ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

Beating ransomware using cloud infrastructure with vGRID and Veeam

By Heather Wright
Thu 26 Oct 2017
FYI, this story is more than a year old

When Kiwi motorcycling distributor Whites Powersports were hit by ransomware, unlike so many other Kiwi businesses they didn't have to panic because they knew vGRID already had their back.

The company has been a vGRID customer for several years after deciding that cloud infrastructure was the best solution for their IT business needs.  Whites Powersports utilises vGRID Enterprise Virtual Servers with Premium Back-up which offers better technology and performance than it could get on its capex budget.

The solution, crucially, includes Veeam Software which is integrated into the vGRID platform as a service offering, providing availability through efficient Virtual Machine backup, fast and flexible recovery and advanced Virtual Machine replication.

Within two hours of being hit by ransomware Whites Powersports was back up and running.

While ransomware has become one of the biggest cyber security threats for businesses, Bruce Trevarthen CEO of LayerX Group, is adamant that protecting businesses from ransomware does not have to be a daunting task.

“The backup and disaster recovery solutions in vGRID inherently protect you from that,” he says.

“We have services and offerings that, if implemented, give companies the peace of mind that their data can be restored with full integrity very quickly and in an efficient manner – and Whites Powersports is a great example of that,” he says.

“The reality is that as much as you can put in smart systems, software and processes, and educate your staff, ransomware attacks can and will still happen.

“You can never be 100% protected from ransomware.”

While ransomware only really achieved its high profile in recent years, it has been around since 1989, however early versions, distributed on diskettes, were easily decrypted.

Today, two types of ransomware dominate – locker ransomware, which denies access to a computer or device, impersonating law enforcement and claiming the computer is under investigation and has been locked, usually until a ‘fine’ has been paid; and the more common crypto ransomware.

Crypto ransomware prevents access to files or data, with CryptoLocker the first big crypto-ransomware to gain attention.

CryptoLocker is a more advanced form of ransomware, which first surfaced in 2013 and relies on social engineering to get users to open email attachments. A Trojan horse then infiltrates the system and encrypts files with commercial grade encryption and, according to Bill Kleyman, Veeam Cloud, Virtualisation and Data Center Architect, taking advantage of Windows’ default behaviour of hiding the extension from file names to disguise the real .exe extension of the malicious file.

Kleyman cites one study which shows ransomware netted one group of cybercriminals more than $120 million – or 189,813 bitcoins – in just six months in one widespread ransomware attack.

A newer form of ransomware, CrypJoker, uses the AES-256 algorithm to encrypt files. While not widely distributed yet, Kleyman says security experts are warning of the variant, which targets 30 different types of files and deletes shadow copies of them.

“The reality with these things is they are very, very brute force, they encrypt and then the system will keep going back and re-encrypting files they’ve already encrypted,” Trevarthen says.

“So it’s not just the case of getting really powerful computers and un-encrypting it – it’s far more detrimental than that.

“And even if you pay the ransom – and I’m not suggesting anyone does – you have to wait to have it unencrypted, which can be quite long,” Trevarthen says.

McAfee Labs noted in a September 2016 report that ransomware attacks were growing at more than 128% year on year with more targeted attacks increasing.

Trevarthen says currently ransomware isn’t strictly targeted, with cybercriminals instead targeting just a database of potential victims.

“If ransomware gets to a point where it is fully automated and you’ve got scripts encrypting files and demanding ransoms, they could arguably target every single company in a country,” he says.

“That is a much bigger problem – it’s a situation where you could cripple a country’s economy, if it was able to take hold.”

With IT now so interwoven with business processes, Trevarthen says crippling a business by taking out its IT isn’t unrealistic – no matter what the size of the business.

“If we can get our channel community to get out there and protect New Zealand businesses, it’s good for business, but it’s also good for New Zealand.”

vGRID’s offerings include a range of outsourced IT services including virtual servers, virtual desktops and Exchange email along with backup and recovery solutions for servers and files, and a voice services platform.

“When configured for disaster recovery, a customer can power on a replicated virtual server in just a few minutes.”

Trevarthen says vGRID is constantly evolving its systems, running a three year product life cycle to ensure the most up-to-date, high performance infrastructure, with the software also being refreshed and kept up to date.

The offerings are delivered via the Kiwi reseller channel.  “Our partners are our frontline,” Trevarthen says.

“We don’t do anything our partners do – we don’t patch servers, go onsite, configure servers or liaise with the customer.

“Our job is to provide the channel with the tools they need to go to market and make big promises. Our partners need to be able to go to market and make bold claims and we enable that.

 “If we’re empowering the channel to make bold promises, and these promises resonate with the market in terms of what is important for small businesses, then we’re doing our job and providing our partners with the ability to do theirs.”

Related stories
Top stories
Story image
Tech job moves
Tech job moves - Bitdefender, Cohesity, Fortinet & MODIFI
We round up all job appointments from June 27-30, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Financial results
Margins & revenues up at New Zealand arm of Acer Computer
We look at the local financial statements of Taiwanese manufacturer Acer Computer Inc.
Story image
Robotics
Evonik relies on Getac F110 tablet to control autonomous robot
The aim of the project is to evaluate the practicality of an automated robotic maintenance and inspection solution in the chemical industry.
Story image
Design
Hands-on review: Phillips Hue starter kit
The set-up was one of the simplest I have ever had to do. It is also where the products shine. I was able to connect the bridge, the three lightbulbs and the strip within 10 min.
Story image
Revenue
Datacom announces revenue of $1.45 billion, fall in profit
Growing market pressures and border closures saw Datacom place increased focus on talent development initiatives for both existing and future employees.
Story image
Electrical
Up to $2.4 million shortfall in the collapse of IndeServe
We delve into the liquidators first report on long-standing networking service provider IndeServes collapse.
Story image
Data
MYOB improves data visibility and user access with Snowflake
"Solutions such as Snowflake allow us to better understand our customers and make evidence-based decisions on what features work best for them."
Story image
HP Inc
Firmware attacks significant threat in age of hybrid work
Changing workforce dynamics are creating new challenges for IT teams around firmware security, according to new research.
Story image
Samsung
Monitors are an excellent incentive for getting employees back
The pandemic has taught us that hybrid working is a lot easier than we would’ve thought, so how can the office be made to feel as comfortable as home? The answer could be staring you in the face right now.
Story image
Cybersecurity
Vulnerable APIs costing businesses billions every year
Large companies are particularly vulnerable to the security risks associated with exposed or unprotected APIs as they accelerate digital transformation.  
Story image
Cybersecurity
Zscaler launches co-located data centres in Canberra and Auckland
The investment will offer public and private sector enterprises greater resilience in support of their zero trust cybersecurity posture.
Story image
WatchGuard Technologies
Ransomware volume doubled 2021 total by end of Q1 2022
Ransomware detections in the first quarter of this year doubled the total volume reported for 2021, according to a new report. 
Story image
Microsoft
Digital innovation could shape the future of NZ - Microsoft
With cloud technologies available to more people around the world than ever before, it is not only businesses who will benefit from using them.
Story image
Dicker Data
EXCLUSIVE: Why women in IT makes good business sense - Dicker Data
The Federal government wants to bolster female participation in the tech industry to at least 40% by 2030. Here's how one homegrown Australian company has already reached that goal.
Story image
Web Development
Whitecliffe fosters careers for the future of tech
Do you want a career in Information Technology, Networking, Web Development, Software Development, or are you looking to upskill?
Story image
Hybrid Cloud
Advent One acquires Layer 8 Networks, complements hybrid cloud offering
The acquisition comes at a time of surging demand in hybrid cloud, network virtualisation and network security.
Story image
Entelar
How TruSens air purifiers can create healthier workspaces
The pandemic has heightened our awareness of our own and others’ health, and made us all much more conscious of the environments we work in.
Story image
Cybersecurity
Why is NZ lagging behind the world in cybersecurity?
A recent report by TUANZ has revealed that we are ranked 56th in the world when it comes to cybersecurity - a look into why we're so behind and what needs to be done.
Story image
Hybrid workforce
Why hybrid working is here to stay and how to ace it
Citrix's new report reveals hybrid workers are more productive and engaged at work than their office and completely remote counterparts.
Story image
Cybersecurity
Zero trust security adoption rises 27% in just two years
A survey of WAN managers has revealed that multi-factor authentication and single sign-on are the top zero trust features implemented.
Story image
Microsoft
SAS wins Microsoft ISV 2022 Partner of the Year award
"We formed the SAS and Microsoft strategic partnership with a shared goal of making it easier for customers to drive better decisions in the cloud."
Story image
Cryptocurrency
NOWPayments launches new service to analyse cryptocurrency fees
NOWPayments has launched a new network fee optimisation solution that analyses current network fees and picks the most profitable option out of the client's payout wallets.
Story image
Christchurch
Enable launches free Wi-Fi in Christchurch city centre
Fibre broadband provider, Enable, and the Christchurch City Council have launched their new Christchurch Free Wi-Fi service in the central city. 
Story image
New Relic
New Relic looks to observability market with new partner programme
New Relic has announced the availability of New Relic Partner Stack, an enhanced programme expanding New Relic’s commitment to partners.
Story image
Public Cloud
Public cloud services revenues top $400 billion in 2021
"For the next several years, leading cloud providers will play a critical role in helping enterprises navigate the current storms of disruption."
Story image
Cybersecurity
Unknown connections: How safe is public WiFi in Aotearoa?
If it's not your own household WiFi, then who has control of your data and is your connection actually safe?
Story image
Cyber Criminal
Identity and access: the fight is on
Blue team defenders are used to protecting our data, applications, and users with access controls and other security mechanisms, which is why attacks like this are especially challenging when they target identity and access control systems.
Story image
Infrastructure
Oracle Cloud Infrastructure expands distributed cloud services
“Distributed cloud is the next evolution of cloud computing, and provides customers with more flexibility and control in how they deploy cloud resources."
Story image
Identity and Access Management
Ping Identity named a Leader in Access Management
Ping Identity has been named a leader in the 2022 KuppingerCole Leadership Compass report for Access Management. 
Story image
BitTitan
How to achieve your monthly recurring revenue goals
Monthly recurring revenue (MRR) is the ultimate goal, the most important issue on which anyone in the IT channel should focus.
Story image
Mergers and Acquisitions
SAS acquires Kamakura to propel risk technology innovation
Underscoring SAS growth in the domain-specific solutions space, the acquisition will enable SAS to greatly enhance the breadth of its risk solutions portfolio. 
Story image
Cloudian
Cloudian, Vertica to deliver on-premise data warehouse platform
"We’re enabling our customers to capitalise on a leading object storage platform and maximise the value of their digital assets.”
Story image
Review
Hands-on review – CleanMyMac X utility for macOS
We get hands-on with a useful utility that macOS users never thought they needed but probably do.
Story image
MSP
Video: 10 Minute IT Jams - An update from CyberArk
Olly Stimpson joins us today to discuss the importance of MSP programmes and how MSP partners are experiencing success with CyberArk.
Story image
Great Resignation
New SAP study uncovers impact of 'the great resignation'
Coined in 2021, the phrase 'the great resignation' refers to millions of employees globally leaving their jobs. The phenomenon is real and impacting SMEs.
Story image
Dark web
Cybercrime in Aotearoa: How does New Zealand law define it?
‘Cybercrime’ is a term we hear all the time, but what exactly is it, and how does New Zealand define it in legal terms?
Story image
Cybersecurity
Blasé attitudes to cybersecurity by business a national risk
The largely unregulated state of cybersecurity in NZ, and consequential ambivalence of most businesses, risk hurting the country's trading prospects.
Story image
Cybersecurity
FIDO Alliance releases guidelines for optimising UX with FIDO Security Keys
The new guidelines aim to accelerate multi-factor authentication deployment and adoption with FIDO security keys.
Story image
Finance
Airwallex launches global payment services in New Zealand
The launch will enable businesses in New Zealand to tap into Airwallex's global payments services, offering an alternative to traditional banks.
Story image
Hybrid Cloud
HPE GreenLake advances hybrid cloud experience with new services
"The innovations unveiled today further build on our vision to provide the market with an unmatched platform to spur innovation and drive transformation.”
Story image
Internet of Things
ManageEngine wins big in IDC MarketScape assessment
ManageEngine's Endpoint Central service has been recognised as a leader by IDC MarketScape in several categories including Internet of Things device deployments and UEM software for SMEs.
Story image
Awards
Microsoft names A/NZ Partner of the Year award winners
The awards recognise partners across the globe for their innovative use of Microsoft technologies to help customers succeed.
Story image
Citrix
The best ways to attract young talent during labour shortages
New research from Citrix reveals hybrid working and ventures into the metaverse are top of mind for Gen Z workers.
Story image
Ransomware
Secureworks reveals new information on BRONZE STARLIGHT threat group
New research from Secureworks has uncovered new information on the Chinese threat group BRONZE STARLIGHT and how they are using targeted ransomware to initiate complicated attacks.