Snapshots for RANSOMWARE PROTECTION - Complete guide to protect your files

Поділитися
Вставка

КОМЕНТАРІ • 23

  • @DavidM2002
    @DavidM2002 2 дні тому +3

    Even if I didn't need a NAS to backup or share files, I'd have a Synology NAS to run Active Backup for Business to backup the 6 PC's around my home. ( Mine runs ABB every afternoon on all PC's if they are online). The ability to do a bare metal backup would be worth every penny for a 2 bay with a couple of drives. I have had a couple of PC's get completely borked over the years and the ability to get them operational in short order is priceless. I don't think enough people ask themselves what they would pay to be able to do that. That little NAS with drives is just not very expensive in comparison.

  • @theol1044
    @theol1044 2 дні тому +4

    If I didn't miss anything (which is quite possible), you forgot to point out some very important facts: After a ransomware infection of your PC, you'll still have to remove the infection (ideally, restore the compromised PC to a clean state from scratch), not only restore the files. Otherwise, you'll have to do the same procedure over and over again. If your NAS itself is compromised, I'm not quite sure how to deal with the situation. Usually, you'll also need to restore the OS & apps from scratch (without damaging the files), but I don't know how Synology's backup options (for the NAS itself) can handle that.

    • @kemalc.3782
      @kemalc.3782 2 дні тому +1

      You simply cannot rely to the NAS backup solutions, such as snapshots, alone.
      The snapshots have a good potential to get you out of the misery in case of a compromised storage share, but if even the NAS OS is compromised, then your NAS is to be considered as completely compromised thus all backups within it considered useless.
      In such a case you will have to rely on a seperate backup solution, e.g. immutable or external devices like RDX or Tapes (rotating drives).
      A plan B is always good, but you should protect and enhance your infrastructure too, to avoid, or reduce risk for such a mess in the first place.
      Remember, the security within your IT infrastructure is as strong as the weakest member in it. This can be anything, from a device, an app, or even a person.

    • @benalthof
      @benalthof День тому

      Good point. It would be interesting on how to handle such maleware. Because I dont want to access an infected NAS via any other computer. The reset button probably will not be enough?

    • @theol1044
      @theol1044 День тому

      @@benalthof The computer you try to access the NAS with is much more likely to be infected than the NAS itself. Most malware targets Windows computers, and I have yet to find any mentions of Windows malware that spreads to Linux (or other *nix) systems over the network. That, and the most common entry points for malware are (1) the users install it themselves, most often via 'cracked' software, (2) email attachments or scripts, and (3) drive-by downloads while browsing. All of which is usually done on a client PC, not a server. Therefore you should take care of the infected PC first, and only accesss the NAS again with a known-clean PC.

    • @colt5189
      @colt5189 День тому

      Every once in a while, I'll buy a used HDD and copy/paste all of my docs, pics, and files, etc. onto the drive. And then use a label maker to slap a date on it. And just store it away as a redundant backup. And do that every so often. This helps protect against ransomware and provides redundant backups for my up to date backups in case something were to happen like ransomware.

    • @Avdarmaly
      @Avdarmaly День тому

      @@colt5189 isn't a hdd which doesn't spin for a long time eventually becomes more prone to fail?

  • @MrDirectNL
    @MrDirectNL День тому

    Thank you for the quick security measures. I really appreciate it.

  • @BerserkeR_031
    @BerserkeR_031 2 дні тому +2

    Connect with a separate user account to your smb shares, never use your admin account so you can login to DSM with different credentials and restore your snapshots.

  • @sustainablewww6715
    @sustainablewww6715 2 дні тому

    Thank you I loved this video! I finally got snapshots set up on my NAS.

  • @asolepascual
    @asolepascual 2 дні тому +1

    Hello,
    From what I understand, is this similar to a Time Machine system? That is, if I make a Time Machine backup every hour, will this increase the disk space a lot, just like it does on the NAS?
    With the snapshot system, do you think it is necessary to protect the files and folders on the NAS with a WriteOnce (WORM) system or is it not necessary to have both things activated?
    Thanks!

  • @colt5189
    @colt5189 День тому

    It's good to every once in a while, buy a used HDD and copy/paste all your photos/docs/files etc. onto them and write the date down and just store it away. As a way to protect from ransomware. Or if you accidentally delete something and don't find out about it until a while later.

  • @MichaelStrong0112
    @MichaelStrong0112 2 дні тому +1

    Thank you! If the Ransomeware Script is still running (i.e., if my NAS is still infected), how do we smoke out and remove the infection?

  • @GoldTechMx
    @GoldTechMx 2 дні тому +1

    Hi i had to make a downgrade from a broken 1621+ to a 920+ with the hdd migration option, i have 5 shared folders in the volume but 1 of them (the bigger one) i now as Read Only folder and won't let me any changes, is there anything you know to change this? i have been searching the web and docs for days but i can't make it work, ewven with the admin user i don't have permisions to make changes, but the active backup for office 365 keep doing the task and writes in that folder with no problem. thanks

  • @johnnygoodface
    @johnnygoodface 2 дні тому +1

    What you're also implying is that the NAS OS files can't ever be encrypted by malware, only the shared folder files, right?

    • @kemalc.3782
      @kemalc.3782 2 дні тому +1

      I don't think he says that, because this is quite well possible.
      There is a difference whether your NAS OS itself gets compromised, or just the files within the storage shares.
      The snapshots will probably get you out of the misery if only the storage shares are compromised (however, there is still a chance that the snapshots are also compromised, if the snapshots were taken when the files were already compromised).
      If your NAS OS is compromised, then you can pretty much consider your whole NAS including the snapshots to be compromised as well.
      In such a case, the best way to restore your files is from another backup solution. Relying only on the NAS Backups is not recommended, depending on the importance of your files.
      The best way to keep your NAS protected is to have strong passwords, different users (for shares and admins), keep your NAS updated, and don't buy a NAS from qnap or with an intel CPU, because they have a lot of vulnerabilities that can be exploited.
      You can also set your NAS in its own subnet and use IPS Firewalls between the subnets to keep the network shares monitored within the active layers itself.
      However, an absolute protection is still not guaranteed. There is always a risk somewhere to get compromised. All you can do is reduce this risk as best as possible and have backup plans in case your protection fails.

  • @MrWizardGG
    @MrWizardGG 2 дні тому +1

    Thank goodness for crypto! How else would hackers evade authorities?

  • @RxZ95sssPG
    @RxZ95sssPG 2 дні тому +1

    Keep in mind that you always have to identify your infected Computer. If you roll back your changes and the PC is still infected, it will encrypt again.

    • @colt5189
      @colt5189 День тому

      This is why a few years ago, I'm glad I bought a few used laptops to keep around just to have as backup in case ransomware on my main computer or something else like my main computer breaking down or the screen going out, etc.

  • @PatentFinance
    @PatentFinance 2 дні тому +2

    SpaceRex is a Godsend!