F5F Stay Refreshed Software Operating Systems Using BitLocker safeguards your data by encrypting it, reducing risks from ransomware attacks.

Using BitLocker safeguards your data by encrypting it, reducing risks from ransomware attacks.

Using BitLocker safeguards your data by encrypting it, reducing risks from ransomware attacks.

S
simonsalbin
Junior Member
15
10-25-2023, 12:04 AM
#1
Hi! Your servers are set up for reliable backups and protection against ransomware. Disk encryption like BitLocker secures data at rest, making it unreadable even if someone gains physical access or copies the drive. However, if an attacker manages to bypass the encryption, they could still extract the data. It’s best to combine encryption with strong access controls and regular backups for added safety.
S
simonsalbin
10-25-2023, 12:04 AM #1

Hi! Your servers are set up for reliable backups and protection against ransomware. Disk encryption like BitLocker secures data at rest, making it unreadable even if someone gains physical access or copies the drive. However, if an attacker manages to bypass the encryption, they could still extract the data. It’s best to combine encryption with strong access controls and regular backups for added safety.

G
GamenMetLeviNL
Senior Member
638
10-25-2023, 01:00 AM
#2
Some are capable of breaking it with sufficient processing power.
G
GamenMetLeviNL
10-25-2023, 01:00 AM #2

Some are capable of breaking it with sufficient processing power.

C
Chatter
Member
143
10-28-2023, 02:30 PM
#3
I observe three potential directions: The attacker gains control of the server itself—this could be the simplest path for recovery and data release, since access is already available through the operating system. The attacker obtains entry into a client connected via network storage—possibly straightforward to duplicate files the user has permission to view, as they remain reachable through the OS. The attacker exploits a network weakness to compromise the server—this seems like the least damaging option, assuming files are encrypted for non-share members.
C
Chatter
10-28-2023, 02:30 PM #3

I observe three potential directions: The attacker gains control of the server itself—this could be the simplest path for recovery and data release, since access is already available through the operating system. The attacker obtains entry into a client connected via network storage—possibly straightforward to duplicate files the user has permission to view, as they remain reachable through the OS. The attacker exploits a network weakness to compromise the server—this seems like the least damaging option, assuming files are encrypted for non-share members.

T
TIMidator75
Junior Member
38
10-28-2023, 04:19 PM
#4
Full disk encryption secures data when stored. This means even if you take a disk from your server, it remains unreadable on your personal computer. While the server operates, Windows and applications can still access file contents, with encryption and decryption happening seamlessly. Malware running there could read any available information.
T
TIMidator75
10-28-2023, 04:19 PM #4

Full disk encryption secures data when stored. This means even if you take a disk from your server, it remains unreadable on your personal computer. While the server operates, Windows and applications can still access file contents, with encryption and decryption happening seamlessly. Malware running there could read any available information.

O
OhMyOry
Junior Member
15
10-29-2023, 09:19 PM
#5
It's not practical to try to guess a BitLocker recovery password through brute force. If attackers care about more than just the ransom, they'll likely choose other methods. Option two appears most probable since users often act carelessly. A sysadmin should focus on reducing risk and limiting damage if this occurs. Implementing strong email policies is a solid first step, especially when you manage your own email system.
O
OhMyOry
10-29-2023, 09:19 PM #5

It's not practical to try to guess a BitLocker recovery password through brute force. If attackers care about more than just the ransom, they'll likely choose other methods. Option two appears most probable since users often act carelessly. A sysadmin should focus on reducing risk and limiting damage if this occurs. Implementing strong email policies is a solid first step, especially when you manage your own email system.

E
eth_mine
Member
53
10-31-2023, 01:34 PM
#6
Consider measures beyond basic infection prevention to protect your data from potential threats.
E
eth_mine
10-31-2023, 01:34 PM #6

Consider measures beyond basic infection prevention to protect your data from potential threats.

I
Im_Big_Al_YT_
Member
152
10-31-2023, 05:11 PM
#7
I think the safest approach is to separate the data physically and link it only when required. Or store it on another system needing different login details. You could also implement a manual encryption process where you decrypt before use and re-encrypt after changes. Both options aren't very easy to set up. I'm not sure about automating this well while staying secure. If you need help, you might want to check the discussion here: https://security.stackexchange.com/
I
Im_Big_Al_YT_
10-31-2023, 05:11 PM #7

I think the safest approach is to separate the data physically and link it only when required. Or store it on another system needing different login details. You could also implement a manual encryption process where you decrypt before use and re-encrypt after changes. Both options aren't very easy to set up. I'm not sure about automating this well while staying secure. If you need help, you might want to check the discussion here: https://security.stackexchange.com/

C
CRAZYMAN4590
Member
164
10-31-2023, 08:25 PM
#8
Consider that ransomware will lock all information, regardless of whether it can access it. Files protected by encryption will use its own method. The best way to deal with ransomware is to maintain hourly backups (including the ability to restore earlier versions) on a separate external server that is shielded from such threats. Combine this with daily offline copies. In the event of an attack, you’d likely lose only a day’s work if the backups weren’t safeguarded correctly. The main challenge afterward is recovering data that has been stolen. Beyond that, consulting a security professional is essential to assess your situation and recommend solutions based on your available resources. We’re not certified experts here. For personal use, it’s wise to keep backups offline and enable Windows File History on a NAS. This allows you to revert if data gets encrypted. If the NAS fails, your offline copies remain safe. You can also activate Windows Defender Personal folder protection to restrict access from unauthorized apps, or configure your system settings to block non-essential applications from launching unless they’re from the official store. This ensures current software runs smoothly while future updates must come from the authorized sources. Please remember, these suggestions are general guidance and should be used at your own risk.
C
CRAZYMAN4590
10-31-2023, 08:25 PM #8

Consider that ransomware will lock all information, regardless of whether it can access it. Files protected by encryption will use its own method. The best way to deal with ransomware is to maintain hourly backups (including the ability to restore earlier versions) on a separate external server that is shielded from such threats. Combine this with daily offline copies. In the event of an attack, you’d likely lose only a day’s work if the backups weren’t safeguarded correctly. The main challenge afterward is recovering data that has been stolen. Beyond that, consulting a security professional is essential to assess your situation and recommend solutions based on your available resources. We’re not certified experts here. For personal use, it’s wise to keep backups offline and enable Windows File History on a NAS. This allows you to revert if data gets encrypted. If the NAS fails, your offline copies remain safe. You can also activate Windows Defender Personal folder protection to restrict access from unauthorized apps, or configure your system settings to block non-essential applications from launching unless they’re from the official store. This ensures current software runs smoothly while future updates must come from the authorized sources. Please remember, these suggestions are general guidance and should be used at your own risk.

S
sarg182298
Junior Member
45
11-02-2023, 04:21 AM
#9
It's a company setup I'm working with. I'm considering using encryption via certificates or keys that are installed on users after logging into our AD. I'm still testing it, but in theory, if someone has access to the files but isn't logged in our domain, they wouldn't have the decryption key, keeping data secure even if moved outside our network. Thanks for your feedback so far.
S
sarg182298
11-02-2023, 04:21 AM #9

It's a company setup I'm working with. I'm considering using encryption via certificates or keys that are installed on users after logging into our AD. I'm still testing it, but in theory, if someone has access to the files but isn't logged in our domain, they wouldn't have the decryption key, keeping data secure even if moved outside our network. Thanks for your feedback so far.