Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies


These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Protect your data from the inevitable ransomware attack


Rethink your approach to back up and recovery in the light of the ransomware threat.

Backup and recovery plans are created to protect data, but these plans are often built with a focus around technology or hardware failure. However, ransomware attacks, which exploit the ‘human element’ in security, are now making headlines and generating renewed fear in organisations. To cope with this new kind of threat, your backup and recovery strategy needs to adapt. Ransomware is often seen as a security issue but it’s actually much more than that.

When dealing with ransomware attacks, the backup and recovery strategy you’ll need to adopt is different from those that have been put in place to cater for other threats such as hardware failure of theft.

A ransomware attack is different from other incidents in that it is a direct and instantaneous attack on all your organisation’s data. Ransomware is a form of malware which essentially holds information or entire devices hostage including desktops, laptops, servers and storage. And this makes it essential to revamp your backup and restore policies.

First, understand the threat

Research shows that ransomware attacks are surging. Our latest white paper Ransomware: The Prevalent Business Disruptor revealed that the sectors most often targeted by ransomware attacks are:

  • business and professional services
  • government
  • healthcare
  • retail

Financial services is another area that is being increasingly targeted by cybercriminals.

Download the white paper here.

The 2017 Global Threat Intelligence Report indicates that: ‘The maturity of these industries coupled with the value of data they hold, from personally identifiable information, personal health information, credit card data, to intellectual property, makes them a lucrative target for cybercriminals.’

The white paper adds that there was a 300% increase in ransomware attacks in the US between 2015 and 2016, and this is set to increase as criminals take advantage the growth in Ransomware-as-a-Service, where cybercriminals take advantage of these platforms to launch attacks. These emerging platforms allow ransomware attacks to become highly accessible to criminals, even those without the ability to program an attack directly. We expect that ransomware attacks will increase in frequency in 2018.

Organisations need to accept that they are, at some point, going to be subject to a ransomware attack of some sort. Those that bury their heads in the sand will be less prepared when the worst happens.

What you can do to protect your data from ransomware attacks?

1.Assess the risks

 The first step involves identifying critical data and how it can be attacked and the optimal backup placement for this data. Critical data could include patient records in healthcare, client records in the financial services or government employees’ laptops in the public sector. Data can’t be classified by the kind of device it is being stored on – instead, it requires that you understand where your most sensitive data is actually being stored.

With the ransomware threat, placement of your data is something you need to consider seriously. Having backups on the same network as the primary data can pose an unnecessary risk, so having offline backups is considered best practise. You also need to make sure that the secondary site has the standards and tools in place to secure your data and that backups are not compromised. This is highlighted in the Report, which warns that backup files stored in general public cloud storage systems may be encrypted with ransomware during replication.

2.Protect your data

Network segmentation and dynamic network configuration are critical elements of protecting your data against ransomware.

By using a software defined network it’s possible to create a temporary network segment that allows only the devices being backed up to connect to the backup location, isolating backup data from the source of potential infection.  These devices can include any network-connected device. This connection only exists for as long as the backup takes and this minimises the risk of ransomware infecting the backup location.


Recovery testing is vital to every properly constituted backup and recovery strategy. However, it is the most often neglected part of the plan. With ransomware on the table, recovery strategies need significant change.

A comprehensive backup should encompass policies to manage, protect and recover data across all applications and infrastructures.  However, the bare minimum would include scanning backups for signs of infection.

4. Automate

Automation is a key component of any effective backup and recovery strategy and with ransomware protection this is no different.  Automating system buildout tasks such as configuring security groups, networks and firewalls eliminates opportunities for human error that can increase risks. Extending backup strategies to cover the risks posed by ransomware can add complexity as more devices are added. Embracing automation is vital in ensuring that greater complexity does not increase the risk posed the organisation. An example is automating isolation of an attack when it occurs.

The bottom line

The only way to effectively safeguard against ransomware attacks is to implement a strategy (that’s executable and auditable) and to have regular testing in place.

All too often companies simply don’t have the resources to even recognise that an attack is imminent, let alone be able to counter it. It’s here that the trusted partner comes to the fore, in security, networking, backup, and recovery fields.

The white paper advises that with the trend towards consolidating security services rather than having multiple point solutions it is advisable to seek help from consultants from a reputable security service provider to help plan this constructively.

Enlist the help of a third party, such as Dimension Data, that can provide consultancy, solutions and services in security, networking and the backup and recovery – you’ll need assistance in all those areas to prevent attacks and limit the damage once you’re targeted.

Previous Article: IT Trends 2018: Programmable infrastructure everywhere Next Article: Data innovation lets fans customise their Tour de France adventure

You may be interested in


What I learned from hacking the Winter Olympics

I used to think that technology was the answer to all security questions, but my experience post 9/11 taught me that governance should always be the starting point for security discussions.

Read blog

The two-way conversation you need to have with your CEO on cybersecurity

With cyberattacks featuring regularly in mainstream news, it’s good to see that Boards and CEOs are becoming more cybersecurity conscious.

Read blog

Balancing risk and innovation

There’s no question that digital is the way forward. It offers tremendous benefits to your business: faster speed to market, more business intelligence and improved customer relationships.

Read blog

Securing the multi-cloud

As economic and operational benefits of the cloud became clearer, business units aggressively drove cloud services adoption across the business.

Read blog