{"id":14687,"date":"2019-12-23T03:42:03","date_gmt":"2019-12-23T03:42:03","guid":{"rendered":"https:\/\/www.sandbox.backupassist.com\/blog\/?p=14687"},"modified":"2022-04-13T01:08:22","modified_gmt":"2022-04-13T01:08:22","slug":"how-to-be-cyber-resilient-and-protect-from-ransomware","status":"publish","type":"post","link":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware","title":{"rendered":"How to be cyber-resilient and protect your business from ransomware, from 65 cents per day"},"content":{"rendered":"\n<p>Many of our small business and government clients are in a tricky space. They need to be cyber-resilient, but they also run on a very limited budget. (FYI, I explain <a rel=\"noreferrer noopener\" aria-label=\"what cyber-resilience is in this article (opens in a new tab)\" href=\"\/blog\/what-is-cyber-resilience-for-sme\" target=\"_blank\">what cyber-resilience is in this article<\/a>.)<\/p>\n\n\n\n<p><strong>If budget is your #1 priority, how can you still be\ncyber-resilient?<\/strong> That\u2019s the focus of this article.<\/p>\n\n\n\n<p>As the owner of a small business myself, I know that most budget planning is on staff, sales and marketing and operational efficiency \u2013 not on things like electricity. And the reality for most businesses is that cyber-resilience is looked at as a <strong>sunk cost<\/strong>, as boring as electricity, yet 100% critical for existence.<\/p>\n\n\n\n<p>So <strong>given a limited budget,<\/strong> how can we achieve a <strong>high\nlevel of protection that effectively mitigates all common cyber risks<\/strong>?<\/p>\n\n\n\n<p>In this article, I\u2019ll handle these two user scenarios:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Scenario 1: <strong>essential resilience<\/strong> for a small business&#8217; file server.<\/td><td>Scenario 2: <strong>enhanced resilience<\/strong> for a small business&#8217; Windows server with Exchange and Hyper-V.<\/td><\/tr><tr><td>\u2022    You run a single on-premise Windows machine, which acts as a file server and Active Directory controller.<br> \u2022    You have up to 500GB of data + system.<\/td><td>\u2022    You run a single on-premise Windows server, with Hyper-V and Exchange installed.<br> \u2022    You have up to 500GB of total data + system.<br> \u2022    You have an unused machine that can act as a \u201cprivate cloud\u201d to host backup data offsite.<\/td><\/tr><tr><td>Total daily cost: 65 cents per day<\/td><td>Total daily cost: 1 dollar per day (literally!)<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Let\u2019s break this down into 4 parts:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Recap what we require to be cyber-resilient.<\/li><li>Essential resilience \u2013 setup and costings<\/li><li>Enhanced resilience \u2013 the setup and costings<\/li><li>Variations and additional options \u2013 if you have special constraints or requirements.<\/li><\/ol>\n\n\n\n<p>And yes, you can even implement either of these two\nscenarios directly and achieve excellent protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Part 1 &#8211; Quick recap: what does it mean to be cyber-resilient?<\/h2>\n\n\n\n<p>As discussed in my other blog article, you\u2019ll need a mixture\nof backups that are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Onsite \u2013 for fast recoveries<\/li><li>Offsite \u2013 to mitigate against destruction of your premises (natural disaster), theft and ransomware<\/li><li>Offline \u2013 to mitigate against hacking attacks and ransomware<\/li><\/ul>\n\n\n\n<p>We\u2019ll also assume that someone in your business is happy to swap out backup disks each day. (In Part 4, we\u2019ll discuss alternative setups that can avoid this.) Although this sounds antiquated, it\u2019s still the most practical way to take backups offline and offsite.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Part 2 \u2013 essential cyber-resilience for our small business file server<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Decision 1: the backup software<\/h3>\n\n\n\n<p>Naturally, we choose BackupAssist, and include BackupCare\nsubscription in our purchase. BackupCare is important because it enables the\nCryptoSafeGuard feature in the software \u2013 and this will shield the backup\ndevice from ransomware, while also enabling the detector which will notify the\nadministrator if possible ransomware-corrupted files are on the file system.<\/p>\n\n\n\n<p>We also take advantage of BackupAssist&#8217;s 5-year pricing guarantee. To get the lowest price possible, we subscribe BackupCare in two year blocks, renewing twice before the 5-year guarantee is up. This locks in the price of BackupCare for 6 years.<\/p>\n\n\n\n<p>Although we only have to pay for the BackupCare subscription 24 and 48 months in the future, I include them in the costing tables.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Decision 2: the type of backups<\/h3>\n\n\n\n<p>We choose \u201cSystem Protection\u201d backups, which enable full\nsystem recovery via drive imaging. It also allows for granular restore of files.<\/p>\n\n\n\n<p>This is a great choice for <strong>essential cyber-resilience<\/strong>. If you only do one backup, this is what I\u2019d recommend.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Decision 3: the backup destination<\/h3>\n\n\n\n<p>Because we\u2019re on a budget, we\u2019ll back up to USB Hard Drives (for instance, as opposed to RDX disks). Given the importance of the data, we won\u2019t use just any USB external drive. We\u2019ll pay a little extra to get the LaCie Rugged Mini, which is a far more durable disk that comes with a 2 year warranty. We think it\u2019s worth paying the extra 50% premium for this drive, because it is \u201cruggedized\u201d to withstand drops, dust, and water.<\/p>\n\n\n\n<p>We will choose an 8-drive rotation scheme. That will give us\n4 daily backup disks for Tuesday &#8211; Friday, plus 4 weekly backup disks for each\nMonday. (Or if you prefer monthly \/ yearly backups, you can also customize the\nscheme to your needs.)<\/p>\n\n\n\n<p>The LaCie drives are currently available on Amazon for $73.99 each. 1TB is sufficient for our needs, but upgrading to 2TB is only $5 extra per disk.<\/p>\n\n\n\n<figure class=\"wp-block-gallery columns-1 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"705\" src=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/Lacie-Rugged-Mini-1TB-1024x705.png\" alt=\"\" data-id=\"14764\" data-full-url=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/Lacie-Rugged-Mini-1TB.png\" data-link=\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\/lacie-rugged-mini-1tb#main\" class=\"wp-image-14764\" srcset=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/Lacie-Rugged-Mini-1TB-1024x705.png 1024w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/Lacie-Rugged-Mini-1TB-300x207.png 300w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/Lacie-Rugged-Mini-1TB-768x529.png 768w, https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/Lacie-Rugged-Mini-1TB.png 1374w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Costings<\/h3>\n\n\n\n<p>We therefore end up with this outlay (prices given in USD):<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><caption>Table 1: essential cyber-resilience including backup software and hardware<\/caption><thead><tr><th><strong>Software<\/strong><\/th><th>Cost<\/th><\/tr><\/thead><tbody><tr><td>BackupAssist Classic, with 24 months of BackupCare (for years 1 &amp; 2)<\/td><td>$449.00<\/td><\/tr><tr><td>Renewal 24 months less 35% disc (for years 3 &amp; 4)<\/td><td>$183.40 <\/td><\/tr><tr><td>Renewal 24 months less 35% disc (for years 5 &amp; 6)<\/td><td>$183.40 <\/td><\/tr><tr><td>Total cost:<\/td><td>$815.80 <\/td><\/tr><tr><td><\/td><td><\/td><\/tr><tr><td><strong>Hardware<\/strong><\/td><td><\/td><\/tr><tr><td>LaCie Rugged Mini 1TB &#8211; Drop Shock Dust Rain<\/td><td>$73.99 each<\/td><\/tr><tr><td>Total cost for 8 drives:<\/td><td>$591.92 <\/td><\/tr><tr><td><\/td><td><\/td><\/tr><tr><td>Total cost &#8211; over 6 years:<\/td><td>$1,407.72 <\/td><\/tr><tr><td><strong>Average cost per day<\/strong><\/td><td><strong>$ 0.65<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Summary of essential cyber-resilience<\/h3>\n\n\n\n<p>This option provides a very cost-effective level of essential cyber-resilience. You\u2019ll be protected against these cases:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><caption>Table 2: essential cyber-resilience recovery performance<\/caption><tbody><tr><td>Event   <\/td><td>Corrective Action   <\/td><td>Max window of data loss   <\/td><td>Max time to recover *   <\/td><\/tr><tr><td>User deletion   <\/td><td>Restore from last backup   <\/td><td>1 day   <\/td><td>A few minutes   <\/td><\/tr><tr><td>Hardware failure   <\/td><td>Restore from last backup   <\/td><td>1 day   <\/td><td>~ 2 hours   <\/td><\/tr><tr><td>Theft   <\/td><td>Restore from last offsite backup   <\/td><td>2 days   <\/td><td>~ 2 hours   <\/td><\/tr><tr><td>Physical premises destruction   <\/td><td>Restore from last offsite backup   <\/td><td>2 days   <\/td><td>~ 2 hours   <\/td><\/tr><tr><td>Ransomware**   <\/td><td>Restore from last backup   <\/td><td>1 days   <\/td><td>~ 2 hours   <\/td><\/tr><tr><td>Hacking (worst case)   <\/td><td>Restore from last offline backup   <\/td><td>2 days   <\/td><td>~ 2 hours   <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p style=\"font-size: 0.8em;\">The maximum times quoted are worst-case scenarios based on our experience.<\/p>\n\n\n\n<p style=\"font-size: 0.8em;\">* We assume the worst case\nBare Metal Disaster Recovery situation, pulling 500GB of backup data from USB\ndisk for a full server rebuild.<\/p>\n\n\n\n<p style=\"font-size: 0.8em;\">** We assume that CryptoSafeGuard\nsuccessfully shielded the backups from corruption, so any backup disk currently\nconnected will not be corrupted.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Part 3 \u2013 implementing enhanced cyber-resilience<\/h2>\n\n\n\n<p>In this scenario, we\u2019re \u201cupgrading\u201d the backup system to\ncater for some extra requirements.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>The system being backed up now includes Hyper-V\nand Exchange. The server is now configured as a Hyper-V host, while a guest\nruns as the Exchange Server and another guest runs as the file server.<\/li><li>We want to deliver better cyber-resilience, and\ninclude automated offsite backups to the cloud.<\/li><li>We also assume that recordkeeping is important,\nand the business wants to retain data for 6 years.<\/li><\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">Decision 1: the backup software<\/h3>\n\n\n\n<p>Again we choose BackupAssist Classic, and also purchase three add-ons:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Exchange Granular Add-on \u2013 to enable easy and\nfast restore of individual mailbox items<\/li><li>Hyper-V Advanced Add-on \u2013 for rapid VM recovery\nand Hyper-V Granular file restore <\/li><li>Cloud Offsite Add-on \u2013 for cloud-based offsite\nfile backups.<\/li><\/ul>\n\n\n\n<p>This will increase the price of the backup software as reflected in Table 3.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Decision 2: the type of backups<\/h3>\n\n\n\n<p><strong>Essential protection<\/strong><\/p>\n\n\n\n<p>We will retain our \u201cSystem Protection\u201d backups (which use\ndrive imaging) as our baseline protection. From this type of backup, you can:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Recover the entire system<\/li><li>Recover individual Hyper-V guests<\/li><li>Restore Exchange mailbox items<\/li><li>Restore files \u2013 even if they are in guest\nmachines<\/li><\/ul>\n\n\n\n<p><strong>Enhanced protection \u2013 automatic offsite backups<\/strong><\/p>\n\n\n\n<p>In addition to drive imaging, we also do file based backups. Using the Cloud Offsite features, we set up a 2<sup>nd<\/sup> job in BackupAssist Classic to back up files from the Hyper-V guest and also from key workstations. We do this by using network shares \u2013 simply add a read-only share on the Hyper-V guest, and configure BackupAssist Classic to back up those shares.<\/p>\n\n\n\n<p>We also choose to perform the backups in the middle of the work day, and at the end. By doing two backups per day, this reduces the window of data loss down to half a day &#8211; or 4 hours.<\/p>\n\n\n\n<p><strong>Data retention \u2013 File Archiving backup<\/strong><\/p>\n\n\n\n<p>Finally, we add a 3<sup>rd<\/sup> backup job for file\narchiving. Given that some data needed to be retained for up to 6 years, we set\nup a File Archiving job for this. This job generates a ZIP file. However, this\njob does not need to be run each night \u2013 instead it can be run manually\nwhenever a long-term record needs to be created.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Decision 3: the backup destination<\/h3>\n\n\n\n<p><strong>Essential protection \u2013 to USB hard drives<\/strong><\/p>\n\n\n\n<p>Once again, we choose USB hard drives for essential\nprotection. We have reserved 8 USB hard drives for this \u2013 same as in Scenario\n1.<\/p>\n\n\n\n<p><strong>Enhanced protection \u2013 to private cloud<\/strong><\/p>\n\n\n\n<p>In this example, the business has existing infrastructure to\nsupport an automated offsite backup of files. This can be a very cost effective\nway to achieve \u201ccloud\u201d backups without having to pay for ongoing hosting fees.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>Existing unused machine is reprovisioned as a WebDAV server<\/li><li>It is placed in a remote office<\/li><li>VPN or Firewall rules are applied to enable secure access to this machine from the main office.<\/li><\/ol>\n\n\n\n<p><strong>Data retention \u2013 to USB hard drives<\/strong><\/p>\n\n\n\n<p>We have reserved an additional 2 USB hard drives that can be\nused to store ZIP file backups. These hard drives should be stored offsite in a\nsafe location for long term archiving.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Costings<\/h3>\n\n\n\n<p>We therefore end up with this outlay (prices given in USD):<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><caption>Table 3: enhanced cyber-resilience including backup software and hardware<\/caption><thead><tr><th><strong>Software<\/strong><\/th><th>Cost<\/th><\/tr><\/thead><tbody><tr><td>BackupAssist   Classic, with 24 months of BackupCare (for years 1 &amp; 2)   <\/td><td>$ 449.00<\/td><\/tr><tr><td>Renewal   24 months less 35% discount (for years 3 &amp; 4)   <\/td><td>$ 183.40<\/td><\/tr><tr><td>Renewal   24 months less 35% discount (for years 5 &amp; 6)<\/td><td>$ 183.40<\/td><\/tr><tr><td>Exchange Granular Add-on   <\/td><td>$&nbsp;199.00<\/td><\/tr><tr><td>Hyper-V Advanced Add-on   <\/td><td>$ 249.00<\/td><\/tr><tr><td>Cloud Offsite Add-on   <\/td><td>$&nbsp;179.00<\/td><\/tr><tr><td><strong>Total   cost:<\/strong>   <\/td><td><strong>$&nbsp;1,442.80<\/strong><\/td><\/tr><tr><td><\/td><td><\/td><\/tr><tr><td><strong>Hardware<\/strong>   <\/td><td><\/td><\/tr><tr><td>LaCie   Rugged Mini 1TB &#8211; Drop Shock Dust Rain   <\/td><td>$&nbsp;73.99 each<\/td><\/tr><tr><td><strong>Total   cost for 10 drives:<\/strong>   <\/td><td><strong>$&nbsp;739.00<\/strong><\/td><\/tr><tr><td><\/td><td><\/td><\/tr><tr><td>Total   cost &#8211; over 6 years:<\/td><td>$&nbsp;2,182.70<\/td><\/tr><tr><td><strong>Average cost per day<\/strong><\/td><td><strong>$&nbsp;1.00<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Summary of enhanced cyber-resilience<\/h3>\n\n\n\n<p>This option provides a very cost-effective level of enhanced\ncyber-resilience. The maximum window of data loss is reduced, and you have\nadditional restore options. <\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"\"><caption>Table 4: enhanced cyber-resilience recovery performance<\/caption><tbody><tr><td>Event   <\/td><td>\n  Action\n  <\/td><td>\n  Max window of data loss\n  <\/td><td>\n  Max time to recover *\n  <\/td><\/tr><tr><td>User deletion   <\/td><td>\n  Restore from last backup.\n  <\/td><td>\n  ~4 hours\n  <\/td><td>\n  A few minutes\n  <\/td><\/tr><tr><td>\n  Hardware failure\n  <\/td><td>\n  Run Hyper-V Rapid VM Recovery from last backup. Update\n  files from last cloud backup.\n  <\/td><td>\n  ~4 hours\n  <\/td><td>\n  ~ 5 minutes\n  <\/td><\/tr><tr><td>\n  Theft\n  <\/td><td>\n  Run Hyper-V Rapid VM Recovery from last offsite backup. Update\n  files from last cloud backup.\n  <\/td><td>\n  ~4 hours\n  <\/td><td>\n  ~ 5 minutes + cloud download time for 24 hours of changes\n  <\/td><\/tr><tr><td>\n  Physical premises destruction\n  <\/td><td>\n  Run Hyper-V Rapid VM Recovery from last offsite backup. Update\n  files from last cloud backup.\n  <\/td><td>\n  ~4 hours\n  <\/td><td>\n  ~ 5 minutes + cloud download time for 24 hours of changes\n  <\/td><\/tr><tr><td>\n  Ransomware**\n  <\/td><td>\n  Run Hyper-V Rapid VM Recovery from last backup. Update\n  files from last cloud backup.\n  <\/td><td>\n  ~4 hours\n  <\/td><td>\n  ~ 5 minutes + cloud download time for 24 hours of changes\n  <\/td><\/tr><tr><td>\n  Hacking (worst case)\n  <\/td><td>\n  Run Hyper-V Rapid VM Recovery from last offline backup. Update\n  files from last cloud backup.\n  <\/td><td>\n  ~4 hours\n  <\/td><td>\n  ~ 5 minutes + cloud download time for 24 hours of changes\n  <\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p style=\"font-size: 0.8em;\">In the example above, we use Hyper-V Rapid VM recovery to get systems running almost instantly. In the worst case, we might have to use a backup from 2 days ago (the last offsite \/ offline USB disk backup), and then update the files to the most recent backup from the cloud backup. Only newer files not already on the system will be downloaded, so the download time will be minimal.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Part 4 \u2013 varying the setup while retaining enhanced cyber-resilience<\/h2>\n\n\n\n<p>If your business operates an a different way to the examples, there are variations you can make to the setup of BackupAssist Classic, to better suit your specific needs. <\/p>\n\n\n\n<p>For example, here are some constraints and alternative\nsolutions.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>If you cannot swap hard drives daily:<\/strong>\nthen we would still recommend that you take periodic offsite drive images (e.g.\nweekly, or upon an important configuration change) but you could also add in\nbackups to a NAS or permanently connected HDD. However, any online backup is\npotentially vulnerable to hacking, so you should also perform cloud offsite\nbackups.<\/li><li><strong>If you need large amounts of version history<\/strong>:\nthen we recommend setting up a File Protection job to back up selected directories\nto a NAS or permanently connected HDD.<\/li><li><strong>If you run a SQL server:<\/strong> we recommend\nusing our SQL Continuous Add-on to take near-continuous backups, and then push\nthose backups offsite using the Cloud Offsite Add-on, or back them up as part of\nyour drive image backups.<\/li><li><strong>If you use Office 365:<\/strong> then you can use\nBackupAssist 365 to download your cloud data and get local backups of mailboxes,\nSharePoint documents and OneDrive for Business. These data files can be\nincluded in your main on-premise server backups, giving you extra protection\nand peace of mind.<\/li><\/ol>\n\n\n\n<p>Where possible, we do recommend that your backup strategy has a mixture of onsite, offsite and offline backups. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusions<\/h2>\n\n\n\n<p>We\u2019ve shown here that cyber-resilience does not have to be\nexpensive. Although the emphasis has been achieving protection at <strong>a low cost<\/strong>,\nwe have not had to sacrifice the quality of the solution \u2013 and indeed we\u2019ve chosen\nsome premium options when it comes to the backup USB disks.<\/p>\n\n\n\n<p>Yes, it is possible to do it cheaper \u2013 but we don\u2019t recommend\nit. And of course it\u2019s possible to spend megabucks, but no one has an unlimited\nbudget.<\/p>\n\n\n\n<p><strong>With BackupAssist, you can get the right backup that meets your needs and and budget.<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background\" href=\"https:\/\/www.sandbox.backupassist.com\/classic\/downloads\" style=\"background-color:#f78f1e\" target=\"_blank\" rel=\"noreferrer noopener\">Download your free 30-day trial of BackupAssist Classic today<\/a><\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Yes, absolutely it is possible to be cyber-resilient, to mitigate all common cyber risks, and to do it for less than a dollar per day. In this blog, we explain how to get the right backup within a budget.<\/p>\n","protected":false},"author":2,"featured_media":14705,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[757,95],"tags":[274,657,761],"class_list":["post-14687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-resilience","category-guides","tag-backup-strategy","tag-budget","tag-resilience"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to be cyber-resilient and protect from ransomware for just 64c a day<\/title>\n<meta name=\"description\" content=\"Yes, absolutely it is possible to be cyber-resilient, to mitigate all common cyber risks including ransomware, and to do it for less than a dollar per day.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to be cyber-resilient and protect from ransomware for just 64c a day\" \/>\n<meta property=\"og:description\" content=\"Yes, absolutely it is possible to be cyber-resilient, to mitigate all common cyber risks including ransomware, and to do it for less than a dollar per day.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-23T03:42:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T01:08:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2011\" \/>\n\t<meta property=\"og:image:height\" content=\"1039\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\"},\"headline\":\"How to be cyber-resilient and protect your business from ransomware, from 65 cents per day\",\"datePublished\":\"2019-12-23T03:42:03+00:00\",\"dateModified\":\"2022-04-13T01:08:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\"},\"wordCount\":2124,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg\",\"keywords\":[\"backup strategy\",\"Budget\",\"resilience\"],\"articleSection\":[\"Cyber Resilience\",\"Guides\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\",\"name\":\"How to be cyber-resilient and protect from ransomware for just 64c a day\",\"isPartOf\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg\",\"datePublished\":\"2019-12-23T03:42:03+00:00\",\"dateModified\":\"2022-04-13T01:08:22+00:00\",\"description\":\"Yes, absolutely it is possible to be cyber-resilient, to mitigate all common cyber risks including ransomware, and to do it for less than a dollar per day.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg\",\"width\":2011,\"height\":1039},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sandbox.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to be cyber-resilient and protect your business from ransomware, from 65 cents per day\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"description\":\"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)\",\"url\":\"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to be cyber-resilient and protect from ransomware for just 64c a day","description":"Yes, absolutely it is possible to be cyber-resilient, to mitigate all common cyber risks including ransomware, and to do it for less than a dollar per day.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware","og_locale":"en_US","og_type":"article","og_title":"How to be cyber-resilient and protect from ransomware for just 64c a day","og_description":"Yes, absolutely it is possible to be cyber-resilient, to mitigate all common cyber risks including ransomware, and to do it for less than a dollar per day.","og_url":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware","og_site_name":"Cyber Resilience Blog","article_published_time":"2019-12-23T03:42:03+00:00","article_modified_time":"2022-04-13T01:08:22+00:00","og_image":[{"width":2011,"height":1039,"url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#article","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware"},"author":{"name":"Linus Chang","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3"},"headline":"How to be cyber-resilient and protect your business from ransomware, from 65 cents per day","datePublished":"2019-12-23T03:42:03+00:00","dateModified":"2022-04-13T01:08:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware"},"wordCount":2124,"commentCount":0,"publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg","keywords":["backup strategy","Budget","resilience"],"articleSection":["Cyber Resilience","Guides"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware","url":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware","name":"How to be cyber-resilient and protect from ransomware for just 64c a day","isPartOf":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage"},"thumbnailUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg","datePublished":"2019-12-23T03:42:03+00:00","dateModified":"2022-04-13T01:08:22+00:00","description":"Yes, absolutely it is possible to be cyber-resilient, to mitigate all common cyber risks including ransomware, and to do it for less than a dollar per day.","breadcrumb":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#primaryimage","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/12\/65-cents.jpg","width":2011,"height":1039},{"@type":"BreadcrumbList","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/how-to-be-cyber-resilient-and-protect-from-ransomware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sandbox.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"How to be cyber-resilient and protect your business from ransomware, from 65 cents per day"}]},{"@type":"WebSite","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#website","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sandbox.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.sandbox.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.sandbox.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/523a9a01769da254de228dbd4b1328d3","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sandbox.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58a69ed0d0b9928d91dec6132dccfb646cc4230839af779f185531c722b0d017?s=96&d=mm&r=g","caption":"Linus Chang"},"description":"*Founder &amp; Creator, BackupAssist* Linus Chang has been writing software since he was eight years old. He founded BackupAssist in 2002 \u2014 making him one of the longest-standing voices in Windows backup and data protection \u2014 and has spent the decades since talking to IT administrators around the world about what actually goes wrong, and why. His interest in data loss isn't abstract. Early in his career, he was working at the Monash University help desk when a student came in with a floppy disk that wouldn't read. They tried everything. None of their drives could read it either. The disk held her entire PhD dissertation \u2014 years of work \u2014 and it was the only copy. She broke down in tears. There was nothing he could do. Five years later, he wrote the first version of BackupAssist. Linus holds a Bachelor of Science in Computer Science and has held Microsoft Certified Solution Developer and Sun Certified Java Programmer credentials. More recently, he has completed digital forensics and cyber-security courses through the Black Hat Conference. He has spoken on information security and cryptography at Infosecurity Europe, addressed politicians and policymakers at Australian Parliament House, presented to SMB IT administrators at the IT Pro Experts Conference, and served as a guest lecturer to Cyber Security master's students at the University of Melbourne. On this blog, Linus writes about backup strategy and the technical side of cyber-resilience \u2014 drawing on 24 years of product development and direct conversation with the IT professionals BackupAssist is built for. [Connect with Linus on LinkedIn](https:\/\/www.linkedin.com\/in\/linuschang\/)","url":"https:\/\/www.sandbox.backupassist.com\/blog\/author\/linus-chang"}]}},"_links":{"self":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/14687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=14687"}],"version-history":[{"count":28,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/14687\/revisions"}],"predecessor-version":[{"id":18700,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/14687\/revisions\/18700"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/14705"}],"wp:attachment":[{"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=14687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=14687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sandbox.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=14687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}