SpiderOak ONE and SpiderOak Groups have several unique features that allow you to recover your data after a ransomware attack. Preventing ransomware attacks can be difficult, but with SpiderOak, backing up your data and getting your files back is easy.

LET’S ADDRESS TWO DIFFERENT SCENARIOS:

1) RANSOMWARE ENCRYPTED A LARGE NUMBER OF FILES AND FOLDERS

SpiderOak ONE and SpiderOak Groups feature Point-In-Time recovery, so you can download your files as they were at a specific point in the past. If the ransomware attack started on Friday at noon, you can restore your files as they were at 11 am on Friday, 9 pm or Thursday, or 1 pm the Friday before. This is the most efficient way to restore a large number of files and folders.

2) RANSOMWARE ENCRYPTED A SMALL NUMBER OF FILES

There are two options you can use in this case. In the Manage tab of SpiderOak ONE and SpiderOak Groups you can access all of the historical versions of your files, as well as deleted items. Each time your backed up files are changed, a new historical version is created. You can download any of these versions at any time. In the case of a ransomware infection, this will allow you immediate access to previous versions of your most important files.

Whenever a file that is backed up with SpiderOak ONE or Groups is deleted from your computer, that file remains in your SpiderOak account. These files are moved to the Deleted Items bin, which you can access in the Manage tab. In many cases, ransomware will delete the files it encrypts, and you can find your original, uninfected files in the Deleted Items bin.

PROTECTING YOURSELF FROM RANSOMWARE

The first and most important step is backing up your data. SpiderOak ONE and SpiderOak Groups protect your files through point in time recovery, historical versions, and deleted items, allowing you to restore uninfected copies of your files.

Always update and patch your operating system. The recent WannaCry ransomware attack only affected computers with an unpatched security hole. Anyone who had an up-to-date Windows operating system was not vulnerable to that attack. Keeping the software on your computer up-to-date is vital as well.

Be careful about what you download. Never click on a file or link in a suspicious email. Don’t download anything from a suspicious website.