Data Loss – It could happen to you…

Businesses are reliant on data to be operational but, what happens if suddenly all your data is gone or if some of it is missing?
Businesses are reliant on data to be operational but, what happens if suddenly all your data is gone or if some of it is missing? What is your data backup plan?
Advertisements

Data Backup – Why is it Important to Carry Out?

Corporations often rely heavily on data to be operational but, what happens if suddenly the data is gone, compromised or corrupted? Would the business be able to resume operations quickly? According to the Strategic Research Institute, companies who are unable to resume processes within 10 days in event of a disaster are unlikely to survive more than a year!

By securely backing-up business data and applications it could aid the survival of a company if there was a issue because it provides contingency – a backup could be the saviour of a data disaster.

Data loss can occur due to a number of reasons like the business being a victim of cybercrime, human errors, data corruption, hardware failures and even natural disasters. By having data backup in place it would help lower the potential negative impact on the business due to data loss related issues.

As data incidences cannot be predicted corporations must schedule regular backup’s. The term ‘regular’ is dependent on the type of data that is being backup up. For example for data files that are used and amended everyday, it should be backed-up every day.

It is great to carry out backup procedures and schedule it regularly but, it is another story as to whether the backup has actually worked – it has been found that companies that tested tape backup sources found discrepancies or failures in the data 77% of the time.

So, good practice would be to regularly check whether the data is correctly stored, especially when using traditional tape backup. If you are currently in the process of choosing a backup solution, a ‘Cloud Backup’ solution is said to be more reliable and accurate compared to traditional tape. For more information on Data Backup and Recovery Services that Netshield offers please contact us today.

Symantec is killing their Backup Exec.cloud

Symantec is planning to shut down its Backup Exec.cloud service in order to focus on other products that have mobile and content-sharing features. The cloud-based solution Backup Exec.cloud was first introduced in the market February 2012, along with Symantec Backup Exec 2012 Product Suite.

With the increasing number of organisations adopting flexible, remote working, virtual offices and mobile devices, cloud-based options for databackup and collaboration have multiplied in recent years – So, it is important for a backup solution to allow users to work collaboratively with ease; “Customers want features such as synch & share and mobile access. Backup Exec.cloud was not designed with these features in mind,” Symantec’s FAQ said. “As a result, Symantec has decided to discontinue Backup Exec.cloud in order to focus on more productive and feature-rich cloud-based applications which include this type of functionality.”

Symantec will stop selling the subscriptions and renewals for Backup Exec.cloud on the 6th January 2014 and will crease the service and support on 6th January 2015.

Users of the product will need to keep in mind, that after their subscription expires the data saved on the platform will be deleted and they will have to migrate their own data to an alternative service; “We are here to help you navigate this process, but we are not able to provide any data migration services as part of this announcement,” Symantec said in the FAQ.

Considerations when Implementing Security on your IT Network: Business of Cybercrime Series – Part 3

The lack of adequate protection and defences on an IT network would make a business vulnerable to hacking and the implications can be damaging, often the damage is dependent on what mood the hacker is in and what devastation they would like to cause.

Effects from a hacking can disrupt business operations, causing downtime, corrupt data, affect brand perception and reputation. Being a victim of cybercrime can also mean the business breaches the data protection act or experience compliance breaches.

With technology moving so quickly within the IT market, there are a number of methods and products to choose from – the key is to choose what is right for your network.

You need to consider:-

  • What type of IT infrastructure does the business have? Virtual or Physical?
  • What are your data requirements?
  • What would you consider to be your critical data or programs?
  • What security is currently implemented on your network?

Rule of thumb is a full assessment of the current security situation and the condition of the infrastructure is necessary, in order to help determine what is the right solution for your business.  After the assessment, you can then decide on which method or security brand would be most suitable.

3 methods of protection:-

Anti-Virus

Is software to help defend you against viruses and other malware threats including Trojans, worms and sometimes spyware; however, the level of protection provided by the anti-virus is dependent on the one you choose.  Well-known brands include Sophos, Symantec and Kaspersky.

Firewall

A firewall helps to prevent unauthorized access to a computer or a network, there are two types ‘network firewall’ and ‘client firewall’.

A network firewall is installed on the boundary between two networks, normally located between the internet and a company network – it can be either a device or software running on a computer that acts as a gateway to the company network.  Whereas, a client firewall is when software is installed and runs on an end users computer, protecting only that particular computer.  Well-known network firewall brands include SonicWall and Watchguard.

Encryption

This secures your data by encrypting your desktops, laptops, emails, USB’s files and other devices; it prevents unauthorized access where the information can only be accessed by entering an encryption key or password.

For an IT network it is advisable to have at least Firewalls and Anti-Virus software installed. For businesses that uses mobile devices and have a mobile workforce who carry business data around, encryption is recommended. For example, 2-factor authentication can be implemented on business mobile phones, to ensure if the phone was lost or stolen it will help prevent others using it because it is a secure method that seeks to decrease the probability that the user is presenting false evidence of its identity. Well-known 2-factor authentication brands include Cryptocard and Vasco.

Other ways of encryption includes installing a type of software on a device where data is automatically encrypted, email encryption and manual encryption where the user chooses what data requires encoding.

So, regardless of the size of the organisation security is necessary for protection as data is a key asset and is also valuable in the wrong hands.

When it comes to cybercrime business should not think it ‘will never happen to me’, ‘My data isn’t worth the hassle’ but, the truth is, cybercrime criminals do not discriminate, if you have business data you can potentially be a target.

For more information on how to protect your business data please feel free to contact us.

Why Technical Certificate is a Must…

When you take your car to a mechanic, you do so with the belief that someone qualified will take a look under the bonnet.  The same holds true for when you need to get your computer fixed or a cavity filled. For all the important things we can’t do ourselves, we expect the person who does them has a certain level of skill and competency that has been certified.

Why should backing up and recovering your business data be any different?

The rise in the volume of data that a company needs to manage has grown exponentially over the last few years. In turn, businesses are looking for ways to backup and restore that data, as a data-loss event could spell the end of the business. However, the growth in data has led to the growth of the number of various cloud backup and recovery providers, some of which lack the proper qualifications to keep your data safe and secure. There’s a glut of fly-by-night backup providers who are willing to take your money, but when it comes to time to restore the data, they fail to deliver on their promises.

One way for clients to ensure that they are getting top quality backup and recovery service is to go with a cloud service provider that has certified staff. One such managed service provider is Netshield, a specialist in the delivery of complete managed and serviced IT services. Netshield offers Asigra Cloud Backup software as part of their NetRecover offering, which is designed to minimize downtime and ensure business continuity.

Netshield recently had two engineers complete Level 1 Training at Asigra, with the aim of providing the best quality cloud backup service. Even though they just finished the training, they are now able to fully utilize Asigra software – prior to training they were utilizing about 75%, but after the four-day training program they are utilizing the full 100% of the software. Netshield has already begun to see the benefits of the training, experiencing an increase in efficiency and performing quicker deployments, all of which means improved service for their customers.

To enable partners to help their clients even more, Asigra recently launched the industry’s first tiered technical cloud backup and recovery certification program.  Focused on the individual, this new certification program will benefit the cloud backup and recovery industry by raising the level of technical competency and knowledge. Cloud service providers will know that they are making the right hiring decision, and their clients will sleep better knowing that their data is being protected by certified individuals.

Do you agree that certification is a must to guarantee proven cloud backup experience and knowledge?  Would you trust a service provider who has had no training with your data?