How Sydney Backups protects against data loss due to Ransomware

With sophisticated malware attacks on the rise it has never been more important to have a reliable and secure offsite backup solution that not only protects your valuable data, but also the backups. It sounds confusing, but new ransomware viruses are getting smarter and have learned how to compromise ordinary backup files, leaving you in a tough situation with no ability to recover.


Working Backup

Establishes a functional, encrypted and automated full system backup

Replicate to Secure Cloud

Incremental hourly replication to Sydney Backups secured cloud infrastructure

Secured Cloud

Data on the cloud is isolated and protected from Ransomware’s reach

Back in Business

Within 24 hours, cloud backup is delivered and recovered successfully


When ransomware strikes, the only way to recover your data is to turn to your backups, but unfortunately, too often this becomes an issue.

  • You never had backups – didn’t think you need them or you didn’t have the expertise to implement them
  • You had backups setup some time ago, but then realised they haven’t worked for a while
  • You had backups and they work as intended, but the restore is crashing or corrupted
  • You had backups and they, but they are consumed by Ransomware as well


With Sydney Backups, you can forget about backups, we make sure your data is there when you need it the most.

  • We setup, configure and monitor your cloud backups 24/7
  • We backup hourly to 2 separate secure locations
  • We verify every incremental backup file and test recovery on regular basis
  • We use military grade encryption and firewalls to protect your cloud backups
  • We send daily backup email reports
  • We are always available to assist with a restore or disaster recovery

No one cares about backups until you need to restore.

What is Ransomware and how it works?

Ransomware is a type of malware that prevents the user from accessing their system or data in some form and demands payment to restore the access. Malware in the form of trojans can enter a system via downloaded file, email attachment, or any other vulnerability that allows access to the system.

Most popular ways of distribution in Australia is via email links or attachments. Such emails pretend to come from legitimate service providers such as Australia Post, FedEx, Australian Federal Police, Medicare and other Government agencies. Emails are crafted to look very real to lure recipient on clicking the link or to download an attachment.

Once ransomware is in your system, the following occurs:

  1. It infects Windows system files to prevent access to Desktop – in some cases this stage does not occur
  2. It encrypts all local files and documents making them completely unusable
  3. Searches through the local network for any server, user and backup file shares it could encrypt and/or infect
  4. Displays a ransom note on user computer requesting payment to release the files
  5. You are required to pay in Bitcoins (cryptocurrency)

Files are encrypted with a private key which is uncrackable and without the ransom payment, there is no other way to recover files. Having secure cloud backups is the only way to recover the data.