Mozy backup is for solopreneurs

Are you a solopreneur?

If you are a one-person business—or “solopreneur”—then Mozy online backup is for you. (And for anyone else who wants to protect their files with the least amount of hassle.)

A recent article in Inc. emphasizes that solopreneurs enjoy the flexibility of working for themselves. For example, they can ply their trade just about anywhere and at any time. It’s their show. However, because they work for themselves, they are usually under pressure to be productive all the time. In a one-person business the show does not go on unless the solopreneur is making it happen.

When you work for yourself, you need to make the most of your time and take advantage of tools to help you do that. Here’s what author Minda Zetlin says about Mozy online backup:

“What would happen if the ceiling caved in on your desktop computer? Would you lose valuable data, setting your business back? If you want to stop being vulnerable, you need an off-site backup system, and an automatic cloud-based one is by far the easiest,” Zetlin says.

“I’ve used Mozy for years, and though I’ve never had a computer disaster, I’ve used it many times to grab files I needed when I was away from home—another handy feature,” she says.

Mozy lets solopreneurs schedule backups to run daily, weekly, or monthly—it’s your choice. In fact, Mozy is the perfect data protection tool for solopreneurs because it offers automatic backup protection with the option to schedule backups continuously throughout the day. When you’re a solopreneur, you have plenty of things to worry about; protecting your business-critical files shouldn’t be one of them.

Read the Inc. article 7 Business Tools that Are Perfect for Solopreneurs for more tips on how to make the most of your time and make running your business easier.

Whether you’re a solopreneur or an enterprise with 100,000 employees, your files are important. And because they’re important to you, they’re important to Mozy by Dell. Be sure to check out how Mozy lets you access your files not just from your computer, but your smartphone or tablet as well.

It’s the downtime in ransomware that might do the most damage


Ransomware continues to make headlines. Unfortunately, notwithstanding all the news, there are businesses that are still not adequately protecting their data and, as a result, fall victim to ransomware. But even if a business does regain access to its data after paying that Bitcoin ransom, it has no doubt suffered downtime. Perhaps not surprisingly, downtime from ransomware can be more damaging to small businesses than the ransom itself, as reported by in a recent online article.

50 percent of organizations have been hit by ransomware

One of the misleading aspects of ransomware is the small amount of ransom that’s demanded by cybercriminals. The average ransom demand is less than $700. Yes, we read about how cybercriminals collected $1 billion last year via ransomware exploits, but that’s the result of many thousands of successful ransomware outbreaks. When you consider that 50 percent of organizations have been hit by ransomware, it’s easy to understand how thousands and thousands of collected ransoms add up for cybercriminals.

Much of that is the result of spam, in particular through malicious attachments in email that are opened by the unwary. In these cases, a user is directed to open an email attachment or visit a website where the ransomware is presented, masquerading as a legitimate attachment or download. From there the virus spreads, ultimately gaining control of systems—and valuable files.

Ransomware doesn’t have to be perfect

Who knows whether ransomware will ever be perfected? Probably not. But it doesn’t have to be. The goal of the cybercrimninal is a blanket approach: target as many would-be victims as possible and hope that even a small percentage open that malicious attachment.

As we’ve already learned, thousands of small successes can quickly add up to $1 billion.

The ransom isn’t necessarily the most damaging

“Ransomware wasn’t necessarily the most expensive aspect of a ransomware attack: downtime, revenue loss, and fallout were more expensive and far more damaging, especially when you’re talking about small businesses,” says Adam Kujawa, head of malware intelligence at Malwarebytes, as reported by Kelly Jackson Higgins in Dark Reading.

One report found that downtime costs small businesses $55,000 in income every year; that doesn’t even account for the cost of paying employees who can’t work without access to systems or paying them overtime to catch up when systems come back online.

Here’s what you can do

Today, ransomware is one of the primary concerns for organizations—small, medium, or large.

So, what can you do? There are number of things you can do, like don’t open suspicious-looking emails or suspicious-looking attachments. And be sure your data is properly protected. Do not take data protection for granted!

Check out how Mozy by Dell can help you avoid a ransomware disaster.

I Remember the Time I Lost My Data (Part 2)

My data loss story isn’t simple. The data loss was not limited to one file, or even one device. Although this happened almost 10 years ago, the repercussions of this are still being felt in the organization I used to work for.

As I mentioned, this happened almost a decade ago. I had to travel for work to Mumbai, India, and as is required of any Pakistani travelling to India, I had to register with the local police station when I arrived in the city, and before I left.

Because the local office I was working with didn’t have anyone who could drive me to the police station—and this was before Uber existed—I had to rely on the local transport system alone. Aware that I could be mugged while travelling, I left my belongings with some local colleagues who were instead going straight to the hotel. They had my laptop, phone, and all my notes from the day’s meetings.

After I was done with the police station, I went back to the hotel, only to be told that my colleagues had forgotten my backpack on the local transport they used. Although they had spent the last few hours looking for the bag, it was nowhere to be found.

I left my bag behind thinking it was more secure with them than with me and lost a year’s worth of organizational data that wasn’t backed up anywhere.

LOL. Talk about irony.

The phone had valuable contact information, and my laptop had not only notes from the meetings that I had traveled to India for, but all of my data for the last year as well.

Coming back home and realizing that I would need to comb through emails for the last 10 months to recover just a part of the data I had lost was horrifying. I had managed to put my team back months as far as delivering on our goals was concerned!

Over time, I was able to recover about 80% of the data. I had to email a lot of colleagues to ask for newer versions of documents, scour through my emails to find others, and sit and re-create some of the lost data late at night.

I no longer work at the same organization, but there are still times when someone needs a file that was on my laptop and I have to say that I was not able to recover it despite my best efforts.

All my data is backed up now. All my work files, personal files, images, videos are backed up in the cloud, and on an external drive. A reminder in my calendar ensures I never forget to back up to the external storage drive. But even better, cloud backup services like Mozy are set up to back up important files automatically.

Check out the ways Mozy by Dell backs up your important data, from desktops and laptops to small servers. And Mozy Sync keeps your most active files up to date across your computers, smartphones, and tablets. You’ll have your files anywhere you go.

Mozy Saves the Day

During the past couple months, I immersed myself into answering one simple question: What is Mozy? As a recently hired Dell EMC intern, I wanted to know everything I could about the many ways Mozy protects data; in particular how Mozy protects against a cybercrime that has become very prevalent in recent years—ransomware.

What is Mozy?

Mozy is a cloud-based service that backs up your important data from endpoint sources, like your laptop or tablet. For SMBs and large enterprises, Mozy helps soften the blow of the unexpected by maintaining the reliability of business-critical data. Having productivity stop because an employee’s laptop was stolen or your data was encrypted by ransomware is not good news to hear!

After learning about Mozy’s easy-to-use and worry-free data protection features, I now know Mozy is a good choice for anyone who wants peace of mind about the security of their data. Whether it is a business or just a personal computer at home, backing up important information is crucial. As a writer myself, I wouldn’t want to see my budding novels held hostage at the grasp of a cybercriminal!

For example, my current way of backing up my data is on a twelve-year-old USB drive that hasn’t been updated since 2014. I hold onto it with my life, but that isn’t the safest place for the files I treasure. And as much as I hate to admit this in public, each file within the USB is almost four years old. If my computer crashes for any reason, all of that hard work is lost and all that is left will be the four-year-old documents collecting dust on my USB. Wouldn’t that be a damper on a good day!

With Mozy, you don’t have to plug it in, keep it in a safe place, or even remember to update it. It is purely cloud-based storage that protects your files. I like to think of Mozy as the fastest route to a safe computer. Not only is there an increase in time management with less manual labor in securing files, you also have the luxury of always knowing your information is safe and accounted for.

What is ransomware?

Learning about ransomware is honestly terrifying. The realization that there are ways to randomly attack people online is shocking. What’s even more of a surprise is how ransomware affects a computer. It is as simple as opening a malicious link or an infected attachment in an email. Before you can say “I want my data back!” your whole system will be locked at the whim of the cybercriminal. The kicker is spending money to possibly regain the data being held for ransom. Holding your data in exchange for ransom would make anyone fear for the safety of their information.

How Mozy saves the day

With backup and recovery along with threat detection and prevention, Mozy makes absolutely sure that your information is safe and in your control. Ransomware tries to give the illusion that a faceless person has the power over your data’s future. With your data backed up to the Mozy cloud, the effect is useless.

Removing the fear of cyberthreats with the help of Mozy assures you that the small bumps in the road will always be taken care of. This software will allow you and your colleagues to rest at ease.

Now that I am aware of the danger from ransomware, I back up my important files with Mozy. I don’t want to jeopardize my future bestseller from getting published!

Learn more about how Mozy is a second line of defense against ransomware.

Mozy Supports Key Management Interoperability Protocol

The MozyEnterprise service now offers another encryption key option, furthering Mozy’s commitment to data security. Mozy supports the Key Management Interoperability Protocol, at no additional cost to our customers. At this point, you’re probably asking yourself a few questions.

What is KMIP?

Key Management Interoperability Protocol—or KMIP for short—is a communication protocol that defines secure formats for the manipulation of encryption keys on key management servers (KMS). There is a general trend in enterprise IT toward the centralized management of encryption keys across multiple applications using KMS.

What does this mean to me as a customer?

Today, Mozy offers three encryption key options:

   •     Mozy default encryption key: Mozy assigns an encryption key to your users. This key is stored and managed by Mozy          for the most seamless experience.
   •     Personal encryption key: The user enters a passphrase that is used to create the encryption key. Each user manually          creates a unique personal encryption key.
   •     Corporate encryption key: The administrator enters a passphrase that is used to create the encryption key. Your Mozy          admin can create a key for all users in the company or a unique one for each user group.

With the introduction of support for KMIP, Mozy now offers a fourth data encryption method. Enterprises prefer that applications using encryption keys be KMIP-compliant so they can be managed via a KMS. KMS provides a secure, single point of encryption key management across multiple IT applications.

KMIP ensures the privacy of your data. An advantage of KMS for Mozy customers is that it enables backup admins to easily create and manage per-user local encryption keys. This provides finer encryption granularity (that is, increased at-rest data security) than a corporate encryption key while retaining its on-premises advantages.

Which Mozy products include KMIP?

KMIP is now in directed availability for the MozyEnterprise service at no additional cost. KMIP is currently only supported on the Windows platform. Mac integration is coming soon. On the KMS front, KMIP is currently supported on SafeNet’s KeySecure KMS. If interested in KMIP, please reach out to us via email.

NotPetya: Yet Another Ransomware Outbreak

The WannaCry ransomware virus has become a distant memory for many. For some WannaCry and its variants came and went without doing damage. Others weren’t so lucky. What we are learning (once again) is how critical it is to be prepared against a ransomware outbreak. The fact that the ransomware threat is ongoing and not leaving the scene of the cybercrime anytime soon is underscored by the latest malware to hit the unprotected computer environment and make headlines: NotPetya.

The NotPetya ransomware breakout appears to have started in Eastern Europe and is spreading west. From what we know at this time, a Ukrainian accounting software application is the suspected source; NotPetya was apparently hidden in a software update. As you might expect, NotPetya was named after the Petya ransomware because it masquerades as that ransomware.

What about that ransom?

The NotPetya ransom payment mechanism has been disabled; that is, the email ID associated with cybercriminal’s Bitcoin account was blocked by the email ID’s provider, according to a source. In other words, there is no way to pay even if you want to. At this point of the outbreak, the purpose of this malicious virus is to attack systems quickly and cause as much damage as possible.

NotPetya is considered more dangerous than the WannaCry virus, which was so devastating because it paralyzed infected computers and then caused application failures for systems that had a dependency on Windows operating systems. Hundreds of victims paid various amounts of ransom in Bitcoin in exchange for a decryption key. If there was anything good about WannaCry, it was that it warned IT admins and others to keep their Windows operating systems up to date with the latest patches.

So, what’s the point?

It’s important to remember that cybercriminals who seek to infect systems with ransomware or spread any other form of malware are criminals; cybercriminals to be sure, but criminals just the same who might have no other purpose than to simply cause damage. In the case of NotPetya, this ransomware spreads more effectively than WannaCry and not only encrypts data but also extracts credentials to other machines and systems.

Similar to the WannaCry virus, the purpose of NotPetya is to infect Windows 10 computers. Fortunately, the Windows 10 Credential Guard spots NotPetya’s password extraction from memory. Ransomware running in the Windows 10 operating system with administrative privileges cannot extract credentials. Read more about Windows 10 Credential Guard.

Mozy can help you defend against ransomware

Mozy by Dell can help you protect your environment from the NotPetya ransomware. Here’s how:

   •     Immutable copy: Mozy uses a proprietary encryption and encoding mechanisms to store backups which prevents any          execution of code within files that have been backed up. Mozy backups are entirely separate from your computer.
   •     Point-in-time backup and restore: Mozy uses file versioning, allowing the end user or administrator to restore the entire          backed up data set or individual files and folders from any point in time; up to seven years for MozyPro and          MozyEnterprise, and 90 days for MozyHome. This allows you to easily go back to a healthy version of your files.
   •     Automatic backups: Mozy provides automatic backup as frequent as every two hours, providing highly granular point in          time backup to recover from.
   •     Self-service restore: Mozy provides the ability to the end user to perform their own restore from the Mozy agent or the          Web Access interface.

Avoid a ransomware disaster

To learn how you can use Mozy as a second line of defense for your data and to prevent a ransomware disaster, visit Mozy by Dell.

Other Mozy blogs about ransomware

For more information about ransomware and what you can do to increase your defenses:

   •     Educate your users and yourself
   •     Take a multi-layered approach to protection
   •     WannaCry? You will if you don’t back up

I Remember the Time I Lost My Data (Part 1)

I document everything. From photographing my daily commute to scanning and saving every receipt I acquire, it’s important to me that everything I’ve done or seen is somehow on file. I’m a private eye, and I believe in impeccable organization, and keeping records of everything I see and do. As I learned in detective school, anything can lead to a clue.

Every day, I create a new file on my enormous hard drive titled with the date. There are over 4,000 files. Over the last 11 years, I have diligently documented everything. I can pull up information on any hour of any day and remember exactly what I was doing then. I have traced that data back to robberies and kidnappings and used it to solve mysteries. For example, by snapping photos of the muddy animal tracks on the sidewalk, I helped the bakery discover that it was a fox who was breaking in and stealing cookies. That’s just one example of out of a thousand where my record keeping came in extremely handy.

It was under unfortunate circumstances when I realized how important it is to back up my data. It started out like any other Thursday morning. I was reviewing my data collection from yesterday, including a few photos of the groceries I purchased, a pigeon hopping on a giant scarecrow, an abstract figurine my nephew constructed out of Silly Putty, a recorded conversation with my accountant, and the list of songs I had listened to that day. Yes, minutia to most folks, but details that I consider important.

It was a beautiful, sunny morning. I opened the windows to let the warm breeze in. The birds were chirping, and a family of blue jays seemed to be in perfect harmony. I poured my cereal and was brewing some coffee when I heard a crash. I looked over to my laptop and saw that my new puppy had gotten tangled in the power cord and had innocently pulled the computer to the floor. The external damage to my laptop was obvious. What wasn’t so obvious was the internal damage.

After successfully getting my laptop to turn on again, I immediately heard clicking noises. I would eventually figure out that my hard drive was the culprit. It became obvious that my hard drive was experiencing mechanical failure. Eventually, it would also become obvious that all of the data I had accumulated over the past few years was gone. Unfortunately, nothing was backed up. It was a lesson learned the hard way. Now I’m an advocate for people to back up all of their files to the cloud. It’s what I call a data-saving solution. You don’t have to be a detective to figure that out!

Back up and protect your important files with Mozy by Dell. Case closed!

Check out how another Mozy customer combined his detective work with the reliability of Mozy cloud backup to track down the thieves who stole his laptop. Watch video.

Rumor has it that the ransom is going up

Ransomware is a vicious form of malware that locks users out of their devices or blocks access to files, until a ransom is paid. There are numerous variants, with some ransomware designed to attack Windows devices, and others geared towards Macs or mobile devices. The WannaCry outbreak is a recent example of this form of malware that’s infecting Windows computers.

Evolution of ransomware

While ransomware has been around since the late 1980s, it went “pro” in September 2013 when CryptoLocker was released. It was the first cryptographic malware, and spread quickly via downloads from a compromised website and/or emails made to look like customer complaints. It was estimated that more than $27 million was paid in ransom.

That may seem like a hefty amount to pay out, but there’s only been an exponential increase in ransom payments, with CNN reporting that cybercriminals collected more than $209 million in the first quarter of 2016!

Over the course of time, encrypted browser software such as TOR, anonymous currencies like bitcoin, and increasingly intelligent cybercriminals have evolved ransomware to where it is the #1 security concern of organizations.

Protecting your business

Cybercriminals do not particularly care who their victims are, as long as they can pay a ransom. With a scatter gun approach to propagating ransomware, cybercriminals just want to cast the net as wide as possible so as to maximize the returns.

Here is how you can protect your business:

Educate your users

Most people can’t tell a phishing email from a safe email. Teach your employees to recognize a phishing email. Train them to only open emails from people they know and that pertain to topics they would be expected to talk to them about, and avoid navigating to URLs sent in emails.

“Humans need to be trained; they are the weakest link,” says Paul Kubler, a cybersecurity and digital forensics examiner at LIFARS LLC. “Companies should employ at minimum a bi-annual training geared towards each user group so that everyone is aware of the latest attacks.”

Use a layered defense and update your software regularly

Ransomware attacks involve many different elements. They can start off as a spam email with a link to a malicious website that exploits vulnerabilities in your system to download the virus. A layered approach to cybersecurity, such as email security as well as network protection, can defend you at each of these points. Each layer creates an extra obstacle for the malware, making it more difficult for the attack to be successful.

Keep your operating system, third-party applications, and antivirus programs updated at all times. These are layers of defense for your data, and while they are not bulletproof, they can go a long way in protecting you.

Back up your data often

Business devices often contain sensitive information, as well as operation-critical information such as customer data and business plans. Losing this data to a ransomware attack could severely cripple your business processes. Ensure regular backups are made of all important data, and that these backups are also routinely tested to make sure they work.

According to Steven J.J. Weisman, author of Scamicide, “The best defense against ransomware is to back up all of your data each day. In fact, my rule is to have three backup copies using two different formats with one off site.”

Ransomware isn’t going anywhere, and it is up to each business to protect itself from being the next victim of this type of cybercrime. Mozy by Dell can help. You can avoid a ransomware disaster!

Read about how these two businesses protect their data from ransomware:
   •     Technology consultant battles ransomware with Mozy backup
   •     IT provider chooses Mozy. ‘Nuff said!

Lose my data? LOL. Not a chance!

Data is everywhere. And for many users, their data is everything. Documents, photos, videos, and other files cover years of life lived, experiences shared, and work completed. But recent research shows that the cost of lost or stolen data is on the rise. For businesses, the average cost per record rose $158 last year. For personal users, meanwhile, it’s easy to make the case that real “data loss” only happens to large companies and enterprises. After all, you’re careful with your data—always super cautious about saving information and even duplicating on to a USB stick or external hard drive. There’s no chance you could ever lose your data, right?

Right?

Data dangers

Let’s suppose you’re really careful. Like really careful with your data; you never shut down your laptop or desktop without making sure that files are properly saved, stored in the right directory, and time-stamped within the last few minutes. Plus, you’re regularly backing up everything to a USB stick or hard drive. What’s the worst that could happen? For starters:

Lost or stolen: You get distracted at the coffee shop and someone runs off with your laptop, or it gets lost in the shuffle when you move to a new apartment. Sure, you’ve got that memory stick, but when was the last time you backed it up?

Hard drive failure: Hard drives aren’t perfect, and a recent study found that some have failure rates pushing 10 percent. If your hard drive stops spinning, your data goes kaput.

Ransomware: Maybe you opened that email attachment marked “URGENT” or visited a shady website. And maybe your PC is infected with ransomware, locking you out of your files. Every. Single. File.

It’s funny, right?

And those are just the “ordinary” ways to lose all your data. We’ve all had days where Murphy’s Law seems out to get us. What about:

Pool party: Don’t laugh. It happens. You’re on vacation, bring the laptop for work or play and after a day of too much sun and fun someone bumps your device and…splash!

Scary spills: You’re up late or starting early, barely hanging on. Your cup of coffee somehow misses the mark or your kids burst in and…hisssssss. Computers and caffeine don’t mix.

E-rage: We’ve all thought about it: Tossing that laptop off a balcony or breaking it in two when it won’t cooperate. If you’re tired enough, stressed enough, or had the worst day, your device may not make it through the night.

Of course, none of these scenarios could happen to you. Right? But just to be on the safe side, it’s worth considering another line of defense: Cloud-based storage from Mozy that automatically replicates your data and can restore lost or stolen files if laptops go missing or physical drives bite the dust. Plus, it’s one less thing for you to worry about. Use your device, live your life, and let Mozy take care of the rest.

WannaCry? You will if you don’t back up!

This blog was written by Jerome Bachelet, Mozy Systems Engineer; and Ela Moraru, Mozy Associate Systems Engineer 1

You’ve no doubt heard about the “Wanna” ransomware virus. Known by various names—including WannaCry, WannaBe, and WannaCrypt—this ransomware outbreak has spread globally and rapidly, affecting more than 250,000 computers in more than 150 countries in just a few short days. Individuals and businesses have been infected by the virus in the UK, Spain, US, and Russia.

What’s it do?

The Wanna ransomware infiltrates Windows machines and encrypts files, changing the extensions (for example, .wnry, .wcry, .wncry and .wncrypt) and makes files inaccessible to end users and applications. It impacts all Windows operating systems, from Windows XP to Windows 10, including the Server editions. Wanna uses a worm executable to spread further through local networks and the Internet, infecting any other Windows computers it can reach via the network. The scale of the attack prompted Microsoft to take the highly unusual step of releasing patches for unsupported operating systems, including Windows XP.

The goal of any ransomware is to incapacitate as many files and applications as possible, thus most ransomware is designed to infiltrate IT systems at the end user and then penetrate application servers.

It’s widespread and ongoing—and it’s paralyzing

Wanna is so devastating because it paralyzes any computer it can access and then causes application failures for systems that have a dependency on Windows OSs—like phone systems, email servers, and Microsoft SQL based applications. As of this writing, Wanna has infected more than 230,000 computers and has been identified in 150 countries. Wanna is so widespread that it has been localized into 28 languages.

Hundreds of victims have paid various amounts of ransom to bitcoin wallets in exchange for a decryption key that might allow them to regain access to their files. Unfortunately, decrypting files does not mean the malware infection itself has been removed from the computer. Even if your files are decrypted, there is no foolproof way to remove the ransomware, other than wiping your hard drive and reinstalling Windows.

How does it work?

Warning! A ransomware disaster usually, but not always, starts with a user clicking something they shouldn’t be clicking; for example, a suspicious attachment in an email.

There is a debate about exactly how the Wanna malware first broke out, but what is undeniable is that once virus gains access to a system it spreads unwittingly across unprotected SMB ports. Frustratingly, there has also been a spike of email phishing attacks based on the panic caused by Wanna. In these cases, a user is directed to open an email attachment or visit a website where the ransomware is presented, masquerading as a legitimate attachment or download.

Upon execution, Wanna will kill several system processes that may be locking files and grants itself full permission to every user account on the system.

Wanna then scans all drives (local and network) for 170+ file types and encrypts all the files with a new extension. Next, Wanna hard-deletes all the original files (bypasses the Recycle Bin). Files that are stored in a share, or synchronized via Google Drive, OneDrive, Dropbox, etc., will also be encrypted. Sync tools will automatically propagate to the cloud storage and appear on any other devices linked to the sync service.

Wanna removes any Shadow Volume Copies, disables Windows startup recovery, clears Windows Server Backup history, and bypasses the Recycle Bin, thus preventing any recovery from the Windows systems itself. Wanna changes the end-user wallpaper and displays a pop-up dialog box with instructions to send $300 worth of bitcoin in exchange for a key that will theoretically decrypt the files. The ransom will increase at a regular cadence, and the end user has 7 days to pay the ransom.

How can Mozy help?

Although Mozy by Dell cannot prevent a ransomware outbreak, millions of customers rely on the Mozy backup service to help avoid ransomware disasters. When a ransomware infection occurs, restoration of an endpoint or server from a backup works best when you can easily select a moment in time from where to restore. Once you have identified the point of infection (user and file) and the time the malware was introduced to the machine, Mozy can restore all of the files for the given user from the point in time just before the malware was introduced.

It’s true that there are a few dollars to be made through ransomware exploiting desktop and laptop computers; however, the primary focus of hackers is to make their money at the application server level. More than 95% of all ransomware attacks occur at the edge (that is, desktop and laptop computers). That’s where Mozy can help victims become productive again.

In the case of the Wanna virus, once the ransomware infection has been removed, Mozy would be reinstalled and re-activated with the original account. From the Restore window, the user would use the calendar to select the last healthy version of the files, select all of the files, and then click Restore. Mozy will automatically restore all the files to their original location in their original state.

To learn how you can use Mozy as a second line of defense for your data and to prevent a ransomware disaster, visit Mozy by Dell.