Customer Support

If I was hacked/cyber attacked, how could this help me recover? How long would it take to get access to my data?
As quickly as the network will allow. If you are the victim of a cyberattack or any other major event which requires your data or systems to be restored, Sollensys can have you back up and running with a secure archive in as little as an hour, depending on the size of your archive and your internet connection.
What kinds of devices and systems can I use with Sollensys?
Sollensys is designed to be a completely system agnostic bolt-on cybersecurity safety net for your private files, documents, photos, videos, and more. It works seamlessly with any operating system, cybersecurity suite, file type, or modern browser without interfering with what you already have in place.
Is my card information stored?
No. Your card information is only accessed by our payment processor. Sollensys does not have access to any credit card or payment information.
What if I want to change my plan?
You can always change your plan to add additional storage on a prorated basis. Simply access the settings menu once you have logged in to your account and choose your new storage amount.
If I miss a payment will my data be erased?
No. Your secure archives are inaccessible and invisible to anyone but you, including Sollensys. If your account becomes delinquent you will not be able to restore your files from your secure archive until delinquent payment has been reconciled.
If I accidentally overwrite or delete an important file in my secure archive, how can I get it back?
You cannot overwrite or delete files without contacting customer support directly.
What do I do if I forget my password?
Simply reset your password using the “Forgot your Password?” button on the login page. Having trouble? Contact us directly.
How often are updates? Is there downtime during updates?
There is no exact timeline on updates, with new features and optimizations deployed only after extensive testing. Any downtime for updates will be communicated to users both via email and their account page on the website. Major updates tend to happen in 6 month intervals with minor bug fixes occurring periodically. Downtime for these updates will be minimal, if noticeable at all.

The Blockchain Archive Server

What is the Blockchain Archive Server?
The sad truth of the matter is that as the threat landscape changes, the countermeasures and safeguards protecting against ransomware are obviously not working. One piece of your cybersecurity suite has been missing until now. To meet the challenges Sollensys has created the Blockchain Archive Server™ (BAS).

The BAS was designed to address the gap associated with archiving mission-critical data, protecting it from attack and facilitating the rapid restoration of guaranteed immutable data.

The BAS is the first Distributive Data Application that utilizes Sollensys’s patent pending double blockchain system to provide unparalleled archiving and data recovery following any cyber event, not just ransomware. The BAS is designed to protect your data, guarantee it is available, and guarantee it has not changed. The BAS is not data storage - it is a next-generation archive designed to provide unprecedented data protection and restoration.

How is it useful?
With Sollensys’ data archive system, you no longer need to be concerned with data recovery because your data will always be in a perfect and uncorrupted state. This allows for full focus on security, not recovery. We built one product, the Blockchain Archive Server™ to be infinitely scalable.

Sollensys’ revolutionary double blockchain technology provides a quickly recoverable, immutable and uncorrupted, unbreakable safety net. Your files, documents, photos, videos, and other sensitive data are uploaded, shredded into millions of fragments, secured and essentially do not exist in usable form for anyone without both the correct authorization and the correct key to decode the information. Even Sollensys cannot view or access your files in any way. This system is effective on or off-premise and quickly and easily integrates with existing cybersecurity and cloud-based solutions across all systems and file types, including video, which is a first for blockchain.

Isn’t my virus protection enough? What makes this different from any other backup product? Can it replace or work with my existing protection?
The Blockchain Archive Server™ is a bolt-on safety net which works with virtually any hardware and software combinations or cybersecurity infrastructure to provide a safety net for your data security and integrity.

Damages from cybercriminals reach far beyond simple ransom demands, although these can range from a few hundred to millions of dollars alone. Without a safety net to recover your systems and data you could be subject to other financial damages as well. Costs can add up quickly for regulations and compliance issues, loss of revenue due to customer exodus and disruption, loss of intellectual property, file distortion from the return of corrupted data, and from loss of productivity during the recovery and reconstruction process, assuming this is even possible. These issues can easily be enough to bankrupt a company if the ransom hasn’t already. Not to mention the damage to your reputation.

What is the difference between what Sollensys offers and virus protection software?
Sollensys is not a storage solution, it is an immutable, unchangeable, and indestructible archive of your data which is built upon a unique and revolutionary new double blockchain technology. It is your safety net, allowing you to fully and rapidly recover from a cyber attack.

Picture a security system for a building. It may not necessarily be effective in blocking a criminal from entering or prevent them from stealing, and the system has no power to bring back the things which were stolen. With Sollensys, even if the cybercriminals make it through your current cybersecurity suite, they can’t see or touch your data at all.

What types of data and how much can I store?
Sollensys is one of the most secure methods of storing your private files, videos, documents, images, and any other types of files on the planet. A secure virtual archive is created for you in 100GB portions.
How often will my data be backed up?
That’s up to you! Back files up to your secure virtual archive every five minutes or every five months.
What if there was a physical disaster that affected my hardware?
Whether a physical or virtual Blockchain Archive Server, restoring your data is never a concern. With a physical appliance your business can be re-keyed and a new terminal re-configured for you, and your information is always protected, with copies of your shredded data distributed across thousands of servers on the blockchain.
How does the BAS know not to backup ransomware and what data is uncorrupted?
Your BAS will back up everything. If you do notice an issue, contact Sollensys Customer Support for help picking a previous clean backup to restore from.
Can the BAS be customized for special applications?
Sollensys is able to do customizations for customers. Contact us today to discuss your requirements and our options.
Would I be able to test a physical BAS at my location?
Sollensys does offer a trial for the BAS. Contact us to find out if you’re eligible.
How easy is installation, use, and maintenance of the Enterprise version of the BAS?
At Sollensys we understand that not everyone is a Tech guru, so we designed the Blockchain Archive Server to be simple and as seamless as possible for our customers. Installation and training can take as little as a day. From there, maintenance is minimal at best, and if there are ever any issues, simply contact us for assistance. Customer service is a top priority for us here at Sollensys.
What training and support is available to BAS customers?
At Sollensys we have 24/7 support available, a wealth of tutorial videos to quickly and easily help you get started, and offer training either on site or virtually.
How long will my data be stored?
The files, photos, videos, documents, and other data you store on your Blockchain Archive Server are yours and will be securely archived indefinitely.

General Blockchain & Ransomware

What is Blockchain and how does it work? Is it cryptocurrency?
The simplest explanation of a blockchain is that it is a series of time-stamped and immutable, secure and redundant, data “blocks.” These blocks are created containing your company’s sensitive or valuable data, documents, and files, encrypted, “shredded” into tiny pieces, and subsequently distributed among a cluster of servers and computers. These blocks, as they are created, are “tagged” to each other through cryptographic mathematically generated hash codes, which maintain a perfect, unchangeable record of the chain from the newest block all the way back to the very first one. Any changes, even so much as changing the case on a character, within a certain block would result in the changing of this hash code, effectively breaking the chain and proving the block in question to be invalid. Thus, blockchain is the most secure method of storing data currently available, innately protecting against malware, ransomware, and more traditional hacking attempts. While most of the time “blockchain” is spoken about in terms of BitCoin and other cryptocurrencies, there is a distinct difference between them. Blockchain is the foundational software on which these emerging technologies are built precisely because of its immutable, or unchangeable, decentralized and nearly unhackable nature.
What is ransomware and how does it work?
Ransomware is malware which encrypts files, blocking victims from accessing them until a ransom payment is made. The number of ransomware attacks have grown by more than 150% in the past year. Ransomware infections can come from things as simple as opening a safe-looking email attachment or downloading a seemingly innocuous document or file. Other, more sophisticated ransomware may use software flaws, operating system exploits, remote desktop logins, cracked passwords, or any number of other weak points in your security to gain access to your computer, network, and cloud. A more recent infection method, malvertising, or the use of online advertisements to distribute ransomware to unsuspecting victims, even from legitimate, trusted websites, using hidden webpage elements to redirect users to a malicious landing page designed to infect the user.
Who does ransomware target?
When ransomware first appeared on the internet scene in the late 1980s, the targets were originally regular folks, encrypting their files and personal data and forcing them to pay a modest sum for its safe return. Today, however, with increased sophistication in malware and ransomware applications, cybercriminals have realized the potential to use their ransomware on a larger scale, targeting businesses large and small. Businesses, organizations, and even government agencies have been targeted, with attackers sometimes demanding millions of dollars to potentially decrypt your sensitive or critical files, documents, and data.
What is the impact of ransomware on different organizations?
Beyond the threat to individuals, cybercriminals are increasingly targeting businesses both large and small, sometimes demanding millions to restore access to your business’ files and network. In short, ransomware can be the downfall of an otherwise successful business, regardless of size. Being locked out of your system and important documents and data for even a few days can have a drastic effect on revenues, not to mention the effect on customer and client trust. A few days is bad enough, but ransomware can lock up your organization for weeks or months as damages are repaired and your network infrastructure is rebuilt. The losses go far beyond the cost of the ransom itself. Larger businesses, while being able to pay much larger ransoms, are not the only target. Smaller and medium-sized businesses are actually a much easier target, having less to invest in cybersecurity and secure networks. Even a smaller ransom of a few hundred dollars is enough to make an impact, potentially putting these companies which believed themselves too small to be targeted out of business. Essentially, ransomware can cripple or destroy an entire organization, regardless of size or industry. Ransomware has been so successful against businesses in general, that by 2017 over 35% of small and medium-sized businesses had been involved in a ransomware attack. Now, in 2020, that number has grown to 42% and is still on the rise. Even when the ransom has been paid, there is no guarantee that your data will be restored, as some cybercriminals neglect to even build a decryption function into their malware. Failure to pay within a certain time period only raises the amount demanded, and if the victim is unable to pay within the deadline their personal or sensitive files may be lost forever or leaked to the public and competitors. Retail companies are targeted by ransomware because attackers understand how crucial it is for these organizations to maintain operational continuity. These attacks are a clear and present danger for retail businesses; grinding sales and support operations to a halt immediately, and often taking weeks, if not months, to remediate.

The crux of the problem is losing access to inventory data and restricted access to records specifically and computer systems. Industrial sector attacks are often among the most expensive, both in terms of the ransom demanded as well as remediation efforts. In fact, in 2019, industrial companies paid 62% of the ransomware dollars, yet only represented 18% of the victims.

No company is safe from ransomware, even the myriad quiet organizations that constitute the industrial sector. In addition to the classic problems of loss of data access as well as data theft, new ransomware strains identified in early 2020 target industrial control systems and have the ability to kill critical software control processes before it revokes system access. In March 2019, a power and metals producer experienced an attack which disrupted their business process management system leading to: Multi-site shutdown, Impaired resource management, and manual tracking of large, distributed inventories.

Medical institutions of every size have a pervasive and persistent target on their backs in today’s threat landscape. In fact, a joint statement by the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), and the Department of Health & Human Services (HHS) released in late October 2020 warned of “credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers,” and shared the notice “to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.”

This announcement comes on the heels of the Universal Health Services attack in September 2020, one of the largest ransomware attacks on medical institutions in history, affecting a nationwide network of 400 hospitals and labs, leading to an inability to access computer systems and digital patient records, perform scheduled medical procedures, or run lab tests internally.