Tuesday, 07 August 2018 00:02

BlackBerry Workspaces gains ransomware recovery feature


BlackBerry's Workspaces file sync and sharing system is gaining a feature that allows ransomware-encrypted files to be selectively replaced without causing a potential loss of work to unaffected users.

Ransomware was the most common type of malware in 2017, according to the Verizon data breach report, and "recovery can be time-consuming and expensive". Cybersecurity Ventures predicts that the aggregate yearly cost of repairing ransomware damage will reach US$11.5 billion by 2019.

BlackBerry's contribution to addressing this pervasive issue is the addition of a ransomware recovery feature to Workspaces.

The idea is to freeze the accounts of affected users in the event a ransomware attack encrypts their synced files. Rather than having to enforce an organisation-wide rollback, administrators can then examine user logs to determine exactly which items have been affected, and then selectively roll them back to pre-attack versions.

This approach is said to help organisations avoid the loss of work and productivity that often come with system-wide recovery mechanisms.

“Beyond data loss, opportunity costs, and reputational risks, downtime resulting from ransomware attacks can inflict real harm on customers in any industry, including healthcare or public safety, where the consequences of any delay can be catastrophic,” said executive vice-president of enterprise products, Billy Ho.

“Organisations need to have a strong culture of security to minimise the risk of an attack – something that our cyber security consulting team has been supporting for the last several years. And in a worst-case scenario, it’s critical that organisations also have a layered defence model in place and an enterprise technology stack that is designed with the inevitable breach in mind.”

The new ransomware recovery feature will be available in the Collaborate and Secure Plus editions of BlackBerry Workspaces at no extra cost.

A webinar featuring a step-by-step demonstration of BlackBerry Workspaces' ransomware recovery feature is scheduled for 3am on 22 August. Registrations are being taken here. Watch this space for information about possible replays that better suit Australia.


As part of our Lead Machine Methodology we will help you get more leads, more customers and more business. Let us help you develop your digital marketing campaign

Digital Marketing is ideal in these tough times and it can replace face to face marketing with person to person marketing via the phone conference calls and webinars

Significant opportunity pipelines can be developed and continually topped up with the help of Digital Marketing so that deals can be made and deals can be closed

- Newsletter adverts in dynamic GIF slideshow formats

- News site adverts from small to large sizes also as dynamic GIF slideshow formats

- Guest Editorial - get your message out there and put your CEO in the spotlight

- Promotional News and Content - displayed on the homepage and all pages

- Leverage our proven event promotion methodology - The Lead Machine gets you leads

Contact Andrew our digital campaign designer on 0412 390 000 or via email andrew.matler@itwire.com



Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.



Recent Comments