How Rollback Protects You
Ransomware works by encrypting your files and overwriting them with encrypted versions. In a traditional storage environment, this means your original files are gone. In AXIS CloudSync, every overwrite creates a new version — so the encrypted files are just the latest version, and your clean originals are preserved in the version history.
- AXIS CloudSync stores every version of every file automatically.
- Ransomware encryption creates new versions — it does not delete the originals.
- Administrators can roll back all files in a folder or Team Share to a specific point in time.
- Recovery can restore thousands of files in minutes — far faster than restoring from traditional backups.
Important
Immediate Response Steps
Speed is critical. The moment you suspect a ransomware attack, take these steps immediately:
- 1Disconnect affected devices from the network immediately. Unplug the ethernet cable or disable Wi-Fi. This stops the ransomware from encrypting more files.
- 2Do not pay the ransom. AXIS CloudSync's rollback feature makes payment unnecessary in most cases.
- 3Contact your AXIS CloudSync administrator immediately. If you are the administrator, proceed to the next steps.
- 4Document the attack: Note the time you first noticed the attack, which devices are affected, and any ransom messages displayed.
- 5Contact AXIS CloudSync support at 1-866-232-2211 if you need assistance with the rollback process.
Identifying the Scope of the Attack
- 1Log in to the AXIS CloudSync web portal from an unaffected device.
- 2Navigate to Admin → Reports → Activity Log.
- 3Filter by the time range of the attack and by action type: Upload/Modify.
- 4Look for a sudden spike in file modification activity — this indicates when the ransomware began encrypting files.
- 5Note the exact timestamp when the attack started. You will roll back to just before this time.
- 6Identify which folders and Team Shares were affected.
Performing the Rollback
- 1In the web portal, navigate to the affected folder or Team Share.
- 2Right-click the folder and select Version History (or Rollback Folder if available).
- 3Select Roll Back to Point in Time.
- 4Enter the timestamp from just before the attack began (identified in the previous section).
- 5Review the list of files that will be restored. Confirm the selection.
- 6Click Restore. AXIS CloudSync will restore all files in the folder to their state at the specified time.
- 7Repeat for each affected folder or Team Share.
Note
After Recovery
- Verify the restored files are clean and accessible before reconnecting affected devices to the network.
- Scan all affected devices with updated antivirus/anti-malware software before reconnecting them.
- Change all passwords for accounts that were active on affected devices.
- Review the Activity Log to determine how the ransomware gained access (e.g., compromised credentials, phishing email).
- Document the incident for your HIPAA Breach Notification assessment. Ransomware attacks may require breach notification — consult your HIPAA compliance officer.
- Update your security policies to prevent recurrence.
Important
Prevention Best Practices
- Enable Two-Step Authentication for all users — compromised credentials are the most common ransomware entry point.
- Train employees to recognize phishing emails, which are the most common ransomware delivery method.
- Keep software updated — ransomware frequently exploits unpatched vulnerabilities.
- Restrict admin privileges — limit who has local administrator rights on workstations.
- Maintain version retention of at least 30 days in AXIS CloudSync.
- Test your recovery procedure annually — don't wait for a real attack to discover gaps in your response plan.