How Aegis Cloud Disaster Recovery’s 4-3-2 Backup Rule Helps You Fight Ransomware


The advancement of technology has benefited our lives with innumerable convenience. However, this also opens the doors for cybercriminals to commit crimes via multiple malware, including ransomware. Backing up data is a key part of Ransomware protection and defending against other malware. Having known the threats of cybercrimes, Aegis seeks to protect the data and files of our clients by using cost-effective delivery systems. In this article, we will be exploring how Aegis Cloud Disaster Recovery (CDR) and its 4-3-2 Backup Rule helps you in fighting Ransomware. 

What is Ransomware?

Ransomware is one of the malwares that encrypts and attacks a victim’s files. As suggested by the name of this malware, victims are directed to make payments and obtain the decryption key. In other words, ransomware prevents victims from accessing and restoring their files until they make their payments. The amount of ransoms varies greatly. 

There are several ways in which Ransomware uses to access the victims’ computers. The most common delivery system being the phishing spam, which are the email attachments in victims’ mailboxes. These emails usually masquerade as trustable sources so that victims are more likely to download and open the files. Upon downloading or opening the files, victims will have Ransomware taking over their computers. Hence, protection against Ransomware is necessary for the security of your data.

Common Targets of Ransomware Attacks

Anyone who has essential and attractive data can be the target of a ransomware attack. Recently, educational institutions such as private schools, colleges, and universities are one of the top ransomware targets. This is because educational institutions often carry a vast amount of essential data, such as research, financial data, medical records, and intellectual properties.

Furthermore, governmental agencies are also an easy target for ransomware attacks. These agencies often carry crucial and time-sensitive data, which makes them more likely to recover their data as soon as possible by paying the ransom. That said, healthcare departments are vulnerable to ransomware attacks due to a similar reason. They are more likely to pay ransom due to the urgency of recovering their patients’ data, especially those who are in critical stages of life.

Lastly, firms that carry a massive amount of data are also the targets of ransomware attacks. Some examples include retail, finance, HR, energy, and utility departments. It is of utmost importance to have reliable and effective ransomware protection strategies. To do so, you will require reliable services from cloud disaster recovery professionals, such as Aegis. Before understanding how Aegis protects your data, it is helpful to understand the common backup practices in today’s market.

Read More: 5 Steps to Recover Your Server After a Ransomware Attack

The Backup Rule

The usual backup practice in the market is following the 3-2-1 Backup Rule. The 3-2-1 Rule is an effective defence system against Ransomware. It can be broken down into three different parts, as shown below:

  • (3) Copies of Data

This backup method has three copies of your data or files stored in multiple underlying storages. Having at least two backups for your primary data prevents you from losing all your data at once during incidents such as fire, theft, and vandalism.

  •  (2) Different Storage Media

This step ensures that your data is stored in two different media types. Some common examples include storing copies in the cloud, tape, or hard drive.

  • (1) Off-Site Copy:

This rule means that at least one copy of your data should be stored remotely. Ransomware attacks destroy the data stored in the same location quickly. Thus, this rule suggests having one copy of your data stored in a different location, city, state, or country. It usually involves storing your data in an off-site cloud storage.  

Different from the basic backup rule, Aegis Cloud Disaster Recovery (CDR) levels up the data protection game by provisioning the 4-3-2 Backup Rule instead!

  • (4) Copies of Data:
    • a. Client’s primary server
    • b. Aegis DR Appliance at Client’s production site
    • c. Aegis Disaster Recovery Centre @ Cyberjaya
    • d. Aegis Disaster Recovery Centre @ Kuala Lumpur
  • (3) Different Storage Media:
    • a. Aegis DR Appliance at Client’s production site
    • b. Cloud Storage @ Aegis Disaster Recovery Centre @ Cyberjaya
    • c. Cloud Storage @ Aegis Disaster Recovery Centre @ Kuala Lumpur
  • (2) Off-Site Locations:
    • a. Aegis Disaster Recovery Centre @ Cyberjaya
    • b. Aegis Disaster Recovery Centre @ Kuala Lumpur
Cloud Backup and Recovery

Aegis, More Than Just Recovery

Aegis provides multiple cloud backup and disaster recovery services that suit the needs of different clients. By incorporating the 4-3-2 Backup Rule, these services are effective in protecting your files and data against many cybercrimes, including protection from Ransomware attacks.

1. Aegis Cloud Disaster Recovery (CDR)

Aegis CDR provides cloud backup and disaster recovery services that are powered by Aegis 1PAT. The Cloud infrastructure of this service enables scalable back and front-end architectures. It is applicable for both on-premise and cloud users, offering complimentary and unlimited DR resources to all clients.

2. Aegis Cloud Veeam Backup (CVB)

Aegis CVB offers cloud backup services that entirely integrate with Veeam. Clients can enjoy complimentary and unlimited DR resources while having their on-premise data replicated to Aegis cloud. Besides, Veeam’s on-premise clients can also leverage on Aegis CVB services and privileges.

3. Aegis Cloud Office 365 Backup (COB)

This package is a comprehensive business solution that offers backup and restore services for all data of Microsoft 365. This service caters to Microsoft SharePoint, Microsoft OneDrive, and Microsoft Exchange. Aegis COB aims to protect and recover data from threats that are beyond Microsoft’s retention and backup policies. Some examples of threats include Ransomware, overwriting, and accidental deletions. The files and data of Microsoft 365 will be securely replicated to Aegis cloud.  

4. Aegis Cloud Endpoint Backup (CEB)

This automated and comprehensive backup solution focuses on the clients’ endpoint devices and the data stored in those devices. Aegis CEB aims to protect and reduce the risk of data loss from endpoint devices.

Since 2009, Aegis has been specialising in Cloud Disaster Recovery (CDR) Services. With over a decade of CDR experience, Aegis is the pioneer in cloud disaster recovery services in Malaysia. This sums up the Aegis 4-3-2 Backup Rule and Aegis’ services that help to combat Ransomware. Protecting your data from Ransomware is as easy as 4-3-2!

For more information regarding our services and solutions, visit Aegis’ official website.  

Related Posts

Need help?