How can you protect yourself against this kind of attack? There are two areas you can focus on: having good cybersecurity practices and having a backup/restoral plan. Many cyber-attacks are successful due to poor cybersecurity practices; a data hostage situation is less likely to happen if you have good defense to prevent it in the first place.
A perfect defense doesn’t exist, however. So ensuring your data is backed up can help you recover from a total loss of data.
When building a backup strategy, you need to determine what your most important data is, what data you will need to maintain functionality and how much storage it will take. Remember, the more data you back up, the more time, space, and money it will take to back up everything.
Find out how old your data can get before it becomes obsolete or irrelevant to learn how often you should back up your data; and to determine if a manual or automatic method will suit your needs. Keep the backup separate from your system, a backup is useless if it also gets encrypted in an attack.
Test your plan. Like an emergency response plan, it should be practiced occasionally to make sure that it works. It isn’t a very good feeling to have a plan in place that fails as soon as the emergency happens. Practicing data recovery can also give you an idea of how much downtime you will experience and suggestions for how to improve the plan.
Annually, the 88th Air Base Wing Cybersecurity Office (WCO) partners with the Air Force Institute of Technology, the National Air and Space Intelligence Center and others to host National Cybersecurity Awareness Month events for Wright-Patterson Air Force Base. If you are interested in a wide array of cybersecurity topics, sign up for one of the classes offered during October at the NCSAM class registration site at https://cs2.eis.af.mil/sites/er/0204/SitePages/Home.aspx.
If you have questions, contact the 88th Air Base Wing Cybersecurity Office at 88ABW.cybersecurity@us.af.mil or visit the WCO site at https://cs2.eis.af.mil/sites/22629/default.aspx.
About the Author