Summary
In this chapter, we learned how to configure and use AIP to classify and encrypt data to minimize the risk of malicious actors getting access to information.
We also investigated using other features to encrypt other data sources, such as SQL Server and file servers.
Finally, we looked at some best practices for data backup to minimize the risk of ransomware attacks being able to compromise backup data. It is important to note that encrypting data and backups can be seen as the last line of defense. Regardless of whether you classify and encrypt files to protect your files or have a solid backup product in place, it will not stop ransomware attacks from happening.
So far, we have looked at how to implement countermeasures that can help reduce the risk of ransomware attacks. However, there is no way that you can be 100% protected from attacks. There are always new vulnerabilities and new attack vectors that come up.
So, what do we do if our organization is hit by...