A turnkey ransomware protection solution that can stand alone or seamlessly integrate into an existing data backup infrastructure. Quickly recover from any ransomware attack.
Suffered ransomware attempts within the last twelve months.
Indirect cost from downtime and reputational harm can average up to $713,000.
The Blockchain Archive Server™ (BAS) is a secure backup solution that provides the ultimate layer of protection in the event of a ransomware attack. The BAS fragments and distributes redundant, immutable, and secure backups of your data, encrypted through blockchain, that can only be unlocked with physical key fobs. It works seamlessly with existing backup procedures and virtually any hardware and software combination, without the need to replace or eliminate any part of your current data security or backup systems that are being utilized.
The Blockchain Archive Server™ ensures business continuity and data integrity if you are the victim of a ransomware attack. Redundant backups and the blockchain work together to protect both the physical security of your data and the integrity of the information held within. The BAS lives on premise as an 8TB server that acts as a staging point to prepare data for blockchain encryption. The system utilizes two blockchain networks in its operation: A distributed file system blockchain (DFS), which stores fragments of encrypted data across thousands of nodes, and a smart contract blockchain, which stores fragments of the private key which authorize re-assembly.
Data is copied to the BAS, encrypted, fragmented, and distributed to our secure blockchain network.
The private key and hashes are distributed to a separate, secure blockchain network.
A physical key fob is used to reassemble the data upon request from the terminal.
Unlike other systems, both data and keys are encrypted. Your information is then fragmented into millions of unrecognizable bits and distributed across thousands of nodes on two separate networks.
The BAS is a failsafe contingency for data backups in the event of a ransomware attack. The purpose of the BAS is to ensure that critical data infrastructure can be restored quickly to ensure business continuity and increase the options available during the remediation process.
Many organizations rely on collaborative file sharing cloud platforms such as Google Drive or SharePoint as a primary means of storing large amounts of company data. However, this convenience leaves vulnerabilities. These platforms are an attractive attack vector for cybercriminals. In fact, 59% of ransomware attacks involved data in the public cloud.
The BAS rectifies this risk by running invisibly in the background, backing up your organization’s data regularly to ensure it’s accessible. Organizations which are already utilizing robust cyber security suites and backup protocols will be pleased to know that the BAS works alongside any combination of technologies, further strengthening your company’s data integrity and disaster preparedness strategies without interfering with well-established processes or vendors.integrity and disaster preparedness strategies, without interfering with well-established processes and vendors.
Managed Service Providers (MSPs) are high-value targets for ransomware. Once inside your system attackers can often easily access other vulnerable targets hosted on company servers or in their cloud. According to the FBI, cyber criminals frequently exploit vulnerabilities in tools used by MSPs.
To put this threat in perspective, in late 2019 hackers managed to infiltrate MSPs in Texas and Wisconsin through these vulnerabilities, rendering 22 cities and towns and 400 dental practices incapable of providing public services and documentation, accepting online payments, or even responding to emails.
Since MSPs are often providing services for mission critical applications, it is imperative that they have all the tools available to them to help their clients in the inevitable event of a cyber attack. This is why MSPs in the US and Canada have begun to offer the BAS as an add-on to their existing backup products and security strategies to ensure they can best serve their clients during incidents.
Retail companies are targeted by ransomware because attackers understand how crucial it is for these organizations to maintain operational continuity. In late 2019, a large lumber wholesaler was locked out of its computer systems at both the store and corporate level, leading to an inability to process sales transactions, access historical purchase information, or even check product prices and inventory, leading to a loss of over $6 million.
Ransomware attacks are a clear and present danger for retail companies, immediately halting sales and support operations and often taking weeks, if not months, to remediate. The crux of the problem is losing access to inventory data. Shipping and receiving, sales, support, and admin functions all stop due to the inability to scan items or access records.
For three years, the strain of ransomware known as SamSam crippled over 200 critical municipal and medical networks across North America and the UK. The strain rendered these organizations unable to process service requests, access billing systems, or conduct medical appointments and treatments, costing over $30 million across 200 entities.
IT leaders in municipalities are constantly looking to improve the operational resilience of their networks, especially in light of modern, sophisticated threats that look to paralyze mission-critical network infrastructure. The BAS represents an additional peace of mind for these operators. In the event of a disruption, they are able to quickly recover operations so they can determine the most appropriate course of action for remediation.
No company is safe from ransomware, even the smaller organizations that constitute the majority of the industrial sector. New ransomware strains identified in early 2020 target industrial control systems and have the ability to kill critical software control processes before it revokes system access. In March 2019, a power and metals producer experienced an attack which disrupted their business process management system, leading to multi-site shutdowns, impaired resource management, manual tracking of large, distributed inventories, and a total cost of over $70 million.
Attackers know that the ability to cause maximum disruption leads to the highest chances of quick payment. The ability to disrupt OT assets makes ransomware particularly threatening to the industrial sector, especially because these companies hold vast amounts of sensitive data.
Medical institutions of every size have a pervasive and persistent target on their backs in today’s threat landscape. In fact, a joint statement by the FBI, the Cybersecurity & Infrastructure Security Agency (CISA), and the Department of Health & Human Services (HHS), released in October 2020, warned of “credible information of an increased and imminent cybercrime threat to U.S. hospitals and healthcare providers,” and shared the notice “to provide warning to healthcare providers to ensure that they take timely and reasonable precautions to protect their networks from these threats.” This announcement comes on the heels of the Universal Health Services attack in September 2020, one of the largest ransomware attacks on medical institutions in history. This attack hit a nationwide network of 400 hospitals and labs, halting their ability to access computer systems and digital patient records, perform scheduled medical procedures, or run lab tests internally.
The devastation that could be wrought on healthcare businesses, especially as HIPAA fines for data breaches can run into the hundreds of thousands of dollars, is leading many healthcare institutions to re-evaluate and augment their cyber security and backup protocols.
Educational institutions are prime targets for attackers due to their willingness to pay to avoid the unacceptable downtime that results from ransomware disruption. In November 2019, a group of 28 schools in West Virginia suffered a ransomware attack, which denied access to teachers and administrators to all files stored on the school’s networks. This attack locked them out of VOIP and email communication systems and disrupted their payroll and vendor invoice payments. Aside from significant costs, remediation efforts took over three months, costing them far more in lost revenue and damage to their reputation while they replace key data and reinstall operational software.
The need to resume operations quickly makes the BAS a worthwhile investment as another layer of protection in the event of an attack, saving your organization time and money.
The peace of mind that comes with knowing that I am protecting my team and their livelihoods, as well as my guests… it was absolutely a no-brainer to implement the BAS.
The ability to avoid business interruption and ensure a safe archive of sensitive client data was more than worth the investment in the BAS.
We’d already put a lot of cyber security tactics in place, but we had nothing like the BAS, now we feel a lot better in protecting our patients and our business.
© Copyright 2020 – Sollensys Corp.