Centralized protection against ransomware
Consolidate backups from fleets of workstations, servers, virtual machines, and cloud applications. Optimize storage consumption and avoid bandwidth bottlenecks with data deduplication and incremental backup technologies. Learn more
Protect endpoints in the event of malicious attacks with comprehensive bare-metal backup and flexible file-level recovery.
Back up VMware® vSphere™, Microsoft® Hyper-V® VMs, and LUNs with powerful data reduction technologies.
Enable continuous protection for data stored on the cloud with automatic detection of newly added accounts.
Minimize downtime for critical production systems by rapidly restoring backups from a local or offsite Synology system.
Mount backup images on VMware®, Hyper-V®, or Synology Virtual Machine Manager to resume work as quickly as possible. Restore VMs to an alternative hypervisor to avoid service disruption.
Configure backup frequency according to your needs, minimizing the amount of data potentially affected during an attack. Protect systems rapidly thanks to incremental backups and deduplication technology.
Let employees browse and preview emails, contacts, and files from a convenient portal before restoring them, delivering a more user-friendly experience and reducing the burden on IT teams.
Trusted across industries
"Synology … enabled us to reduce server hardware expenditure … while making infrastructure and workstation backups, system logging, and file management much easier."
"Thanks to Active Backup for Business, all our backups are now centralized and available 24/7, which helps us minimize downtime and stay compliant with FERPA's regulations."
". . . Active Backup for Business has astonishing backup speeds and works wonders on deleting duplicate data — it only took up 28 TB out of the total 58 TB on the server. . . ."
". . . Active Backup for Business . . . allows us to centralize and manage all the backup tasks from a single console. Fast and reliable recovery also ensures business continuity."
Frequently Asked Questions
What is ransomware?
What types of ransomware are there?
- Encrypting ransomware — the most common type of ransomware encrypts the victim's files so that they cannot be accessed without the decryption key. Attackers then demand a ransom payment in exchange for the key.
- Locker ransomware — a type of ransomware that locks victims out of their computer by changing the login credentials or displaying an error message that prevents the victim from accessing their system. Attackers then demand a ransom payment to unlock the computer.
- Ransomware-as-a-Service (RaaS) — a business model in which attackers offer ransomware to other individuals or groups who want to carry out attacks. The former will typically provide the ransomware and handle payments while the latter receive a percentage of the ransom payments.
- Scareware — ransomware designed to scare victims into paying the ransom. It typically involves fake security warnings or error messages that claim the victim's computer is infected with a virus. The attacker will then demand a ransom payment to remove the supposed infection.
How does ransomware spread?
What is the typical process of a ransomware attack?
- The attacker gains access to a victim's computer, either by sending a phishing email or by exploiting a vulnerability in the system.
- Once the attacker has access to the victim's computer, they will install the ransomware on the system.
- The ransomware will then encrypt the victim's files, making them inaccessible to the user.
- The attacker will then demand a ransom from the victim, typically in the form of a digital currency like Bitcoin, in exchange for the decryption key that will unlock the encrypted files.
- If the victim pays the ransom, the attacker will provide the decryption key and the victim will be able to access their files again. However, there is no guarantee that the attacker will actually provide the key, and even if they do, the victim's files may be damaged or corrupted as a result of the encryption process.
How can I get ransomware?
Who are the targets of ransomware?
What are the risks of paying ransomware?
- There is no guarantee that the attacker will actually provide the decryption key. In many cases, victims who pay the ransom never receive the key and remain unable to access their files.
- Paying the ransom may make you a target for future attacks. If the attacker knows that you are willing to pay a ransom, you may be more likely to be targeted in the future.
- Paying the ransom may be illegal. In some cases, paying a ransom to a criminal organization may be considered a form of funding terrorism or other illegal activities.
What are the cost of ransomware?
What are the symptoms of ransomware?
- Your files are encrypted and you are unable to access them.
- You receive a message from the attacker demanding a ransom payment in exchange for the decryption key.
- You see unfamiliar programs or processes running on your computer.
- Your computer becomes slow or unresponsive.
- Your computer displays unusual error messages or pop-up windows.
How to prevent ransomware attacks?
- Use reputable antivirus or security software and keep it up to date. This can help protect your computer from ransomware and other types of malware.
- Be cautious when opening email attachments or links. Ransomware is often delivered through phishing emails so it is important to be careful about what you click.
- Keep your operating system and other software up to date. Software updates often include security patches that can help protect your computer from ransomware and other threats.
- Back up your files regularly. This can help protect your data if your computer is infected with ransomware. Be sure to adhere to one of the recommended backup strategies such as the 3-2-1 backup strategy.
- Be aware of the risks of ransomware and educate others in your organization about these threats. This can help prevent ransomware attacks and make it easier to detect and respond to them if they do occur.
How can Synology protect me against ransomware?
- Prevent access — reduce the spread of ransomware by setting file, application, and access permissions, and configure secure login credentials using Secure SignIn and C2 Password.
- Protect devices — outdated systems are at greater risk. Update all your NAS at once with Synology Central Management System (CMS), and safeguard other devices using group policies in Synology Directory Server and C2 Identity.
- Avoid suspicious files — spam and phishing emails containing suspicious files are common methods of spreading ransomware. Synology MailPlus provides strong anti-malware protection and spam prevention.
- Check for vulnerabilities — use Synology Security Advisor to routinely scan for malware, vulnerabilities, and abnormal login activities. Implement recommended changes to improve your NAS security. Learn more.
eSentire, 2022 Official Cybercrime Report https://www.esentire.com/resources/library/2022-official-cybercrime-report