News & Blog

Immutable Storage to the Ransomware Rescue

What have we learnt from the HSE Ransomware Report in Ireland and other similar attacks? – Immutable file storage must be part of your ransomware protection.

Businesses are falling victim to Ransomware attacks every couple of seconds across the globe. What can happen in seconds can take organisations months to recover from, regardless of whether they have paid their share of the extorted money ransomware cybercriminals are demanding.  

Ransomware doesn’t discriminate. Organisations across every industry, public or private, are potential victims if they haven’t been victims already. Ransomware can also hit on multiple occasions, leading to significant downtime impacting your business. Although ransomware can cause serious damage to your business’s reputation, the good news is that there are steps that you can take straight away to minimise the damage and diminish the likelihood that an attack can take your organisation down.   

Let’s look at the common tactics of Cyber Criminals

Ransomware attacks are getting more sophisticated by the day, aside from this several other issues are contributing to organisations increasing vulnerability. Organisations are faced daily with Cybersecurity Challenges. Cybercriminals use three main tactics to alter an organisations data, making it inaccessible.

  1. Encryption,
  2. Modification,
  3. And, Deletion  

We take a look at some of the most impactful best practices organisations can implement today to protect your data from these three main tactics and ensure business continuity. 

Start by Mapping and Understand Your Data   

Understanding what information, you hold, and store is an important first step to protecting it. 

As part of an exercise for data protection/GDPR, make an inventory of your information which includes; 

  • What is your critical data?  
  • What type of personal data (name, address) you hold 
  • Where you are holding it (in a database) 
  • The source of the information (the individual themselves) 
  • The legal basis for processing it (individual’s consent, performance of a contract) 
  • How long you intend to hold it (1 year) 
Ask yourself the following questions

Is this data important to the continuity of the organisation?

If it is, make sure it is kept as safe as possible and out of cybercriminal hands. Do we need it? If you don’t need it, don’t store it, delete it, and reduce your risk. 

Lock down critical files with immutable file storage

Apply Immutable Storage  

File Archiving enhanced with immutable file storage can be critical to companies getting back up and running. Immutable file storage can give organisations a clearly defined break glass procedure for dealing with the aftermath of a ransomware attack. Immutable storage effectively prevents ransomware perpetrators from fulfilling their strategy.  

Organisations can use this form of storage to quickly recover their data to the latest healthy archive, knowing that it is unaffected by malware.  

Benefits of Immutable File Storage 

Compliance and trust are major supports of immutable file storage. If you need to know that a document hasn’t been altered for example in a litigation case, immutable storage guarantees that. If you need to retain records for a period as set out by government or regulations and don’t want them accidentally or intentionally deleted, immutable storage can safeguard against that.  

Implementers of immutable storage can use it not only to protect data in the event of cyber-attacks but also for legal holds, to secure digital evidence and to supply a chain of custody.  

But the key immutable storage benefit is that the data is virtually impermeable to ransomware. When it comes to ransomware, immutable backups effectively throw up a wall against attacks. An immutable backup can’t be encrypted, modified, or deleted.

When a company detects a ransomware attack, it can use an immutable backup to instantly recover to its last healthy state, unaffected by the malware 

Backup is Not Enough  

Data backup and recovery systems are just not enough to get companies back up and running. Ransomware attackers are after your legacy backups too.  

Cybercriminals are now aggressively targeting backup data to gain full control, or worse, destroy
what has long been considered your insurance policy for business continuity? They’re more sophisticated
attacks enter a primary environment from an endpoint and head straight for your backups—where
8the majority of enterprise data is traditionally stored—deleting, modifying or locking down everything there before taking over the production environment.

Cost of Immutable Storage

File Archiving solutions equipped with WORM Technologies are more accessible and affordable than you might think.  

Immutable storage is generally no more expensive than storing conventional files. Storage costs can add up if an organisation stores many immutable files tagged with lengthy timespans. “lf, for example, you set a policy that a piece of data must be retained for a year, you can’t delete it, and you have to keep paying for the storage until the data retention period expires. These costs are marginal, though, as cloud storage is getting cheaper and cheaper as time goes by. 


Ransomware continues to steal headlines, don’t let it continue to steal your data & money.

What Makes SISCINS Data Immutable?  

SISCIN TripleLock Archives add Immutable file storage for ransomware protection.  

Unlike backup and legacy worm archives, Waterford Technologies offers an affordable file archiving solution that includes WORM technology at no additional cost as well as built-in content indexing and discovery search.  

Waterford Technologies’ has you covered with SISCIN Triple Lock Archives. This security addition to SISCIN file archiving offers immutable write once read many compliance storages that are both secure and easy to use at no additional cost.   

Immutable data architecture means that data, once written, cannot be changed. And, if it cannot be changed, then it cannot be encrypted by ransomware. 

SISCIN TripleLock archives allow administrators to implement WORM technology that makes immutable “locked” copies of their data within the cloud, thereby providing comprehensive ransomware protection. When you create a Triple Lock archive (or convert an existing archive to TripleLock (LLL)) you are making the objects within that archive read-only for a defined period. This can be from 24 hours to many years. This gives the best assurance possible that your data is safe. Each object within a TripleLock archive has its own timer. For instance, if you create a 1-year TripleLock archive any file added to that archive is secure for 1 year from the time it was archived.  

With local organisations being such an appealing target for cybercriminals, it has never been more important to ensure you have the right security in place. What’s clear is that making archive data immutable with WORM technology is now the best line of defence – delivering effective protection right where the data resides and protecting against the rising ransomware threat.  

These days, organisations of all kinds are embracing immutability to avoid paying ransom while securing critical information, enforcing retention policies, and streamlining compliance. 

Let’s organise a 30-minute demo and see how Waterford Technologies can help your organisation better manage its data to mitigate the risk of a ransomware attack.