A cautionary tale; Many many years ago we faithfully backed up a server using Backup Exec, used many tapes over months, then one day we needed to restore. Unfortunately no one had ever tested the backups, Backup Exec had been misconfigured and there was no way to restore, all the tapes were useless.
So in addition to implementing a good Backup plan, be sure to test your Backup plan, if you can't restore it's not much of a Backup plan.
point. I test my backup cloned HDD after I complete the cloning process by installing it in my Desktop PC (via SATA hot-swap racks) to insure that it's a complete spare bootable HDD.
After reading about this ransomware stuff, I stepped up my backup plan by imaging (full-disk mode) and testing the images with the recovery process from bootable "Rescue" CD's.
I've been using Acronis 2011 for a couple of years, cloning every 4 weeks with the cloned HDD on the shelf, always disconnected from my PC.
I also use the overnight incremental scheduler with Acronis to back up those handful of frequently-edited/changed items, such at my Outlook *.PST data file, Quicken data file, and a few excel files. Those items are also copied to a Flash Stick and another external HDD that's disconnected from the PC except when I run my "copy file" script.
I recently began using "Marcium Reflect" Free to image (full-disk) occasionally and test the images with the Recovery CD.
I have 2 spare HDD's on the shelf with one as my 4-week cloned HDD and the other for testing recovered images.
I'm running Norton AV alongside MBAM Pro (MalwareBytes) on both PC's, Desktop & Laptop.
I'm probably overdoing the backup scene but I'm lazy , having once, years ago, had to do a disk wipe and re-install the OS and recover. I did have my must-have items backed up though.
However, I don't like spending time reloading a HDD, OS.
Hopefully all this money goes into their lawyer fee when the feds catch up with them
this is the only ransomware i fear (just the loss of data)
If I could, I'd throw away the key