Acronis

Acronis sets the standard for cloud-based data protection with its innovative backup, disaster recovery and file sync/share solutions. Powered by the Acronis AnyData Engine and set apart by disk-imaging technology, Acronis solutions provide easy, complete and affordable data protection of all files, applications and operating systems across any environment – virtual, physical, cloud and mobile. Founded in 2003, Acronis protects the data of five million customers and 500,000 businesses in more than 145 countries. With 100+ patents secured for its groundbreaking technology, Acronis products have earned numerous product-of-the-year awards. In 2016 Acronis was named one of CRN Magazine’s 20 Coolest Cloud Storage Vendors of 2016. Acronis solutions are available worldwide through a global network of service providers, distributors and cloud resellers or online at www.acronis.com.

Share tech news, updates, or what's on your mind.

Sign up to Post

There seems to be a general consensus that if you've been hit with a Ransomware Virus, especially if by a newly discovered strain of ransomware, and do not have a reliable and unaffected backup to restore from, that all hope is lost.  

This is not necessarily the case!

Whilst it's true that Ransomware is one of the most difficult "destructive infections" to recover from, recovery should never be considered impossible.

Advising those seeking help that they should just accept defeat and wipe all chances of recovering their data is bad advice. This is a point that has been proven time and time again, particularly with past Ransomware strains that were once considered hopeless, yet have now had decryption recovery tools developed to restore data.

If you have been hit by a Ransomware Virus and don't have a backup - do not accept advice that you should just cut your losses, format your hard drive and admit defeat. That's just letting the criminals win.

The first thing you should do (after deactivating the virus) is make a Full Image Backup of your affected hard drive using an imaging backup tool like Acronis, Macrium Reflect or similar so as to have a copy of all files that were encrypted.  Safely store that backup away for future recovery attempts, or to restore from if a recovery attempt goes belly up.

Once backed up, Wipe and Start fresh if desired to get back to a working …
3
 
LVL 11

Author Comment

by:Andrew Leniart
Security companies do have excellent heuristics and definitions,  but they will never catch everything.

No argument.  But doesn't it then naturally follow that they can never "block" or "prevent" everything either?

Using that train of thought, even with all of the security software that you have protecting your machine(s), how can you be certain that you don't have a key logger recording your key strokes right now? Or a yet unknown time bomb trojan just waiting to jump up and deliver its payload? How could any system ever be trustable?

I'm honestly not trying to be argumentative here, it's just that the logic behind your conclusion is escaping me.

If you can't trust your security software to clean up an infection that has been researched and that it knows about, then how is it that you can trust the same software to prevent a yet unrealized one from occurring?

I'll agree we probably need to disagree.  

Life would be too boring if everyone agreed on everything anyway. :)

My thanks again for your input.
1
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
I guess what I meant was that no one security software is likely to catch everything.  That is why I have a multilayered approach on my machines.  But you are correct, I do not feel safe even with that.  I guess I am on the paranoid side, which begs the question, "Is one paranoid, if the fear is true?"  That is a paraphrase of the original question.

The biggest problem, IMHO, is that to secure one's computer (and still have a computer that actually works, instead of one filled with cement), one needs to put enough security software on there that it slows down even the best of computers.

I would like a product that doesn't hog resources and assures me that I will never get malware of any kind (like that is happening).
2
Complete VMware vSphere® ESX(i) & Hyper-V Backup
LVL 4
Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Acronis

Acronis sets the standard for cloud-based data protection with its innovative backup, disaster recovery and file sync/share solutions. Powered by the Acronis AnyData Engine and set apart by disk-imaging technology, Acronis solutions provide easy, complete and affordable data protection of all files, applications and operating systems across any environment – virtual, physical, cloud and mobile. Founded in 2003, Acronis protects the data of five million customers and 500,000 businesses in more than 145 countries. With 100+ patents secured for its groundbreaking technology, Acronis products have earned numerous product-of-the-year awards. In 2016 Acronis was named one of CRN Magazine’s 20 Coolest Cloud Storage Vendors of 2016. Acronis solutions are available worldwide through a global network of service providers, distributors and cloud resellers or online at www.acronis.com.

Vendor Experts

AcronisAcronis, Inc.
Doug HanchettAcronis, Inc.