Secure Your Data with Proactive Ransomware Protection and Snapshot

Jun 24, 2019

Protect your information from ransomware attacks 

Don’t let your information—your business—be taken hostage. Instead, take action to minimize the threat of ransomware and protect valuable data.

In recent years, the rise of ransomware has become a significant data security threat to both home users and businesses alike. Ransomware is a type of malware that attacks your device to gain access to its files or systems, and then prevents you from accessing the files or systems by encrypting them, essentially holding them hostage until you pay the ransom for a decryption key to regain access. With the advent of more advanced data security, ransomware has likewise evolved to become more sophisticated and harder to prevent. In fact, the U.S. Department of Homeland Security considers ransomware to be the fastest growing malware threat in the nation. Traditional antivirus is already having trouble detecting the newest generation of malware, leaving your device vulnerable if you don't take proper precautions.

Malware encryption can be almost impossible to break. The first line of defense against being affected by malicious software is being careful and practicing proactive data security habits, such as regularly updating your operating system and not opening untrustworthy messages. And of course, you should always back up your data. Backups can be automated and data can be replicated with ease on our TeraStation 3010, 5010, 6000 and Windows Storage Server 2016 storage solutions.

three two one backup strategy

If ransomware has already infected your files, the best recourse (without paying the ransom) is often to completely recover your files or system from a backup copy. Buffalo's advice would be to configure your TeraStation device to automatically backup your data, then keep your TeraStation backup device on another network. This will prevent ransomware from being able to attack that device, and you will always have access to a copy of your files if you are ever locked out of the original files.

TeraStation 6000 Featuring Snapshot: Nimble High Performance Storage Defense Against Cyber Threats

While backups are essential, Buffalo recognizes that they are neither easy nor convenient. Restoring from backups takes time and system resources that you may not be able to spare. This is where the Buffalo TeraStation 6000 with snapshot technology can help fill the gap to protect you from ransomware without disrupting business continuity. A snapshot is a virtual copy of the data currently stored in a shared folder or iSCSI volume on the TeraStation at a given point in time. Unlike a full backup, they take up merely a fraction of space of the full data set and can be created quickly without impacting your operations. Once a snapshot has been created and saved, you can simply revert to the data state at the time the snapshot was taken. Since the snapshot-based backup approach is to simply replace files or systems on the same device, you can easily restore to a point in time just before the ransomware infected the device. Because the snapshot captures data exactly as it was on the device, the data image is already in application-usable formats instead of a backup format, resulting in fast restores since you can bypass any backup conversion processes. This is especially convenient if there are only a handful of infected files - instead of performing a full restore, you can just overwrite the encrypted files with the latest version that had not been infected and be on your way.

files getting a snapshot at multiple steps

The TeraStation 6000 allows you to not only create a snapshot manually, but also schedule automatic snapshot creation so you have incremental file versioning and never have to worry about missing the most recent data. You can also enable auto-archiving to easily maintain multiple snapshots, thus giving you the flexibility of multiple recovery points. Buffalo also offers the Snapshot Agent for TeraStation, a Windows Server software that lets you create both application-consistent and crash-consistent snapshots of an iSCSI volume on a Buffalo NAS device that is connected via a virtual machine using VMware. In the event of a ransomware attack and your files are encrypted, you can choose to restore not only specific files to a previous version, you can also easily revert the entire storage volume to a previous state that has not been infected.

While ransomware attacks can be frustrating, you can protect your sensitive data by taking advantage of Buffalo's iSCSI / NAS devices that offer multi-version backup solutions that let you quickly and easily restore previous versions of encrypted files. Along with our robust data security and plentiful backup features, you can rest easy knowing that your sensitive data is well-protected.

Be prepared when attacks occur

The best measure of defense is a proactive, good backup strategy and this is where you will find Buffalo’s ransomware solution most effective. By setting your storage device to automatically backup your data, you will always have a copy of your files if you are ever locked out of the original documents.

Ransomware attacks will typically lock your network attached storage (NAS), making it unusable. This diagram shows the process of copying and storing your data so that you do not have to ransom it back if it is ever locked or stolen.

method of ransomware protection

Make sure back-up drive is not shared on the network to prevent ransomware from infecting the drive. This begins the process of protecting your data.

Set the backup files to “read only” to prevent those files from being changed by ransomware.  You’ll still able to retrieve the data from previous backup versions.

Activate the Backup Device Access key to add another layer of security – so the share folder does not show up as a backup source.


Other Common Steps to Minimize Ransomware Attacks

ransomware protection shield from bugs 


                       Install Security Software.



         Only Open emails/attachments from trusted sender addresses.



               Keep PC OS and software updated.



We created a brief how-to video walking you through the implementation of your TeraStation in order to defend your data against ranswomware attacks.




button to learn more about data recovery service

button to learn more about benefits of product registration

Would you like to learn more about our solutions? Join our email list! Benefits include:

First access to free webinars and giveaways
Invitations to special events
Updates and information on our products