Backups: the last line of defense when disaster strikes
When data is lost following malicious deletion or modification, backups allow you to restore mission-critical data and avoid costly downtime. Leverage Synology’s data protection solutions to design a backup strategy for your entire IT infrastructure.
Safeguard endpoints as well as primary backups to create multiple safety nets for your data.
Reduce downtime to a minimum when disaster strikes with instant recovery options.
Back up as much data as your storage allows, without limitations or hidden fees.
Centralized protection against ransomware
Consolidate backups from fleets of workstations, servers, virtual machines, and cloud applications. Optimize storage consumption and avoid bandwidth bottlenecks with data deduplication and incremental backup technologies. Learn more
Protect endpoints in the event of malicious attacks with comprehensive bare-metal backup and flexible file-level recovery.
Back up VMware® vSphere™, Microsoft® Hyper-V® VMs, and LUNs with powerful data reduction technologies.
Enable continuous protection for data stored on the cloud, with automatic detection of newly added accounts.
Minimize downtime for critical production systems by rapidly restoring backups from a local or off-site Synology system.
Mount backup images on VMware®, Hyper-V®, or Synology Virtual Machine Manager to resume work as quickly as possible. Restore VMs to an alternative hypervisor to avoid service disruption.
Configure backup frequency according to your needs, minimizing the amount of data potentially affected during an attack. Protect systems fast thanks to incremental backups and deduplication technology.
Let employees browse and preview emails, contacts, and files from a convenient portal before restoring them, delivering a more user-friendly experience and reducing the burden on IT teams.
Add an extra layer of protection
Adhere to the 3-2-1 backup strategy by storing a third set of data off-site or on the cloud, shielding your data against fire, natural disaster, or theft.
To off-site servers
Archive data to another Synology server at a secondary location, protecting the first tier of backups from physical disaster. Learn more
To the cloud
Back up to any major cloud storage provider, keeping your data safe from unauthorized access through client-side AES-256 encryption. Learn more
Trusted across different industries
"Synology […] enabled us to reduce server hardware expenditure […] while making infrastructure and workstation backups, system logging, and file management much easier."
"Thanks to Active Backup for Business, all our backups are now centralized and available 24/7, which helps us minimize downtime and stay compliant with FERPA's regulations."
"[…] Active Backup for Business has astonishing backup speeds and works wonders on deleting duplicate data — it only took up 28 TB out of the total 58 TB on the server. […]"
"[…] Active Backup for Business […] allows us to centralize and manage all the backup tasks from a single console. Fast and reliable recovery also ensures business continuity."
Frequently Asked Questions
What is ransomware?
What types of ransomware are there?
- Encrypting ransomware — The most common type of ransomware encrypts the victim's files so that they cannot be accessed without the decryption key. Attackers then demand a ransom payment in exchange for the key
- Locker ransomware — A type of ransomware locks victims out of their computer by changing the login credentials or displaying a message that prevents the victim from accessing their system. Attackers then demand a ransom payment to unlock the computer
- Ransomware-as-a-Service (RaaS) — A business model in which attackers offer ransomware to other individuals or groups who want to carry out attacks. The former will typically provide the ransomware and handle payments, while the latter receive a percentage of the ransom payments
- Scareware — Ransomware designed to scare victims into paying the ransom. It typically involves displaying fake security warnings or messages that claim the victim's computer is infected with a virus. The attacker will then demand a ransom payment to remove the supposed infection
How does ransomware spread?
What is the typical process of a ransomware attack?
- The attacker gains access to a victim's computer, either by sending a phishing email or by exploiting a vulnerability in the system
- Once the attacker has access to the victim's computer, they will install the ransomware on the system
- The ransomware will then encrypt the victim's files, making them inaccessible to the user
- The attacker will then demand a ransom from the victim, typically in the form of a digital currency like Bitcoin, in exchange for the decryption key that will unlock the encrypted files
- If the victim pays the ransom, the attacker will provide the decryption key and the victim will be able to access their files again. However, there is no guarantee that the attacker will actually provide the key, and even if they do, the victim's files may be damaged or corrupted as a result of the encryption process
How can I get ransomware?
Who are the targets of ransomware?
What are the risks of paying ransomware?
- There is no guarantee that the attacker will actually provide the decryption key. In many cases, victims who pay the ransom never receive the key and remain unable to access their files
- Paying the ransom may encourage attackers to continue their campaign of attacks. If attackers know that victims are willing to pay the ransom, they may be more likely to carry out more attacks in the future
- Paying the ransom may make you a target for future attacks. If the attacker knows that you are willing to pay a ransom, you may be more likely to be targeted in the future
- Paying the ransom may be illegal. In some cases, paying a ransom to a criminal organization may be considered a form of funding terrorism or other illegal activities
What are the cost of ransomware?
What are the symptoms of ransomware?
- Your files are encrypted and you are unable to access them
- You receive a message from the attacker demanding a ransom payment in exchange for the decryption key
- You see unfamiliar programs or processes running on your computer
- Your computer becomes slow or unresponsive
- Your computer displays unusual error messages or pop-up windows
How to prevent ransomware attacks?
- Use reputable antivirus or security software and keep it up-to-date. This can help protect your computer from ransomware and other types of malware
- Be cautious when opening email attachments or links. Ransomware is often delivered through phishing emails, so it is important to be careful about what you click on
- Keep your operating system and other software up-to-date. Software updates often include security patches that can help protect your computer from ransomware and other threats
- Back up your files regularly. This can help protect your data if your computer is infected with ransomware. Make sure to adhere to one of the recommended backup strategies, such as the 3-2-1 backup strategy
- Be aware of the risks of ransomware and educate others in your organization about these threats. This can help prevent ransomware attacks and make it easier to detect and respond to them if they do occur
How can Synology protect me against ransomware?
- Prevent access — Reduce the spread of ransomware by setting file, application, and access permissions, and configure secure login credentials using Secure SignIn and C2 Password
- Protect devices — Outdated systems are at greater risk. Update all your NAS at once with Synology Central Management System (CMS), and safeguard other devices using group policies in Synology Directory Server and C2 Identity
- Avoid suspicious files — Spam and phishing emails containing suspicious files are common methods of spreading ransomware. Synology MailPlus provides strong anti-malware protection and spam prevention
- Check for vulnerabilities — Use Synology Security Advisor to routinely scan for malware, vulnerabilities, and abnormal login activities. Implement recommended changes to improve your NAS security. Learn more
More ways to protect your data
Manage your fleet
Leverage extensive features to centrally manage data access permissions, software status, system health, and more.
Monitor all your systems
Identify suspicious login activities, manage updates, and monitor device health, no matter where your devices are located.
IBM, Cost of a Data Breach 2022. https://www.ibm.com/reports/data-breach