Author Archives: Thrive

SIEMaaS – Financial Services Hybrid Cloud – Financial Services DRaaS – Financial Services Benefits of Managed Firewalls

Thrive’s Michael Gray and Chip Gibbons sit down for a Cybersecurity Conversation on managed firewalls. Managed firewalls provide companies with the extra bandwidth to monitor logs and activities for irregularities in their network.

 

Cloud Backups for Ransomware Attack Protection and Recovery

As technology becomes more sophisticated, so do cyber criminals and the tactics that they employ. As a result, the frequency of ransomware is becoming more prevalent and increasingly expensive for businesses to prevent, mitigate, and recover from when they don’t have cloud backups. The need for ransomware attack protection is becoming non-negotiable.

The question of how to best achieve ransomware attack protection is rapidly gaining urgency in organizations of all shapes and sizes. Keeping recent, reliable, and ready-to-deploy local backups of your systems and files is one of the preferred ways to recover from attacks that make it through traditional security defenses. Unfortunately, this standalone tactic is rapidly becoming insufficient.

The new challenge facing IT and security industries is the arrival of insidious forms of ransomware that in addition to attacking the live production environment, also target and infect backups. This type of ransomware comes in a variety of deployments and entry points and can corrupt or infect the backup environment in such a way that malware is still present when the backup is used for recovery. As a result, the live production environment is re-infected, and the attacker can attempt to re-ransom the victimized company.

The very real possibility that you will never actually recover your compromised data or return to business as usual is driving businesses to identify the best way to secure their entire backup process and systems.

Best-of-breed cloud backup solutions have adapted to include additional security processes to protect against sophisticated ransomware, identify intrusions, and recover data despite attackers’ best efforts to corrupt your information and hold you hostage in perpetuity.

How is Your Data Protected?

Investing some time in understanding how your data is currently protected will pay you back in dividends. Knowing the current state of your security and backup protection will help you identify the gaps and develop practical strategies for fighting ransomware threats.

When evaluating, find out:

How often is my data backed up?
Recognize that a ransomware attack will usually result in the loss of all of your data dating back to your last clean backup. What is the value of the data generated by your business during the delta between that last backup point, and the moment of malware infection? How would the loss of that data affect your business?

How much would it cost to restore my system in the event of a Crypto-type attack?
How long would my office be down for? What data would we likely lose? What would it cost to restore our systems? How could we make our data more resistant to attack or loss?

Have the computer users in my office received any type of computer security training?
Can they recognize the difference between valid and malicious email attachments or web links? Most computer infections are brought into an office by poorly trained users who click on a malicious attachment or install a “freeware” program onto their system.

General Recommendations for Data Backup and Protection

Run two forms of backup, ideally a cloud-based and internal backup system, and then add archiving for air-gapped protection to media such as tape.
It is critical to run two forms of backup, especially if one backup method fails temporarily – you must have an additional solution in place to maintain protection for your data.

Run some form of continuous backup or replication that works to protect your data throughout the day, as your files or databases change and are updated.
Examples of this type of protection include frequent storage drive snapshots, SQL database replicas, and periodic backup or replication to the cloud with Veeam.

Avoid storing data on your end-user computers unless they are also backed up.
Typically, files saved to your ‘My Documents’ and similar local folders on your workstation aren’t included in cloud backups, procedures, or anti-fraud protections.

Advantages of Cloud-Based Backup and Recovery

  • Most cloud-based backup solutions have versioning capabilities that allow for multiple cloud backups, effectively allowing the rollback of ransomware-encrypted files to the pre-encrypted version.
  • These solutions may also provide data protection that automatically monitors for indicators of ransomware activity. For example, a massive number of file extension writes and renames can be a great clue that something is amiss.
  • As an added countermeasure, these solutions are not linked to the local network and don’t show up as another drive or shared folder – which are often targeted by ransomware attacks.

For more information and insights, read our Disaster Recovery Guide now to learn what you need to be prepared.

Cloud Backups and Ransomware Attack Protection with Thrive

With ransomware, what you don’t know or aren’t prepared for really can hurt you. The good news is that with a little extra preparation and a nominal investment of time, you can successfully assess and manage this risk.

Working with an experienced backup and disaster recovery cloud provider is one key way to ensure that your data is secure in the face of malicious activities and attempts to hold your valuable business data hostage.

Thrive has over 15 years of experience in data protection. We are continually advancing our solution portfolio to combat emerging threats. New features and enhancements from Veeam and Thrive such as “Insider Protection” and “Cloud Recycle Bins” are leading the way today in restricting data access and ensuring recoverability from ransomware and other types of sophisticated cyberattacks.

Speak with a Thrive data protection expert today to learn how we can help you safeguard your business with cloud backups and recovery.

Thrive Expands into the Mid-Atlantic with EaseTech

FOXBOROUGH, MA, Nov. 5, 2019 – Thrive, a premier provider of NextGen Managed Services, is proud to announce that it has acquired EaseTech, a well-established, leading managed services provider based in Columbia, MD. The addition of EaseTech will provide a new region for Thrive to offer their advanced suite of cyber security, hybrid Cloud, global network management, disaster recovery and compliance-driven NextGen services.

Throughout its twenty-six years of award-winning service in the finance, legal and education verticals, EaseTech has become regarded in the industry as one of the most respected MSPs serving the Mid-Atlantic. Founded by Charles Bubeck in 1993, EaseTech has over 40 employees and provides Cloud-focused managed services to allow businesses from the MarylandVirginia and the Washington DC area to maximize their technology ROI and thus concentrate on their own business core competencies to drive value.

“Partnering with EaseTech is a highly attractive proposition for Thrive as they’re one of the most widely respected technology firms in the Mid-Atlantic region. EaseTech’s ‘customer-first’ philosophy is a perfect match for our core values,” said Rob Stephenson, Thrive CEO. “The EaseTech clients will benefit greatly from Thrive’s vast engineering expertise and our NextGen platform of advanced cyber security, hybrid Cloud and compliance-driven services.”

“We’re very excited about the possibilities this transaction creates for our customers and employees,” stated Charles J. Bubeck, former EaseTech CEO. “The partnership of EaseTech and Thrive was a natural fit. Both companies share the same fundamental operating principles by focusing upon quality customer service delivered by our expert engineering teams. Our professional services and education clients will quickly be able to advance their technology roadmaps with Thrive’s advanced capability-set.”

With the completion of this transaction, Mr. Bubeck will now begin serving as a consultant. Jason Shirdon, formerly the President of EaseTech, will continue to lead the day-to-day efforts of this division as Thrive’s Executive Vice President and General Manager.

About Thrive
Thrive is a leading provider of NextGen managed services designed to drive business outcomes through application enablement and optimization. The company’s Thrive5 Methodology utilizes a unique combination of its Application Performance Platform and strategic services to ensure each business application takes advantage of technology that enables peak performance, scale, and security. For more information, visit http://www.thrivenextgen.com

Follow Thrive: LinkedInTwitter and Facebook

MEDIA CONTACT:
Stephanie Farrell — Marketing, Thrive | 774-276-1521| sfarrell@thrivenextgen.com

Cybersecurity Fundamentals

When it comes to cybersecurity threats, being unprepared can cost a business millions. The best way to protect your company and employees is to build a comprehensive cybersecurity defense platform.

CUBEConversation – Cyber Drilldown

Michael Gray, CTO at Thrive sits down with Dave Vellante for a CUBEConversation at theCUBE Studio in Marlborough, MA.

Cloud Security

Webinar Series Part 3:
Cloud Security

Watch the Full Webinar Presentation

Thrive experts Dave Sampson, VP, Consulting Services, and Chris Moore, VP, Solutions Architecture, discuss Cloud Security.

Discussion Topics:

  • Defense in Depth & Security Concepts
  • Cloud Network & SaaS Application Security
  • User Security / Identity & Access Management
  • Compliance & Secure Vendor Selection

Fill out the form to watch the webinar now!

Cybersecurity Planning

Cybersecurity Planning:
How to Build a Sound Security Posture

Watch the Full Webinar Presentation

Thrive expert Chris Moore, VP, Solutions Architecture discusses Cybersecurity Planning – How To Build A Sound Security Posture.

Discussion Topics:  

  • Vulnerability 101 – The Basics
  • Minimum Standards of Cybersecurity
  • Data Protection & Recovery
  • Advanced End User Protection Methods
  • Assessing Your Security Posture

Fill out the form to get instant access to our on-demand webinar.