CryptoLocker Recovery Tips

Oct 11, 2016

CryptoLocker Recovery Tips

BY Chris Brunau

Cybersecurity Ransomware

Like many of the leading ransomware strains today, CryptoLocker code is constantly being adapted to avoid detection by the leading solutions of defense available. In fact, 93 percent of IT service providers report ransomware infiltrating anti-virus and anti-malware software in the past 12 months and 77 percent report it infiltrating email and SPAM filters. The social engineering tactics cybercriminals employ to dupe their victims continue to be highly effective, likely due to the void in cybersecurity training within businesses.  

So, let’s say the worst has happened and you are staring CryptoLocker on the screen. To recover, you must be able to restore your data to a point-in-time that is before the attack occurred.

Here’s the bottom line. It is essential to deploy a modern backup and recovery solution, such as Datto, to protect all of your critical data, files and folders. Taking proper backups is the best way to ensure you’ll be able to recover files fully and quickly without paying ransom or worse, suffering from downtime

And, when I say “all of your data,” I mean it. Don’t neglect the vulnerable data that lives in cloud-based applications, such as Office 365 and Google Apps. Despite popular belief, ransomware often targets these SaaS solutions as well. So, if your business is in the cloud, it is essential to deploy a cloud-to-cloud backup solution such as Datto Backupify.

Finally, you need to be certain your systems are completely free of CryptoLocker before restoring any data.

Here are the basics to CryptoLocker recovery:

  • Take independent backups that store files on an alternate system;

  • Set up and stick to a regular backup schedule;

  • Choose a backup solution that takes backups periodically throughout the day to minimize data loss;

  • Choose a backup solution that offers fast restore times to minimize application downtime;

  • If you rely on cloud-based offerings such as Office 365 or Google Apps, invest in an industry-leading cloud-to-cloud backup solution; and

  • Use a ransomware removal tool to be sure your systems are clean before restoring data.

For more information about CryptoLocker, including how to protect your business data and how to remove CryptoLocker, download our new eBook: The Guide To CryptoLocker Protection And Removal.

Subscribe to the Blog