SlideShare a Scribd company logo
Enterprise File Services: Minimizing The Threat of Ransomware Trojans
Jeff Denworth • SVP of Marketing, CTERA
KASPERSKY REPORT: IT THREAT EVOLUTION IN Q1 2016
critical considerations for
enterprise data loss
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
The probability of a natural disaster
is not zero, but is a statistically
insignificant threat to enterprise
business continuity, versus the #1
contributor to business data loss.
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
Source: IT Policy Compliance Group, 2015
75% of ALL data loss is due to human error
Q1 2015 Q2 2015 Q3 2015 Q4 2015 Q1 2016
RANSOMWARE REVENUE
$24M in all of 2015 $209M
Q1 2016
$1 Billion
(est.) in 2016
35x y/y growth
Asymptotic
Minimizing the threat of Ransomware with enterprise file services
Minimizing the threat of Ransomware with enterprise file services
Digital Wallets
SMB
Files
delayed execution
2048-bit Keys
Minimizing the threat of Ransomware with enterprise file services
Average Ransom: .5-2 Bitcoins (XBT) per Crypto-Locked Computer
Low-End Ransom:
$180 @ .5XBT/Computer
High-End Ransom:
$1,500 @ 2XBT/Computer
Online Support
8/4/2016
Ransomware Exposure Is Measured By:
• # of Systems That Become Infected
• Locky: 90K systems per day @ 0.5-1 Bitcoin ea (Forbes)
• Operational Value of Infected Systems & Data
 (rumored) Ransom of $3.4M
 10-Day Data Outage
 Medical Records System Disabled
 Reverted To Pencil, Paper, Faxing
 Patients/Business Diverted
 Paid $17,000 in Bitcoins
Physical Firewalls & Email Security • Proper Employee Training
Rule #1: Implement The Right Safeguards
constant updating; open source derivatives
CryptXXX
source: http://trewmte.blogspot.com
Tips for Dealing with the Ransomware Threat
Prevention Efforts
- Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s data.
- Patch operating system, software, and firmware on digital - Ensure antivirus and anti-malware solutions auto update
- Manage the use of privileged accounts
- Configure access controls, including file, directory, and network share permissions appropriately.
- Disable macro scripts from office files transmitted over e-mail.
- Implement software restriction policies or other controls to prevent programs from executing from common ransomware
locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs).
Business Continuity Efforts
- Back up data regularly and verify the integrity of those backups regularly.
- Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up.
Source: FBI, “Incidents of Ransomware on the Rise” www.fbi.gov
Legacy Solutions Are Built To Back
Up In 24+ Hour Increments
Legacy IT Solutions Make Backup Rules
Difficult To Enforce For Mobile Workers
Lack of Source-Based, Global & Block-Based Dedupe = 2-5x Slower
Eg. HP Connected Backup Scheduler
Low Overhead (<2% CPU, 50KB RAM) • Global, Source-Based Deduplication • Service Continuance
Rule #2: Recover Systems With Modern Tools
Fun With ‘Delayed Execution’
The CryptXXX Ransomware downloads a delayed execution DLL
file, which waits more than 60 minutes before launching on
the victim's computer.
After the time has elapsed, CryptXXX carries out its attack,
encrypting the victim's files and collecting important data and
money in the form of Bitcoins.
• makes it harder for the victims to connect the incident to
the source of infection.
• Delayed execution is also a known VM evasion technique
The Three Areas CTERA Focuses On Business Continuity
endpoints offices cloud servers
file sharing & data protection file servers & data protection data protection only
AVG TIME TO FILE VERSION
Sync Average Case:
Sub-5 Minutes
Backup Average Case:
Once Every 24 Hours
24 Hour
Period
Threat Minimized
23+ hrs of exposure contained
Rule #3. Sync (Apologies to the FBI)
OK, Yes.... Please Backup
Recover Your System
To A Consistent State
In The Case Of Full Disk Crypto
But, Seriously … Sync.
A Day Is 1/250th
Of A Work Year!
Sync is A Form Of Backup
Minimizing the threat of Ransomware with enterprise file services
Limitless File Versioning
Push-Button Restore of Backups or Versions
Backups = 1-24hr Granularity • Shares = 5 Minute Granularity
App for all leading smartphones and tablets:
Anywhere data access.
Even when your PC is bricked 
Access data from any web browser, recover files instantly.
Embedded Anti-Virus Scanning Upon File Download • Supplements A Strong Firewall
Rule #4: Care For What You Share
Does Cloud-Enabled File Sharing Increase The Blast Radius?
Con:
Sharing is easer than ever.
Pro:
- Central Governance
- Global Scanning
- Global Roll-Back
Not Really. Collaboration Isn’t New. Benefits Far Outweigh…
1
Fortify The Perimeter • Train Everyone
2
Use Modern Backup To Ensure RPO
3
Sync To Minimize The Blast Radius
4
Care About What You Share
Eliminate the threat of any natural or man made data disaster.
Recover data in real time using
secure, cost-effective cloud technologies.
Questions?

More Related Content

PPTX
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
PDF
Modern vs. Traditional SIEM
PPT
Emerging Threats and Strategies of Defense
PPTX
SIEM (Security Information and Event Management)
PDF
Next Dimension and Cisco | Solutions for PIPEDA Compliance
PDF
The Threat Landscape & Network Security Measures
PDF
Next Dimension and Veeam | Solutions for PIPEDA Compliance
Webinar: Ransomware: Strategies for Protecting Your Weakest Link - Endpoints
Modern vs. Traditional SIEM
Emerging Threats and Strategies of Defense
SIEM (Security Information and Event Management)
Next Dimension and Cisco | Solutions for PIPEDA Compliance
The Threat Landscape & Network Security Measures
Next Dimension and Veeam | Solutions for PIPEDA Compliance

What's hot (19)

PPTX
Security Monitoring using SIEM null bangalore meet april 2015
PPTX
Ransomware Resiliency, Recoverability and Availability
PPT
Securing Your Small Business Network
PPTX
"Backoff" Malware: How to Know If You're Infected
PPTX
Six Steps to SIEM Success
PDF
Computer Security: Worms
PPTX
Introduction to Network and System Administration
PDF
[CB20] Keynote2:Practical and Intelligent Incident Response Planning by Russ ...
PDF
Take the Ransom Out of Ransomware
PPT
Network Security, Change Control, Outsourcing
PPTX
The Truth About Viruses on Power Systems - Powertech
PPTX
PowerShell: The increased use of PowerShell in cyber attacks
PPSX
The myth of secure computing; management information system; MIS
PDF
Journey to the Cloud: Securing Your AWS Applications - April 2015
PDF
Cheatsheet for your cloud project
PPT
ITOX PGP CommandLine slide_share march 2010
PPTX
Big Data Shouldn't Be Big
PDF
Ransomware Prevention Guide
PDF
The Benefits of a Network Security Plan
Security Monitoring using SIEM null bangalore meet april 2015
Ransomware Resiliency, Recoverability and Availability
Securing Your Small Business Network
"Backoff" Malware: How to Know If You're Infected
Six Steps to SIEM Success
Computer Security: Worms
Introduction to Network and System Administration
[CB20] Keynote2:Practical and Intelligent Incident Response Planning by Russ ...
Take the Ransom Out of Ransomware
Network Security, Change Control, Outsourcing
The Truth About Viruses on Power Systems - Powertech
PowerShell: The increased use of PowerShell in cyber attacks
The myth of secure computing; management information system; MIS
Journey to the Cloud: Securing Your AWS Applications - April 2015
Cheatsheet for your cloud project
ITOX PGP CommandLine slide_share march 2010
Big Data Shouldn't Be Big
Ransomware Prevention Guide
The Benefits of a Network Security Plan
Ad

Similar to Minimizing the threat of Ransomware with enterprise file services (20)

PPTX
AI training with Copilot and discussing secrity threats
PPTX
pr-host-intrusion-prevention-customer-presentation (5).pptx
PPTX
Ransomware Defense and Remediation with Pure Storage.
PDF
Focus on business, not backups
PPTX
3 Tips to Stay Safe Online in 2017
PPTX
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
PPTX
What is dr and bc 12-2017
PDF
Business Continuity 2009
PPT
Network security
PDF
Lanlogic IT White Paper
PPTX
Protecting Your Business - All Covered Security Services
PDF
How To Prevent Ransomware
PDF
Corona| COVID IT Tactical Security Preparedness: Threat Management
PDF
Behind the Curtain: Exposing Advanced Threats
DOCX
Network Diagram of a company ABCD Roshan basnet it 29
PPTX
Post Wannacry Update
PPTX
Endpoint Protection as a Service (EPaaS)
PPTX
ten important crimes of Computer Crimes.pptx
PPTX
Your Greatest Threats Come from Within
PDF
Využijte svou Oracle databázi na maximum!
AI training with Copilot and discussing secrity threats
pr-host-intrusion-prevention-customer-presentation (5).pptx
Ransomware Defense and Remediation with Pure Storage.
Focus on business, not backups
3 Tips to Stay Safe Online in 2017
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
What is dr and bc 12-2017
Business Continuity 2009
Network security
Lanlogic IT White Paper
Protecting Your Business - All Covered Security Services
How To Prevent Ransomware
Corona| COVID IT Tactical Security Preparedness: Threat Management
Behind the Curtain: Exposing Advanced Threats
Network Diagram of a company ABCD Roshan basnet it 29
Post Wannacry Update
Endpoint Protection as a Service (EPaaS)
ten important crimes of Computer Crimes.pptx
Your Greatest Threats Come from Within
Využijte svou Oracle databázi na maximum!
Ad

Recently uploaded (20)

PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PPTX
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
PDF
top salesforce developer skills in 2025.pdf
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
Introduction to Artificial Intelligence
PPTX
history of c programming in notes for students .pptx
PDF
AI in Product Development-omnex systems
PPTX
Transform Your Business with a Software ERP System
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
L1 - Introduction to python Backend.pptx
PPTX
Online Work Permit System for Fast Permit Processing
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Operating system designcfffgfgggggggvggggggggg
PDF
medical staffing services at VALiNTRY
PDF
System and Network Administraation Chapter 3
PDF
System and Network Administration Chapter 2
PPT
Introduction Database Management System for Course Database
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
CHAPTER 12 - CYBER SECURITY AND FUTURE SKILLS (1) (1).pptx
top salesforce developer skills in 2025.pdf
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Upgrade and Innovation Strategies for SAP ERP Customers
Introduction to Artificial Intelligence
history of c programming in notes for students .pptx
AI in Product Development-omnex systems
Transform Your Business with a Software ERP System
CHAPTER 2 - PM Management and IT Context
VVF-Customer-Presentation2025-Ver1.9.pptx
L1 - Introduction to python Backend.pptx
Online Work Permit System for Fast Permit Processing
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Operating system designcfffgfgggggggvggggggggg
medical staffing services at VALiNTRY
System and Network Administraation Chapter 3
System and Network Administration Chapter 2
Introduction Database Management System for Course Database

Minimizing the threat of Ransomware with enterprise file services

  • 1. Enterprise File Services: Minimizing The Threat of Ransomware Trojans Jeff Denworth • SVP of Marketing, CTERA
  • 2. KASPERSKY REPORT: IT THREAT EVOLUTION IN Q1 2016
  • 8. The probability of a natural disaster is not zero, but is a statistically insignificant threat to enterprise business continuity, versus the #1 contributor to business data loss.
  • 11. Source: IT Policy Compliance Group, 2015 75% of ALL data loss is due to human error
  • 12. Q1 2015 Q2 2015 Q3 2015 Q4 2015 Q1 2016 RANSOMWARE REVENUE $24M in all of 2015 $209M Q1 2016 $1 Billion (est.) in 2016 35x y/y growth Asymptotic
  • 17. Average Ransom: .5-2 Bitcoins (XBT) per Crypto-Locked Computer Low-End Ransom: $180 @ .5XBT/Computer High-End Ransom: $1,500 @ 2XBT/Computer
  • 19. Ransomware Exposure Is Measured By: • # of Systems That Become Infected • Locky: 90K systems per day @ 0.5-1 Bitcoin ea (Forbes) • Operational Value of Infected Systems & Data
  • 20.  (rumored) Ransom of $3.4M  10-Day Data Outage  Medical Records System Disabled  Reverted To Pencil, Paper, Faxing  Patients/Business Diverted  Paid $17,000 in Bitcoins
  • 21. Physical Firewalls & Email Security • Proper Employee Training Rule #1: Implement The Right Safeguards
  • 22. constant updating; open source derivatives CryptXXX source: http://trewmte.blogspot.com
  • 23. Tips for Dealing with the Ransomware Threat Prevention Efforts - Make sure employees are aware of ransomware and of their critical roles in protecting the organization’s data. - Patch operating system, software, and firmware on digital - Ensure antivirus and anti-malware solutions auto update - Manage the use of privileged accounts - Configure access controls, including file, directory, and network share permissions appropriately. - Disable macro scripts from office files transmitted over e-mail. - Implement software restriction policies or other controls to prevent programs from executing from common ransomware locations (e.g., temporary folders supporting popular Internet browsers, compression/decompression programs). Business Continuity Efforts - Back up data regularly and verify the integrity of those backups regularly. - Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up. Source: FBI, “Incidents of Ransomware on the Rise” www.fbi.gov
  • 24. Legacy Solutions Are Built To Back Up In 24+ Hour Increments Legacy IT Solutions Make Backup Rules Difficult To Enforce For Mobile Workers Lack of Source-Based, Global & Block-Based Dedupe = 2-5x Slower Eg. HP Connected Backup Scheduler
  • 25. Low Overhead (<2% CPU, 50KB RAM) • Global, Source-Based Deduplication • Service Continuance Rule #2: Recover Systems With Modern Tools
  • 26. Fun With ‘Delayed Execution’ The CryptXXX Ransomware downloads a delayed execution DLL file, which waits more than 60 minutes before launching on the victim's computer. After the time has elapsed, CryptXXX carries out its attack, encrypting the victim's files and collecting important data and money in the form of Bitcoins. • makes it harder for the victims to connect the incident to the source of infection. • Delayed execution is also a known VM evasion technique
  • 27. The Three Areas CTERA Focuses On Business Continuity endpoints offices cloud servers file sharing & data protection file servers & data protection data protection only
  • 28. AVG TIME TO FILE VERSION Sync Average Case: Sub-5 Minutes Backup Average Case: Once Every 24 Hours 24 Hour Period Threat Minimized 23+ hrs of exposure contained
  • 29. Rule #3. Sync (Apologies to the FBI) OK, Yes.... Please Backup Recover Your System To A Consistent State In The Case Of Full Disk Crypto But, Seriously … Sync. A Day Is 1/250th Of A Work Year! Sync is A Form Of Backup
  • 31. Limitless File Versioning Push-Button Restore of Backups or Versions Backups = 1-24hr Granularity • Shares = 5 Minute Granularity
  • 32. App for all leading smartphones and tablets: Anywhere data access. Even when your PC is bricked  Access data from any web browser, recover files instantly.
  • 33. Embedded Anti-Virus Scanning Upon File Download • Supplements A Strong Firewall Rule #4: Care For What You Share
  • 34. Does Cloud-Enabled File Sharing Increase The Blast Radius? Con: Sharing is easer than ever. Pro: - Central Governance - Global Scanning - Global Roll-Back Not Really. Collaboration Isn’t New. Benefits Far Outweigh…
  • 35. 1 Fortify The Perimeter • Train Everyone 2 Use Modern Backup To Ensure RPO 3 Sync To Minimize The Blast Radius 4 Care About What You Share
  • 36. Eliminate the threat of any natural or man made data disaster. Recover data in real time using secure, cost-effective cloud technologies.

Editor's Notes

  • #4: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #5: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #6: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #7: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #8: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #9: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #10: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #11: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #12: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action
  • #22: The cloud is challenging every aspect of how organizations deal with user file storage, collaboration, office storage and data protection Organizations are now looking for smarter, less expensive tools that make them more agile IT-as-a-Service providers Anymore, users are looking for apps and cloud-integrated services that redefine both economics and service levels in the enterprise This is CTERA’s focus, we believe a $15B market is being turned upside down by ‘cloud’ and CTERA is at the center of the action