Educause Security Discussion mailing list archives
Re: [EXTERNAL] Re: [SECURITY] Offline Backups for Ransomware Protection
From: Blake Brown <Blake.Brown () MHCC EDU>
Date: Thu, 26 Aug 2021 16:29:30 +0000
Great thread here. I'll elaborate a bit on our plans. For onsite backup storage we opted to go with QNAP as the price point and performance best met our needs. I now have enough onsite storage to give us a rolling 30-45 days' worth of backups. We will simultaneously dump the backups to an AWS S3>Glacier bucket for mid to long-term storage using Veeam with a final plan to move that data to an S3 Glacier Deep Archive bucket after X time. We are currently considering moving data to the S3 Glacier Deep Archive after 3 years in the Glacier bucket. For staff file recovery request the current plan is to communicate that if a file restoration needs to occur within the defined-on premise backup window no problem but if after that window charges "may" incur. This may will be use case dependent. The biggest challenge I have so far with this is identifying data retention periods for the different types of data we have. The Oregon regs are all over the place regarding data retention periods and our internal documents are scarce. So to cover the college I may choose to take the approach of "forever data" in the S3 Glacier Deep Archive bucket. Would be interested to hear of any gaps or gotchas I may have in this current plan. ~Blake ________________________________ From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU> on behalf of Kevin Cleary <kpcleary () BUFFALO EDU> Sent: Thursday, August 26, 2021 9:05 AM To: SECURITY () LISTSERV EDUCAUSE EDU <SECURITY () LISTSERV EDUCAUSE EDU> Subject: Re: [SECURITY] [EXTERNAL] Re: [SECURITY] Offline Backups for Ransomware Protection I’ll jump on with the “immutable” band wagon here. We chose to go the immutable approach as this was almost as good as air-gapped (or offline) backups but much simpler and quicker to manage and leverage during a mass-restore scenario. Through a combination of disk-based virtual tape libraries and immutable backups we found the best balance of RPO, RTO, cost and data security. We looked at the cloud storage route also but ultimately decided against this for the same RTO reasons. Under a mass restore scenario, it would take quite a while to get all of our data out. I’m also pretty sure it would cost a pretty penny as many of the cloud storage offerings are metered/charged based on data flow in and out. I’ve also heard, anecdotally, that Amazon is running short on snowball devices right now given the uptick in ransomware attacks and customers needs a fast cheap way to get their data back. -- Kevin Cleary, CISSP Interim Information Security Officer Manager, Systems Software University at Buffalo Information Technology 305 Computing Center Buffalo NY 14260-1407 Phone: 716-645-4767 From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU> On Behalf Of Frank Barton Sent: Thursday, August 26, 2021 11:54 AM To: SECURITY () LISTSERV EDUCAUSE EDU Subject: [EXTERNAL] Re: [SECURITY] Offline Backups for Ransomware Protection We looked at the ongoing cost of cloud storage, and ended up going much more old-school... LTO tapes... Once they're out of the tape robot, they are truely Air-Gapped Frank On Thu, Aug 26, 2021 at 11:40 AM Blake Brown <Blake.Brown () mhcc edu<mailto:Blake.Brown () mhcc edu>> wrote: Concur as well with using Veeam/AWS and/or Azure for offline storage. We are re-designing our entire backup infrastructure and will be deploying this model using Pure Storage Safemode and Veeam's immutable technologies to AWS. Just cannot happen quickly enough for me with all the risk out there! https://community.veeam.com/blogs-and-podcasts-57/3-2-1-1-0-golden-backup-rule-569<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcommunity.veeam.com%2Fblogs-and-podcasts-57%2F3-2-1-1-0-golden-backup-rule-569&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011476041%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=6YjtMC17Z6b%2FrLJbeQ0t0crnWgO7iiNlRlZY4lRlSp4%3D&reserved=0> https://www.veeam.com/blog/v11-immutable-backup-storage.html<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.veeam.com%2Fblog%2Fv11-immutable-backup-storage.html&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011486039%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=r93vKhJE%2F0Iw3jbIGf1eS3Dgug1Cn2b6wacJAYVWxL8%3D&reserved=0> https://blog.purestorage.com/products/protect-your-data-from-ransomware-with-safemode-snapshots/<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fblog.purestorage.com%2Fproducts%2Fprotect-your-data-from-ransomware-with-safemode-snapshots%2F&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011486039%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=ht2whnDmIOserWBQsO%2BT0n7vq%2BCGB2xDdZHlOP8SXWs%3D&reserved=0> Blake Brown Infrastructure Manager ________________________________ From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>> on behalf of Shane Kroening <skroening () QUALYS COM<mailto:skroening () QUALYS COM>> Sent: Thursday, August 26, 2021 8:23 AM To: SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU> <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>> Subject: Re: [SECURITY] Offline Backups for Ransomware Protection External Email Jeremy, I would echo John in using VEEAM and making sure your backups are digitally air-gapped from your network so in the event of a compromise or data loss it will not impact your backups. I’ve seen a lot of success using VEEAM alongside Azure for storage and I’m sure AWS or GCP could be viable options as well. Please feel free to reach out if you’d like more details. Best, Shane Kroening [signature_796095325] <https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fqualys&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011496030%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=ytIsl4EN62t%2FSF5C50%2FqNak31nHYBi86fOk7DMJxEWI%3D&reserved=0> Technical Account Manager, Pre-Sales, Central (SLED) skroening () qualys com<mailto:skroening () qualys com> 414.791.5674 Qualys, Inc. – Blog<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fqualys.com%2Fblog&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011496030%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=faood%2Bb1doiagrg1fPKSQT0gZFAOPqvKfyrAuRlfzhs%3D&reserved=0> | Community<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fcommunity.qualys.com%2F&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011506023%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=%2FXx1BaaERS3jbtLnscgQ0Pzwa57fUIEnGhkYTq4hjjo%3D&reserved=0> | Twitter<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftwitter.com%2Fqualys&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011506023%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=OiMWRIpEpPVMJ5W8JCEO%2BDM7jQDMvoEHoNUViATe6Ss%3D&reserved=0> Schedule a Call<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Foutlook.office365.com%2Fowa%2Fcalendar%2FShaneKroening%40qualys.onmicrosoft.com%2Fbookings%2F&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011516021%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=ZCYgvluzjF%2Bz6lvVJystN8MuniwQxnpuL9TLIeMv3BA%3D&reserved=0> From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>> on behalf of John Ramsey <jramsey () STUDENTCLEARINGHOUSE ORG<mailto:jramsey () STUDENTCLEARINGHOUSE ORG>> Date: Thursday, August 26, 2021 at 9:49 AM To: SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU> <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>> Subject: Re: [SECURITY] Offline Backups for Ransomware Protection We’re using a combination of AWS and VEEAM. Attached is a really good two pager on back up strategies as a best practice, it’s worth a quick read if you have a second. I think the interesting stat that is out there from Net Diligence states “ Keep offline copies. Keep offline backups of your vital data to avoid the accidental spread of malware from publicly connected infected computers. Make sure your external storage drives or cloud backups are properly disconnected from your main corporate network to prevent backups from being accessed/infected by the spread of ransomware. Cybersecurity experts have posited that in up to 80 percent of incidents, certain types of ransomware impacted both regular network/devices and the backups. Timely recovery following a successful ransomware attack is significantly impacted by the efficacy of backup and backup segregation practices. John John Ramsey, Chief Information Security Officer National Student Clearinghouse Certified: CISSP, CISM, PMP, CSSLP, CRISC, CGEIT 2300 Dulles Station Blvd., Suite 220 Herndon, VA 20171 703.742.4428 | studentclearinghouse.org<https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.studentclearinghouse.org%2F&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011516021%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=95F9%2BSinuuGu%2BficjGfmRkrDKxWLAreD7k%2FwUmUq4TY%3D&reserved=0> LinkedIn<https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fnational-student-clearinghouse&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011526013%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=2EpqmXXg4bI7jENzqQtowsiZ8FKvW6LvkKZGx1rxF%2B4%3D&reserved=0> | Twitter<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Ftwitter.com%2Fnsclearinghouse&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011526013%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=V5fy3Snz4n62%2BjBisoQPlxF09zDDfaGxDNAqaY2P6o4%3D&reserved=0> | Facebook<https://nam12.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.facebook.com%2FNSClearinghouse&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011536005%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=RlkgNTJjuNfQBIEhBqe1jTOcyUaT464Vlf3C6hpwnCw%3D&reserved=0> | Blog<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.studentclearinghouse.org%2Fnscblog%2F&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011536005%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=FpFOEnTZKjVxu2PExh1ynVRcC%2F%2B5vE6cRQOA0toERNI%3D&reserved=0> | Instagram<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.instagram.com%2FNSClearinghouse%2F&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011546006%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3lIayZve0HJpWKVHh17sFtPVgn8Mlr62EtPuDyqjs18%3D&reserved=0> Serving Education Since 1993 This message is proprietary to the National Student Clearinghouse, is intended only for the addressee and may contain confidential or privileged information. If you receive this message in error, please contact the sender and delete all copies. From: The EDUCAUSE Security Community Group Listserv <SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU>> On Behalf Of Pelegrin, Jeremy J Sent: Thursday, August 26, 2021 10:42 AM To: SECURITY () LISTSERV EDUCAUSE EDU<mailto:SECURITY () LISTSERV EDUCAUSE EDU> Subject: [SECURITY] Offline Backups for Ransomware Protection EXTERNAL MESSAGE All, As we work to improve our ransomware posture, what are others doing for offline backups for recovery? Is it a subset of systems/data only? What technologies are being used? Happy to discuss offline if preferred. All the best, Jeremy Jeremy Pelegrin, MBA (He/him/his) Interim CISO | Information Technology Tulane University | 504-988-8548 (o) | 504-444-3536 (c) Collaborate | Innovate | Deliver<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fts.tulane.edu%2F&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011546006%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=41ccWQhWQ7nRWMDq80EkffSc5NtXv5uGPvg6SgjZX4Q%3D&reserved=0> ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011546006%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=o0cS0w9iWRqAFI25p4KyqZfZAJC62v3AKWwYC3f6gWw%3D&reserved=0> ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011555998%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3rEGFKBjDEFOzyxi03XIn2Ulimc31PQLHu0oxzgUgjs%3D&reserved=0> [Image removed by sender.]<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.qualys.com%2Femail-banner&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011555998%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=6wCzI%2BEeOCs8mZm1PW18%2BWekTZLw5u7d2Pq%2FKl5AXPM%3D&reserved=0> This message may contain confidential and privileged information. If it has been sent to you in error, please reply to advise the sender of the error and then immediately delete it. If you are not the intended recipient, do not read, copy, disclose or otherwise use this message. The sender disclaims any liability for such unauthorized use. NOTE that all incoming emails sent to Qualys email accounts will be archived and may be scanned by us and/or by external service providers to detect and prevent threats to our systems, investigate illegal or inappropriate behavior, and/or eliminate unsolicited promotional emails (“spam”). If you have any concerns about this process, please contact us. ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011565991%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=LD%2BYWdjizrA7eLESSBT4tw5w6jhyWOP93cWU9imUfG0%3D&reserved=0> ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011565991%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=LD%2BYWdjizrA7eLESSBT4tw5w6jhyWOP93cWU9imUfG0%3D&reserved=0> -- Frank Barton, MBA Security+, ACMT, MCP IT Systems & InfoSec Administrator Husson University PGP Key Fingerprint: 0249DC644EC78D2F6B5CD2C6C94D3EDB57946437 (He/Him/His) ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community<https://nam12.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.educause.edu%2Fcommunity&data=04%7C01%7Ckpcleary%40buffalo.edu%7C7710679d5f23422edfd108d968a9d1ab%7C96464a8af8ed40b199e25f6b50a20250%7C0%7C0%7C637655901011575989%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=8TbC2htlJBnI0M9ykqXyMHSo2pSHTLwxg1X%2FuV1ozzA%3D&reserved=0> ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community ********** Replies to EDUCAUSE Community Group emails are sent to the entire community list. If you want to reply only to the person who sent the message, copy and paste their email address and forward the email reply. Additional participation and subscription information can be found at https://www.educause.edu/community
Current thread:
- Offline Backups for Ransomware Protection Pelegrin, Jeremy J (Aug 26)
- Re: Offline Backups for Ransomware Protection John Ramsey (Aug 26)
- Re: Offline Backups for Ransomware Protection Shane Kroening (Aug 26)
- Re: Offline Backups for Ransomware Protection Blake Brown (Aug 26)
- Re: Offline Backups for Ransomware Protection Frank Barton (Aug 26)
- Re: [EXTERNAL] Re: [SECURITY] Offline Backups for Ransomware Protection Kevin Cleary (Aug 26)
- Re: [EXTERNAL] Re: [SECURITY] Offline Backups for Ransomware Protection Blake Brown (Aug 26)
- Re: Offline Backups for Ransomware Protection Shane Kroening (Aug 26)
- Re: Offline Backups for Ransomware Protection John Ramsey (Aug 26)
- Re: [EXTERNAL]Re: [SECURITY] Offline Backups for Ransomware Protection Holley, Brian (Aug 26)
- Re: [EXTERNAL]Re: [SECURITY] Offline Backups for Ransomware Protection McCain, Alan (Sep 20)