encourages these types of attacks to continue. When it\u2019s a global crisis and thousands of lives are on the line, the answer isn\u2019t so easy.