Wow, that’s terrible. Seems we need to start simulating ransomeware attacks to confirm our infrastructure is up to the task of recovering from them.
Best practices these days is use cloud providers as part of your backup solution who maintain their own backups of your backups which in theory make you getting hacked recoverable.
Best practices these days is use cloud providers as part of your backup solution who maintain their own backups of your backups which in theory make you getting hacked recoverable.