Unlock AI power-ups â upgrade and save 20%!
Use code STUBE20OFF during your first month after signup. Upgrade now â
By Synology
Published Loading...
N/A views
N/A likes
Get instant insights and key takeaways from this YouTube video by Synology.
Understanding Ransomware Threats
đ Ransomware is malware that encrypts systems and data, demanding payment with no guarantee of data recovery.
đ§ Common attack vectors include phishing attempts, social engineering (baiting/scareware), exploiting unpatched critical vulnerabilities, and using compromised credentials without Two-Factor Authentication (2FA).
đ Verizon data breach reports indicate ransomware is involved in 25% of all corporate network breaches, with downtime costs reaching into the millions.
Implementing Write Once Read Many (WORM) Storage
đž WORM storage ensures data lands on the Synology NAS and remains unmodified forever (or for a set period) while allowing multiple reads.
đĄī¸ Two modes exist: Enterprise Mode (allows admin deletion) and Compliance Mode (highly restrictive; even admins cannot modify or delete files).
âī¸ WORM settings, configured at the shared folder level, involve setting a grace period (auto lock timer) and an immutable period (retention option, which can be set to "remain locked forever").
â ī¸ If using the most restrictive settings (Compliance Mode, Immutable Lock state), it is highly recommended to set a shared folder quota to prevent filling the NAS storage capacity permanently.
Utilizing Immutable Snapshots
đ¸ Snapshot Replication uses BTRFS snapshots that are read-only copies of data, capable of being replicated off-site and supporting failover.
đ The immutable feature extends Snapshot Replication using WORM technology, preventing snapshots from being deleted for a set period, up to 30 days.
đ Immutable snapshots can be enabled for existing or new local snapshots, and for replicated snapshots, with recommended immutability periods ranging from 7 to 14 days.
âŠī¸ When data is stored in a WORM compliance folder, restoring from a snapshot via overwrite is blocked, but users can clone the snapshot to another folder or use the browse option to pull specific data.
Key Points & Insights
âĄī¸ Ransomware is countered primarily through immutable storage (WORM folders) and immutable snapshots.
âĄī¸ Always maintain security best practices, such as enabling 2FA for admin accounts, even when using advanced protection features.
âĄī¸ Maintain robust 3-2-1 backup strategies alongside WORM protection for comprehensive disaster recovery readiness.
đ¸ Video summarized with SummaryTube.com on Jan 05, 2026, 03:27 UTC
Find relevant products on Amazon related to this video
As an Amazon Associate, we earn from qualifying purchases
Full video URL: youtube.com/watch?v=9j8zaWW8qN0
Duration: 16:12
This summary was created by an anonymous user.
Get instant insights and key takeaways from this YouTube video by Synology.
Understanding Ransomware Threats
đ Ransomware is malware that encrypts systems and data, demanding payment with no guarantee of data recovery.
đ§ Common attack vectors include phishing attempts, social engineering (baiting/scareware), exploiting unpatched critical vulnerabilities, and using compromised credentials without Two-Factor Authentication (2FA).
đ Verizon data breach reports indicate ransomware is involved in 25% of all corporate network breaches, with downtime costs reaching into the millions.
Implementing Write Once Read Many (WORM) Storage
đž WORM storage ensures data lands on the Synology NAS and remains unmodified forever (or for a set period) while allowing multiple reads.
đĄī¸ Two modes exist: Enterprise Mode (allows admin deletion) and Compliance Mode (highly restrictive; even admins cannot modify or delete files).
âī¸ WORM settings, configured at the shared folder level, involve setting a grace period (auto lock timer) and an immutable period (retention option, which can be set to "remain locked forever").
â ī¸ If using the most restrictive settings (Compliance Mode, Immutable Lock state), it is highly recommended to set a shared folder quota to prevent filling the NAS storage capacity permanently.
Utilizing Immutable Snapshots
đ¸ Snapshot Replication uses BTRFS snapshots that are read-only copies of data, capable of being replicated off-site and supporting failover.
đ The immutable feature extends Snapshot Replication using WORM technology, preventing snapshots from being deleted for a set period, up to 30 days.
đ Immutable snapshots can be enabled for existing or new local snapshots, and for replicated snapshots, with recommended immutability periods ranging from 7 to 14 days.
âŠī¸ When data is stored in a WORM compliance folder, restoring from a snapshot via overwrite is blocked, but users can clone the snapshot to another folder or use the browse option to pull specific data.
Key Points & Insights
âĄī¸ Ransomware is countered primarily through immutable storage (WORM folders) and immutable snapshots.
âĄī¸ Always maintain security best practices, such as enabling 2FA for admin accounts, even when using advanced protection features.
âĄī¸ Maintain robust 3-2-1 backup strategies alongside WORM protection for comprehensive disaster recovery readiness.
đ¸ Video summarized with SummaryTube.com on Jan 05, 2026, 03:27 UTC
Find relevant products on Amazon related to this video
As an Amazon Associate, we earn from qualifying purchases

Summarize youtube video with AI directly from any YouTube video page. Save Time.
Install our free Chrome extension. Get expert level summaries with one click.