{"id":78864,"date":"2024-06-04T12:34:47","date_gmt":"2024-06-04T04:34:47","guid":{"rendered":"https:\/\/version-2.com\/?p=78864"},"modified":"2024-05-31T12:36:44","modified_gmt":"2024-05-31T04:36:44","slug":"what-does-ransomware-recovery-look-like","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/06\/what-does-ransomware-recovery-look-like\/","title":{"rendered":"What does ransomware recovery look like?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"78864\" class=\"elementor elementor-78864\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-24c3f9c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24c3f9c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c6ecd87\" data-id=\"4c6ecd87\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-123ce05e elementor-widget elementor-widget-text-editor\" data-id=\"123ce05e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.prismic.io\/keep-it\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\" width=\"800\" height=\"800\" \/><\/p><div class=\"section\"><p>Ransomware recovery isn\u2019t a one-size-fits all type of thing, and as such, it\u2019s important to be thinking about data protection best practices and how to minimize the impact of an eventual ransomware attack \u2014 because it\u2019s a matter of when it happens to you, not if.<\/p><p>Because of the complexity of SaaS deployments and all the differing policies, it\u2019s easy to overlook some details and have data protection gaps \u2014 gaps that will become painfully obvious when you\u2019re trying to recover from ransomware or another data loss scenario.<\/p><p>So, that\u2019s why I want to equip you with some of my recommended steps that you can use to hopefully make good business decisions about how you can prepare for the time when ransomware comes to you.<\/p><p>Here\u2019s a checklist of six points for disaster recovery and business continuity that I would encourage you to keep in mind and think about to boost your cyber resiliency:<\/p><p><b>1. You\u2019ve done a risk assessment to find the most critical infrastructure and data assets to protect. <\/b><\/p><p><b>2. You\u2019ve created a prioritized, granular DR (disaster recovery) plan supported by your software. <\/b><\/p><p><b>3. You\u2019ve backed up all your mission-critical data. <\/b><\/p><p><b>4. You regularly test and verify your recovery processes. <\/b><\/p><p><b>5. You\u2019re recovering from backups that are immutable and tamper proof. <\/b><\/p><p><b>6. Your backups remain available on a separate, air-gapped infrastructure. <\/b><\/p><h2>Let\u2019s dive deeper into the details of the six steps I\u2019ve recommended<\/h2><h3>Point 1: Do a formal risk assessment\u00a0<\/h3><p>The first thing I\u2019d recommend you check is that you&#8217;ve done a formal risk assessment to identify what the most critical infrastructure and data assets are for you to protect. This is obviously going to vary according to your business. Where are you located? What line of business are you in? What are the biggest risks that your business faces? And so on.<\/p><p>It&#8217;s very likely you&#8217;ve already done some of that work for sort of generic cybersecurity reasons, but you need to carry it to the next step and say, \u201cAll right, if I have assessed the risk of different security threats and the impact that they may have, what&#8217;s the <i>second<\/i> order risk assessment if one of those risks turns into a vulnerability that is successfully exploited? What does it mean for my business continuity capabilities?\u201d\u00a0<\/p><p>\u00a0<\/p><h3>Point 2: Create a prioritized, granular DR plan\u00a0<\/h3><p>Second, you should be able to check off the box that says you&#8217;ve created a prioritized, granular disaster recovery plan that&#8217;s supported by your software. I see far too many customers who come to us and say, \u201cHey, good news, we&#8217;re buying your solutions so our SaaS data will be protected.\u201d I say, \u201cOK, that&#8217;s great. Tell me about your disaster recovery plan.\u201d And their answer is, \u201cWell, we&#8217;re just getting started. We don&#8217;t really have a plan yet.\u201d<\/p><p>If I&#8217;m honest, I&#8217;d rather you build a plan and then call Keepit rather than call Keepit and then build your plan because your plan has to incorporate things that don\u2019t involve SaaS data recovery. Just to cite one example from a real customer that we&#8217;re working with: Suppose that your operations are in a part of the world that is subject to hurricanes.<\/p><p>That means for every hurricane that you see, you&#8217;re going to see several other events \u2014 high winds, flooding, storm surge, and so on. How do you tell people not to come to work because the building is flooded? You may not be able to rely on Teams or on Zoom or on another cloud-based communication system to do that. That&#8217;s a part of your disaster recovery plan.\u00a0<\/p><p>\u00a0<\/p><h3>Point 3: Create a backup of all your mission-critical data\u00a0<\/h3><p>I like to emphasize to people that recovering your data is the first necessary part of restoring your business operations. It&#8217;s not completely sufficient all by itself just to say, \u201cOh, I have a backup\u201d because if I walked up to you and said, \u201cOh, you had a disaster, great, here&#8217;s a USB stick that has all of your data on it\u201d that probably wouldn&#8217;t be enough to get your business up and running again. It would help, but it wouldn&#8217;t be enough all by itself.\u00a0<\/p><p>\u00a0<\/p><h3>Point 4: Test regularly and verify your backups\u00a0<\/h3><p>Having a backup of your mission critical data and knowing that that backup is valid because you have regularly tested and verified the recovery is critical. This helps you know, in the gravest extreme, where your data is, that it\u2019s intact, that it hasn\u2019t been tampered with, <b>and <\/b>that you have people available to you who can coordinate and execute or restore leading to a recovery. Super important.<\/p><p>Those are the things most people think of when they think of what does good recovery look like. Do I have a backup and does my backup work? That&#8217;s not to minimize the importance of these questions, but they&#8217;re only part of the overall evaluation that you should be doing.\u00a0<\/p><p>\u00a0<\/p><h3>Point 5: Ensure your backups are immutable and tamper proof\u00a0<\/h3><p>Next, when you do a recovery, ensure the source backups that you&#8217;re using to do that recovery are immutable and tamper proof \u2014 and you can prove it. Why do I say that? Well, if you have a backup and you don&#8217;t know for certain that it is immutable, then you\u2019ve got a potential exploitable data protection gap. (Read more about <a href=\"\/en\/blog\/immutability\/\" target=\"_blank\" rel=\"noopener\">immutable data protection<\/a>.)<\/p><p>As we see persistent nation-state scale attacks becoming more common, one increasingly common tactic is for the attacker to attack your repository of backups, too. (Attacks such as <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/01\/25\/midnight-blizzard-guidance-for-responders-on-nation-state-attack\/\" target=\"_blank\" rel=\"noopener\">Midnight Blizzard<\/a>.)\u00a0 When you think about how traditional backup systems are constructed, if an attacker can get into your on-premises environment, they can probably escalate privileges and pivot to kill your on-prem backups. Now you may say, \u201cOh hey, no problem, I&#8217;ve got backups in the cloud.\u201d<\/p><p>Well, guess what?<\/p><p>If your cloud environment is linked to your on-prem environment, as it almost always will be with Azure and very probably is with AWS (Amazon Web Services), then an attacker who can compromise an account and then escalate privileges in the cloud can take that privilege to account, pivot to the cloud, and start blowing things up. This is the whole focus of the Mango Sandstorm attacks that Microsoft wrote about last year. So, the only way to protect yourself against that is to have your backups isolated. Which leads me to my final point.\u00a0<\/p><p>\u00a0<\/p><h3>Point 6: Keep backups on a logically separate, air-gapped infrastructure\u00a0<\/h3><p>You can call them air gapped, and you can call them isolated. The term isn\u2019t as important as the notion that you want your backups to be stored somewhere that doesn\u2019t have direct directory or security connectivity to your production systems. This way, if your production system is compromised, you&#8217;re able to get into your backup environment, verify the presence of your backups, verify the integrity of your backups before you start doing a restore. Read about why <a href=\"\/en\/blog\/air-gapping-for-backup-data-resilience\/\" target=\"_blank\" rel=\"noopener\">air-gapped backup is your best defense<\/a> against ransomware.\u00a0<\/p><p>\u00a0<\/p><h2>Final words\u00a0<\/h2><p>From conducting a comprehensive risk assessment to fortifying your backups within an air-gapped, immutable backup, each step is a crucial layer in the armor of cyber defense. The importance of proactive measures can\u2019t be overstated, so I hope the pointers outlined above are helpful for you and your DR plan.<\/p><p>If you\u2019d like to learn more about ransomware recovery, be sure to catch our on-demand webinar, <a href=\"https:\/\/www.brighttalk.com\/webcast\/20302\/608347?utm_source=Blog&amp;utm_medium=brighttalk&amp;utm_campaign=608347\" target=\"_blank\" rel=\"noopener\">The ROI of ransomware recovery<\/a>.\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c5768c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0c5768c\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;9abbb0a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e987c36\" data-id=\"e987c36\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73b3a92 elementor-widget elementor-widget-shortcode\" data-id=\"73b3a92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"50842\" class=\"elementor elementor-50842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1043a3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c1043a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c911d7d\" data-id=\"c911d7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-026fa41 elementor-widget elementor-widget-text-editor\" data-id=\"026fa41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Keepit<\/strong><br \/>At Keepit, we believe in a digital future where all software is delivered as a service. Keepit\u2019s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Ransomware recovery isn\u2019t a one-size-fits all type of t [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[853,1273,61],"tags":[854,1272],"class_list":["post-78864","post","type-post","status-publish","format-standard","hentry","category-keepit","category-1273","category-press-release","tag-keepit","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What does ransomware recovery look like? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What does ransomware recovery look like? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Ransomware recovery isn\u2019t a one-size-fits all type of t [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-04T04:34:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.prismic.io\/keep-it\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/what-does-ransomware-recovery-look-like\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What does ransomware recovery look like?\",\"datePublished\":\"2024-06-04T04:34:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/what-does-ransomware-recovery-look-like\\\/\"},\"wordCount\":1278,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"keywords\":[\"Keepit\",\"2024\"],\"articleSection\":[\"Keepit\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/what-does-ransomware-recovery-look-like\\\/\",\"url\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/\",\"name\":\"What does ransomware recovery look like? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"datePublished\":\"2024-06-04T04:34:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"contentUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/what-ransomware-recovery-looks-like\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What does ransomware recovery look like?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What does ransomware recovery look like? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/","og_locale":"en_US","og_type":"article","og_title":"What does ransomware recovery look like? - Version 2","og_description":"Ransomware recovery isn\u2019t a one-size-fits all type of t [&hellip;]","og_url":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/","og_site_name":"Version 2","article_published_time":"2024-06-04T04:34:47+00:00","og_image":[{"url":"https:\/\/images.prismic.io\/keep-it\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/06\/what-does-ransomware-recovery-look-like\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What does ransomware recovery look like?","datePublished":"2024-06-04T04:34:47+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/06\/what-does-ransomware-recovery-look-like\/"},"wordCount":1278,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","keywords":["Keepit","2024"],"articleSection":["Keepit","2024","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/06\/what-does-ransomware-recovery-look-like\/","url":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/","name":"What does ransomware recovery look like? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#primaryimage"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","datePublished":"2024-06-04T04:34:47+00:00","breadcrumb":{"@id":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#primaryimage","url":"https:\/\/images.prismic.io\/keep-it\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","contentUrl":"https:\/\/images.prismic.io\/keep-it\/ZlbKL6WtHYXtT4IA_ransomware-recovery-webinar-blog-92.png.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800"},{"@type":"BreadcrumbList","@id":"https:\/\/www.keepit.com\/blog\/what-ransomware-recovery-looks-like\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What does ransomware recovery look like?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kw0","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=78864"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78864\/revisions"}],"predecessor-version":[{"id":78868,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78864\/revisions\/78868"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=78864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=78864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=78864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}