Suffered ransomware attempts within the last twelve months.
Indirect cost from downtime & reputational harm average $713K.
The Blockchain Archive Server™ (BAS) is a secure backup solution that provides the ultimate layer of protection in the event of a ransomware attack. The BAS fragments and distributes redundant, immutable, and secure backups of your data, encrypted through blockchain, that can only be unlocked with physical key-fobs. It works seamlessly in parallel with existing backup procedures and virtually any hardware and software combination, without the need to replace or eliminate any part of your current data security or backup systems that are being utilized.
The Blockchain Archive Server™ ensures business continuity and data integrity if you are the victim of a ransomware attack. Redundant backups and the blockchain work together to protect not only the physical security of the data but also the integrity of the information held within. The BAS lives on premise as an 8TB server that acts as a staging point to prepare data for blockchain encryption. The system utilizes two blockchain networks in its operation: a distributed file system blockchain (DFS) which stores fragments of encrypted data across thousands of nodes and a smart contract blockchain which stores fragments of the private key that authorize re-assembly as well as the hash addresses to the data fragments.
Data is copied to the BAS, encrypted, fragmented & distributed to a Blockchain network.
The private key & hashes are distributed to a different Blockchain network.
A physical keyfob is used to reassemble the data upon request from the terminal.
Unlike other systems, both data and keys are encrypted. Your information is then fragmented into millions of unrecognizable bits, and distributed across thousands of nodes on two separate networks.
MSPs are high-value targets for ransomware because once inside attackers can often easily access other vulnerable targets hosted in adjacent environments. According to the FBI, cyber criminals frequently exploit vulnerabilities in tools used by MSPs, with 4 out of 5 MSPs targeted each year. In late 2019, hackers infiltrated MSPs in Texas and Wisconsin, rendering 22 cities & towns and 400 dental practices incapable of:
Since MSPs are often providing services for mission-critical applications, it is imperative that they have all the tools available to them to help their clients in the inevitable event of a cyber-attack. This is why MSPs in the US and Canada have begun to offer the BAS as an add-on to their existing backup products and strategies to ensure they can best serve their clients during incidents.
Retail companies are targeted by ransomware because attackers understand how crucial it is for these organizations to maintain operational continuity. In late 2019, a large lumber wholesaler was locked out of its computer systems at both the store and corporate
level, leading to an inability to:
Ransomware attacks are a clear and present danger for retail companies, grinding sales and support operations to a halt immediately, and often taking weeks, if not months, to remediate. The crux of the problem is losing access to inventory data– shipping & receiving, sales, support, and admin functions all stop due to the inability to scan items or access records.
For 3 years, the strain of ransomware known as SamSam crippled over 200 critical municipal and medical networks across North America and the UK, including the cities of Atlanta, Newark and a variety of medical centers, rendering these organizations unable to:
IT leaders in municipalities are constantly looking to improve the operational resilience of their networks, especially in light of modern, sophisticated threats that look to paralyze mission-critical network infrastructure. The BAS represents a peace-of-mind layer for these operators– in the event of a disruption, they are able to quickly recover operations so that they can determine the most appropriate course of action for remediation without being led by the nose by the attackers.
No company is safe from ransomware, even the myriad quiet organizations that constitute the industrial sector. New ransomware strains identified in early 2020 target industrial control systems and have the ability to kill critical software control processes before it revokes system access. In March 2019, a power and metals producer experienced an attack which disrupted their business process management system leading to:
Attackers know that the ability to cause maximum disruption leads to the highest chances of quick payment. The ability to disrupt OT assets makes ransomware particularly threatening to the industrial sector, especially because these companies hold vast amounts of sensitive data, both their clients’ and their own.
Medical institutions of every size have a pervasive and persistent target on their backs in today’s threat landscape. In fact, a joint statement by the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), and the Department of Health & Human Services (HHS) released in late October 2020 warned of “credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers,” and shared the notice “to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.” This announcement comes on the heels of the Universal Health Services attack in September 2020, one of the largest ransomware attacks on medical institutions in history, affecting a nationwide network of 400 hospitals and labs, leading to an inability to:
The devastation that could be wrought on healthcare businesses, especially as HIPAA fines for data breaches can run into the 100s of thousands of dollars, is leading many healthcare institutions to re-evaluate and augment their cybersecurity and backup protocols.
Educational institutions are prime targets for attackers due to the willingness of these organizations to pay to avoid the unacceptable downtime that results from ransomware disruption. In November 2019, a group of 28 schools in West Virginia suffered a ransomware attack which denied access to teachers and administrators to:
Ransomware attacks have led to schools starting weeks late and months of continued disruption as the entire administrative layer of the organization scrambles to repair and replace key data and reinstall operational software. The need to get back and up and running quickly makes the BAS a worthwhile investment as another layer of protection in the event of an attack.
For the money I spent, to have that peace of mind in protecting my team & their livelihoods as well as my guests, it was absolutely a no-brainer.
The ability to avoid business interruption & ensure a safe archive of sensitive client data was more than worth the investment in the BAS.
We’d already put a lot of cybersecurity tactics in place, but we had nothing like the BAS, now we feel a lot better in protecting our patients & our business.
© Copyright 2020 – Sollensys Corp.