How to Bullet-Proof Your Data

SHARE

How to Bullet-Proof Your Data
By Brian Renter, President, Universal Information Systems
A recent study of companies experiencing a “major loss” of computer records discovered that 43 percent never reopened, 51 percent closed within two years of the loss, and a mere 6 percent survived over the long-term. For small and medium-sized businesses in particular, these statistics suggest the importance of creating a Business Continuity Planning (BCP) strategy grounded in a robust Backup and Disaster Recovery solution.

Unlike enterprises, many smaller companies and organizations cannot afford optimal in-house strategies and solutions for their Business Continuity Planning. Consequently, these companies are at a high risk of being put out of business due to any major loss of data. Loss of data could mean emails lost, accounting data lost, patient or client files lost, company records lost, client legal records or orders lost, etc.

Smaller businesses generally lack the in-house IT resources to develop a successful Backup and Disaster Recovery plan for their data. Therefore, many SMB’s either neglect to implement any plan to secure their data or approach data backup and recovery in a sporadic, rudimentary fashion that fails to conform to BCP best practices.

Traditional Solution vs. Emerging Technology
In recent years, there has been a dramatic shift from tapes to disks as the primary form of backup. Recent advances in design and manufacturing have lowered the total cost of disk-based storage in terms of storage per bit. Falling prices, combined with the various performance advantages render disk increasingly attractive.

Tape, in contrast to disk, is physically delicate and easily compromised by environmental factors such as heat, humidity, and magnetic interference. Moreover, tape cartridges must be replaced frequently (every 6-12 months). Tape’s innate sensitivity contributes to high failure rates with analysts estimating that anywhere from 42 to 71 percent of tape restores fail.

Tape is seldom encrypted, compounding the destructive impact of tape theft. Disk offers not only lower cost encryption but also other advantages including longer life, easier management, and faster recovery speeds.

Some features to look for in a Backup and Disaster Recovery solution
Near Real-Time Backups: Make sure your backup uses “Incremental Forever” methodology to capture all changes to the initial image in certain time increments (15 minutes is preferable). The Incremental Forever technology not only backs up recent datasets but also allows end users to reconstruct the state of their data as it stood at the end of various 15-minute restoration points. This level of forensic and auditable data recovery may satisfy various regulatory requirements (such as HIPAA and GLBA) for data retention and data record reconstruction, and also serves stakeholders such as supply chain planners, warehouse analysts, auditors, and legal counsel.

On-site Virtual Server: If any of your servers fail, the server virtualization technology embedded in a recommended Backup and Disaster Recovery Solution should allow servers and applications to be restored and rebooted within hours, rather than days.

Intuitive and Flexible Restoration: A good backup system should allow for quick and flexible restores. Make sure it allows for recovery of files, folders, partitions, mailboxes/messages, and databases/tables using a quick and easy-to-use process.

Secure Remote Storage: Have your data stored off-site in addition to the local device at your office. Make sure the data is transferred to the remote site using a 256-bit encrypted tunnel and that it is stored in an encrypted format for which you have the only key.

24×7 Monitoring of the Solution: You don’t have the time or expertise to make sure everything is working properly with the backup solution. Make sure it is monitored at all times to ensure that your data is available when you need it.

The safety and security of your data must be made a top priority within your operation. The very existence of your business or organization may depend on it.

UPCOMING VIRTUAL EVENTS

Demystifying Cyber Security for SMBs

sb-cyber-security-master-class

The continually changing threat landscape requires us to update best practices and add new concepts to keep your organization safe.

SESSION 4: Cyber Security Strategy
Watch On-Demand

SESSION 5: Cyber Insurance & MFA
Watch On-Demand

SESSION 6: Threat Detection | JAN. 15

Microsoft Copilot
Master Class Workshop

sb-microsoft-copilot-master-class

eMazzanti will host 60-minute Master Classes, that speak to how AI can help your business streamline and grow.

In each session, you will have Artificial Intelligence and Automation explained, view a live demo of Copilot, and see it live in action in a dynamic format.

RESOURCES

Cyber Security Awareness Hub

sb-Cyber-Security-Awareness-Hub

Cyber Security Awareness Kit, designed to be delivered to your team in bitesize chunks.

We are sharing the resources and highlighting services your organization needs, covering everything from multifactor authentication to software updates, showing your users just how easy it is to improve their security posture.

Resource Library

sb-resource-library

Insights to help you do what you do better, faster and more profitably.

> Tips to Stay Protected Against Phishing Attacks

> Understanding Ransomware 

> The 6 Known Wi-Fi Threat Categories Targeting Your Business and How to Defend Against Them

> Practical Advice for Avoiding Phishing Emails

Recent Articles

NEWSLETTER

Categories