You are only browsing one thread in the discussion! All comments are available on the post page.

Return

thfi ,
@thfi@discuss.tchncs.de avatar

Backups serve different purposes and if encryption by malware is a threat, you have to do backups differently, as opposed to, for example, hardware failure, where your NAS is a valid approach. To protect against encryption malware, you must make your backups inaccessible. One example are read-only backup media like DVD-ROMs. Another example is to make regular backups on tapes or HDDs and lock them up somewhere. You only take them out after you have wiped all computers that were affected by malware.

Lettuceeatlettuce OP ,
@Lettuceeatlettuce@lemmy.ml avatar

What about simulated air gaps? So a backup system that turns off its own networking abilities once its done with the current backup and only turns its networking back on when it’s ready to start backing up again?

  • All
  • Subscribed
  • Moderated
  • Favorites
  • random
  • [email protected]
  • All magazines