[Info-vax] OpenVMS x64 Atom project

Phillip Helbig undress to reply helbig at asclothestro.multivax.de
Sat Jun 5 07:28:25 EDT 2021


In article <mn.2aa97e56e8d0753c.104627 at invalid.skynet.be>, Marc Van Dyck
<marc.gr.vandyck at invalid.skynet.be> writes: 

> > One of the ransom cases I've cleaned up after some years ago had the 
> > perpetrator silently corrupt multiple backups over time, deeper than the 
> > organization's backup rotation schedule. The perpetrator then ransomed the 
> > only remaining good copy of the organization's databases. In recent ransom 
> > attacks on other platforms, the attackers have been active in the target 
> > organization's networks for weeks and months, too.
> >
> I suppose that people in this organization never tried restores ? Doing
> regular restores to ensure the integrity of your backups is one of the
> major recommendations, isn't it ?

Yes, there is little point in doing a backup if you don't test the 
restore.  But imagine, say, a database of several hundred terabytes.  
Even if you can restore it, you can't necessarily tell if the data are 
somehow corrupt.  Yes, checksums and so on will catch some things, but 
not all.




More information about the Info-vax mailing list