Why You Shouldn’t Perform a Bare Metal Recovery After a Malware Attack
Today, I would like to give you a few tips and best practices for recovering after a malware attack. If you are using a bare metal recovery tool after a recent cyberattack, you are not only likely restoring the malware back to your system, but also restoring your system back to its original vulnerable state. This restore keeps malware on your computer and puts you and your business at risk for future compromises.
The best approach to recover your system after being infected with malware is to start fresh.
- Install a fresh copy of your operating system and apply all patches and updates. Most manufacturers provide a recovery partition or DVD disk in order to restore your machine to its original state.
- Check for vulnerabilities that exist in the applications that you run. This goes beyond checking for vulnerabilities in your operating system. There are commercially available tools to help with this such as Retina CS Community and Microsoft Baseline Security Analyzer.
- Restore your original data to your system. After you have fully updated your system to ensure that you have mitigated all known vulnerabilities, use Jungle Disk encrypted backup to restore your data. As you restore your data, scan your files with an updated virus scanner to make sure the viruses have not infected your documents. If you find that some documents have been infected, you can use Jungle Disk to restore an earlier version of your documents, as our service keeps a complete revision history.
Bare metal recovery is a widely used technique to restore a system after a malicious attack. To keep your system safe in the future, don’t restore your system back to its vulnerable state!