Well, I sustain my words: the only EFFECTIVE way is to prevent.
All other ways are recipes what to do after failure happens, to minimize the impact.

This resembles data loss scenario. What to do when you lost your data? The answer is AVOID it. Use RAID arrays, remote copies, backups, archive copies, transaction logs... every mentioned thing will not help you when you lost your data, it is to help you avoiding data loss.

BTW: The only method for rabies is to immunization (by vaccination). There is no cure.

--
Radoslaw Skorupka
Lodz, Poland






W dniu 08.09.2020 o 01:31, Tom Brennan pisze:
While I really like your new term, "ransomwared", I have to disagree with the conclusion.  Of course we need to try to prevent the attack, but we also need to have some kind of backup to get things at least somewhat back to normal.  And that doesn't mean a single backup method for all kinds of data.  For example, operating system changes don't happen every day, so as long as you get a system back up, it probably doesn't matter too much if all the PTF's are applied. DB2 is another story if you want something reasonably up-to-date.

Hmm... maybe make a deal with the hacker at half price and only get the DB2 datasets back.  Just kidding of course.  It should be a moral decision to *never* pay any ransom, no matter what the cost to the business.  Of course that will never fly in reality.

On 9/7/2020 4:34 AM, R.S. wrote:

Conclusion: the only effective way is to do not allow ransomware attack to happen. Yes, we have to prevent it. All other ideas are like good advices to a guy after his house was already robbed. Too late. You already lost a lot.



======================================================================

Jeśli nie jesteś adresatem tej wiadomości:

- powiadom nas o tym w mailu zwrotnym (dziękujemy!),
- usuń trwale tę wiadomość (i wszystkie kopie, które wydrukowałeś lub zapisałeś 
na dysku).
Wiadomość ta może zawierać chronione prawem informacje, które może wykorzystać 
tylko adresat.Przypominamy, że każdy, kto rozpowszechnia (kopiuje, rozprowadza) 
tę wiadomość lub podejmuje podobne działania, narusza prawo i może podlegać 
karze.

mBank S.A. z siedzibą w Warszawie, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: [email protected]. Sąd Rejonowy dla m. st. 
Warszawy XII Wydział Gospodarczy Krajowego Rejestru Sądowego, KRS 0000025237, 
NIP: 526-021-50-88. Kapitał zakładowy (opłacony w całości) według stanu na 
01.01.2020 r. wynosi 169.401.468 złotych.

If you are not the addressee of this message:

- let us know by replying to this e-mail (thank you!),
- delete this message permanently (including all the copies which you have 
printed out or saved).
This message may contain legally protected information, which may be used 
exclusively by the addressee.Please be reminded that anyone who disseminates 
(copies, distributes) this message or takes any similar action, violates the 
law and may be penalised.

mBank S.A. with its registered office in Warsaw, ul. Senatorska 18, 00-950 
Warszawa,www.mBank.pl, e-mail: [email protected]. District Court for the Capital 
City of Warsaw, 12th Commercial Division of the National Court Register, KRS 
0000025237, NIP: 526-021-50-88. Fully paid-up share capital amounting to PLN 
169.401.468 as at 1 January 2020.

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to