Optica Logo
zVT

Helpful Links

Strategies for Dealing With Ransomware Risk

Cybersecurity issues continue to dominate the headlines, from increases in ransomware attacks to consistent data breaches stemming from mismanaged, stolen, or compromised accounts. Malware attacks are a growing problem for organizations of all sizes and the "bad guys" are turning ransomware into a lucrative enterprise as the impact to businesses can be devastating. Targeted organizations often believe that paying the ransom is the most cost-effective way to get their data back — and, unfortunately, this may be the reality because they were not prepared.

An organization’s backup process is one of the most critical components of their overall data protection strategy and a mainframe virtual tape system that has the right feature set can provide an effective layer of protection. Optica’s zVT mainframe virtual tape systems offer the features and tools required to defend against today’s sophisticated data breach and malware threats.

In many cases a ransomware attack can be intentionally delayed by the perpetrators in order to infect many months of backup tapes, ensuring the company cannot restore the infected systems from recent backup tapes. Often it can take weeks or months for companies to recognize that they were even hacked. During that time, uninfected server backups are overwritten with the malware or ransomware and after a predetermined period, the hacker triggers the ransomware, shutting down all employee access to critical data, and the organization has no way to recover.

Based on this reality, the only way to beat a ransomware attack is to regularly generate a series of backups (before infection) that are completely protected and isolated, so that they remain uninfected and available for use when needed. An effective detection and recovery process relies heavily on the proper retention policies, virtual tape architecture and key features from the mainframe virtual tape system.

WRITE ONCE READ MANY (WORM) FEATURE (ZVT 5000-INAS)

Ransomware seeks and attacks vulnerabilities in the network, where data on servers, storage, and everything else connected to it can become compromised. For your data to be truly protected, your tape backup strategy should include the creation of an immutable copy of the data via WORM protection.

Once a tape is WORM protected, it can no longer be modified, including after the retention period has expired. WORM protection can be activated on virtual tapes with user specified retention periods from 1 day to 100 years and then they can be deleted after the retention period expires, but not written to. There are two ways WORM protection can be configured in the zVT 5000-iNAS:

  • Compliance Method is used when the contents of virtual tapes must be retained for legal compliance. A Compliance filesystem cannot be deleted if it contains unexpired WORM protected virtual tapes.
  • Enterprise Method is used when virtual tapes do not need to be retained for legal compliance. A Privileged Administrator can delete the entire filesystem even if it still contains unexpired WORM protected virtual tapes

ENHANCED DATA INTEGRITY CHECKING (ALL ZVT MODELS)

The Enhanced Data Integrity Checking feature allows customers to configure multiple layers of data validation to guarantee the integrity of their virtual tape data for as long as they wish to store it. Data can be validated immediately upon being written to the zVT storage repository by comparing a zVT-created CRC to the CRC written by the mainframe, and/or on a customer scheduled interval for the life of the data. This feature was designed to provide peace of mind by ensuring that the integrity of tape data remains intact for its entire lifecycle, including long term archival data. If a virtual tape were to be modified in any way while stored on the zVT system, the integrity check would immediately send an alert via email and/or SNMP to the configured recipients, and the alert would be posted on the GUI.

Enhanced Data Integrity Checking is an important zVT tool that guarantees early detection of a malware attack on your zVT virtual tape system.

Need Something Else?

In addition to these hardware solutions, Optica offers a suite of professional services. We provide
comprehensive infrastructure planning and design, installation and testing services.