{"id":127429,"date":"2023-04-27T09:00:00","date_gmt":"2023-04-27T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=127429"},"modified":"2023-07-21T14:30:13","modified_gmt":"2023-07-21T21:30:13","slug":"why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/","title":{"rendered":"Why you should practice rollbacks to prevent data loss in a ransomware attack"},"content":{"rendered":"\n

The security community is continuously changing, growing, and learning from each other to better position the world against cyberthreats. In the latest post of our Community Voices blog series, Microsoft Security<\/a><\/em><\/em> Senior Product Marketing Manager <\/em>Brooke Lynn Weenig<\/em><\/a> talks with<\/em> Tanya Janca<\/em><\/a>, Founder and Chief Executive Officer (CEO) of We Hack Purple, who is known as SheHacksPurple and is the best-selling author of <\/em>Alice and Bob Learn Application Security.<\/em> The thoughts below reflect Tanya’s views, not the views of Tanya’s employer or Microsoft, and are not legal advice.<\/em> In this blog post, Tanya talks about how to address ransomware attacks and the importance of security in development.<\/em><\/p>\n\n\n\n

Brooke: You are known as SheHacksPurple. How did you become interested in hacking?<\/strong><\/p>\n\n\n\n

Tanya<\/strong>: I started coding as a teenager. Both of my aunts and three of my uncles are computer scientists, so learning to code did not seem out of place. I thought, \u201cEvery woman codes. Isn\u2019t that the way?\u201d<\/p>\n\n\n\n

At college, I studied computer science and then was a software developer until around 2015, when I switched full time to security. I became more obsessed with security and software during my last two years in software development. I wanted to fix the bug and work with the penetration tester. I hustled my security team where I worked and after a year, one of them said, \u201cWe are posting a job for a security person and the job is for you. It was never for anyone else.\u201d I joined that team.<\/p>\n\n\n\n

I started speaking at conferences because you get in free, and when working for the federal government, they did not have a ton of money to fly me to another country for some cool training as part of a conference. I started getting plane tickets sent from all around the world and I flew everywhere.<\/p>\n\n\n\n

Microsoft reached out and said, \u201cWe want to hire a developer advocate who understands security,\u201d and I said, \u201cIs this a prank call? Come on, that\u2019s not a real job. You don\u2019t get paid to do my hobby.\u201d And they are like, \u201cYes, you do.\u201d<\/p>\n\n\n\n

Brooke: How valuable are information security certifications or any other certifications?<\/strong><\/p>\n\n\n\n

Tanya<\/strong>: Certifications have value depending on where you are in your career and the types of jobs you are looking for. There are not many application security certifications. There is one from my company, We Hack Purple. It is not widely recognized.<\/p>\n\n\n\n

If you want a specific type of job, studying for a certification will teach you a lot. If you are new in your career, it shows evidence that you know something. One of the problems when you get a job in information security is that there is no clear career path and the people hiring you do not have the technical expertise to know what to ask you.<\/p>\n\n\n\n

I have no certifications except for the ones from We Hack Purple. I have a college diploma and I took courses from the University of Maryland. The work I got was based on experience and mentors vouching for me. When people ask \u201cShould I get one?\u201d I say that if you have an active GitHub where you find bugs and fix all of them, that is evidence of skill. Sometimes, a certification helps with that, but they are not all created equal, and it costs a lot of money.<\/p>\n\n\n\n

Brooke<\/strong>: What can companies do to protect themselves from ransomware attacks<\/strong>?<\/p>\n\n\n\n

Tanya<\/strong>: Every IT department, even if you are not afraid of ransomware, should do backups and practice rollbacks. I worked somewhere once, and we had a glitch where 2,000 people lost all their work for the day. We still had copies of everything from the day before on our local machines, but a backup had not been done the night before. The backup team said it would take a month to replace that one day of work. And they said, \u201cWe don\u2019t even know if it will work and it will copy over everything you have done in the meantime, so let\u2019s not bother.\u201d<\/p>\n\n\n\n

I said to my boss, \u201cWe are going to save so much money because clearly we do not need them. They never practice the backup. Think of how many more developers we can hire.\u201d Doing backups is good, but even better is practicing rollbacks so you can roll back in a reasonable amount of time and roll back more than just files. We need to roll back everything.<\/p>\n\n\n\n

At We Hack Purple, we back up my machine in a special backup that no one else is in because I\u2019m the CEO and I create most of the content. We also have a backup in the cloud and another physical backup in a different location that we do every week. If ransomware happens, I have everything backed up. There are companies that get hit with ransomware and just think, \u201cGo away\u201d and then they just roll everything back in an hour.<\/p>\n\n\n\n

It is important to ensure that your backups are not attached to your network. Everyone has their fancy backup drive still connected to their computer and the ransomware is like \u201cExcellent. I shall now encrypt your backup.\u201d<\/p>\n\n\n\n

About 60 percent of small businesses go out of business in the month after a cyberattack.1<\/sup> Because we are such a small company, if we lose one of our people, that is a huge enough risk. But imagine we lose all their work. That is even worse.<\/p>\n\n\n\n

Brooke: How can tech leaders limit the frequency and severity of a ransomware attack?<\/strong><\/p>\n\n\n\n

Tanya<\/strong>: Get training for your company on what ransomware looks like and how to defend yourselves. For instance, do not save to your local computer. Save to the cloud like everyone else. You can download local copies to your machine but emphasize what it is like to lose your work and how bad it would be.<\/p>\n\n\n\n

I am getting everyone to turn on multifactor authentication<\/a> because it is extra defense and could block an attack from being successful. I am a huge fan of password managers. At my company, everyone must use a password manager. They make up unique, long, and random passwords that human beings would never guess, and that computers have trouble guessing.<\/p>\n\n\n\n

Helping employees protect themselves in their private life gives them even more practice using the password manager.<\/p>\n\n\n\n

Brooke<\/strong>: At what part of a development cycle does security come in?<\/strong><\/p>\n\n\n\n

Tanya<\/strong>: We used to bring security in at the end and they would do a penetration test and it would be like shooting fish in a barrel. They would tell you all the things you have done wrong, but because it is close to go-time, they would fix one or two things, put a big bandage on it, and send it out the door.<\/p>\n\n\n\n

For a long time, I would give conference talks, write blog articles, and say, \u201cWe need to shift security left,\u201d and by left, I mean earlier in the system development lifecycle. It is cheaper, faster, and easier to fix security problems there, whether it be a design flaw or a security bug. But marketing teams got a hold of that and there are all sorts of products that have the word \u201cshift\u201d in the name. What they meant is buy our product, put it in your continuous integration\/continuous deployment (CI\/CD) pipeline, and all your dreams will come true. The term got co-opted.<\/p>\n\n\n\n

Brooke: If you could impact one thing in security, what would it be and why?<\/strong><\/p>\n\n\n\n

Tanya<\/strong>: On a professional level, it would be that more universities and colleges start teaching secure coding. If they are going to work in information security, one of the classes should be about application security. I wrote my book \u201cAlice and Bob Learn Application Security\u201d hoping universities would teach it and they only want to teach it in cybersecurity programs. I am happy about that, but 100 percent of them refused to teach it to the computer science students and I said, \u201cBut they are the ones making all the bad code.\u201d<\/p>\n\n\n\n

On a personal level, I want information security to be inclusive of everyone. I want all the LGBTQIA people to show up. I want all the women to show up. I want people of every race and religion to show up. I want disabled people to show up. Everyone can contribute effectively, but there must be space for them.<\/p>\n\n\n\n

Learn more<\/h2>\n\n\n\n

If you\u2019re attending the RSA Conference, do not miss Tanya\u2019s sessions<\/a>: \u201cAdding SAST to CI\/CD, without losing any friends\u201d on April 26, 2023, \u201cDevSecOps worst practices\u201d on April 27, 2023, and \u201cCreating a great DevSecOps culture\u201d on April 27, 2023. And to learn more about Microsoft’s DevSecOps and shift left security solutions, visit the DevSecOps tools and DevSecOps services<\/a> and Microsoft Defender for DevOps<\/a> pages.<\/p>\n\n\n\n

Learn more about general data security<\/a> from Microsoft.<\/p>\n\n\n\n

To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (Microsoft Security<\/a>) and Twitter (@MSFTSecurity<\/a>) for the latest news and updates on cybersecurity.<\/p>\n\n\n\n


\n\n\n\n

1<\/sup>60 Percent of Companies Fail in 6 Months Because of This (It’s Not What You Think)<\/a>, Thomas Koulopoulos. May 11, 2017.<\/p>\n","protected":false},"excerpt":{"rendered":"

Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, shares insights on application security and offers strategies to protect against data loss from ransomware attacks.<\/p>\n","protected":false},"author":162,"featured_media":127496,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3659],"topic":[3684],"products":[3690],"threat-intelligence":[],"tags":[3802,3809],"coauthors":[3186,2529],"yoast_head":"\nProtect against data loss in ransomware attack | Microsoft Security Blog<\/title>\n<meta name=\"description\" content=\"Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, talks with Microsoft about protecting against data loss from ransomware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect against data loss in ransomware attack | Microsoft Security Blog\" \/>\n<meta property=\"og:description\" content=\"Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, talks with Microsoft about protecting against data loss from ransomware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-21T21:30:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brooke Lynn Weenig, Tanya Janca\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brooke Lynn Weenig, Tanya Janca\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/brooke-lynne-weenig\/\",\"@type\":\"Person\",\"@name\":\"Brooke Lynn Weenig\"},{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/tanya-janca\/\",\"@type\":\"Person\",\"@name\":\"Tanya Janca\"}],\"headline\":\"Why you should practice rollbacks to prevent data loss in a ransomware attack\",\"datePublished\":\"2023-04-27T16:00:00+00:00\",\"dateModified\":\"2023-07-21T21:30:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/\"},\"wordCount\":1569,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg\",\"keywords\":[\"Ransomware\",\"Security strategies\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/\",\"name\":\"Protect against data loss in ransomware attack | Microsoft Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg\",\"datePublished\":\"2023-04-27T16:00:00+00:00\",\"dateModified\":\"2023-07-21T21:30:13+00:00\",\"description\":\"Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, talks with Microsoft about protecting against data loss from ransomware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg\",\"width\":800,\"height\":533,\"caption\":\"Practitioner and chief information security officer collaborating in a security war room.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why you should practice rollbacks to prevent data loss in a ransomware attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"name\":\"Microsoft Security Blog\",\"description\":\"Expert coverage of cybersecurity topics\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization\",\"name\":\"Microsoft Security Blog\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Security Blog\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect against data loss in ransomware attack | Microsoft Security Blog","description":"Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, talks with Microsoft about protecting against data loss from ransomware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/","og_locale":"en_US","og_type":"article","og_title":"Protect against data loss in ransomware attack | Microsoft Security Blog","og_description":"Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, talks with Microsoft about protecting against data loss from ransomware.","og_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/","og_site_name":"Microsoft Security Blog","article_published_time":"2023-04-27T16:00:00+00:00","article_modified_time":"2023-07-21T21:30:13+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg","type":"image\/jpeg"}],"author":"Brooke Lynn Weenig, Tanya Janca","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg","twitter_misc":{"Written by":"Brooke Lynn Weenig, Tanya Janca","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/brooke-lynne-weenig\/","@type":"Person","@name":"Brooke Lynn Weenig"},{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/author\/tanya-janca\/","@type":"Person","@name":"Tanya Janca"}],"headline":"Why you should practice rollbacks to prevent data loss in a ransomware attack","datePublished":"2023-04-27T16:00:00+00:00","dateModified":"2023-07-21T21:30:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/"},"wordCount":1569,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg","keywords":["Ransomware","Security strategies"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/","name":"Protect against data loss in ransomware attack | Microsoft Security Blog","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg","datePublished":"2023-04-27T16:00:00+00:00","dateModified":"2023-07-21T21:30:13+00:00","description":"Tanya Janca, Founder and Chief Executive Officer of We Hack Purple, talks with Microsoft about protecting against data loss from ransomware.","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/04\/CLO22_SecOps_005-1.jpg","width":800,"height":533,"caption":"Practitioner and chief information security officer collaborating in a security war room."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/27\/why-you-should-practice-rollbacks-to-prevent-data-loss-in-a-ransomware-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/"},{"@type":"ListItem","position":2,"name":"Why you should practice rollbacks to prevent data loss in a ransomware attack"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","name":"Microsoft Security Blog","description":"Expert coverage of cybersecurity topics","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#organization","name":"Microsoft Security Blog","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2018\/08\/cropped-cropped-microsoft_logo_element.png","width":512,"height":512,"caption":"Microsoft Security Blog"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/#\/schema\/logo\/image\/"}}]}},"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Security Blog","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/security\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127429"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/comments?post=127429"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127429\/revisions"}],"predecessor-version":[{"id":132201,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/posts\/127429\/revisions\/132201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media\/127496"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/media?parent=127429"}],"wp:term":[{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/content-type?post=127429"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/topic?post=127429"},{"taxonomy":"products","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/products?post=127429"},{"taxonomy":"threat-intelligence","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/threat-intelligence?post=127429"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/tags?post=127429"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-json\/wp\/v2\/coauthors?post=127429"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}