Connect with us

Hi, what are you looking for?

Business

Computing business needs: Robust and reliable data backups

With ransomware increasingly infecting backed-up data, businesses need to assess this additional security risk.

Photo: © Digital Journal
Photo: © Digital Journal

One of themes of the forthcoming ‘Cybersecurity Awareness Month’, which is marked in the U.S. each October, is the importance of ensuring data is secure and backed-up (and also that data is archived and retrievable).

The purpose of the backup is to create a copy of data that can be recovered in the event of a primary data failure. If this is performed badly, it can provide a back door for criminals to exploit.

Under the worse scenario, ransomware (and other malware) can often move to attached storage automatically, which means any such backup could also be infected, leaving you with no backup to recover from.

To gain an insight into the importance of regular and reliable data back-ups, Digital Journal asked the opinion ofJG Heithcock, General Manager of Retrospect, which is a StorCentric company.

Heithcock explains tat a weak and poorly protected back-up represents an easy route in for rogue actors. He says: ““Today’s cyber criminals are attacking backups first, and then once under their control, coming after production data. This means that many enterprises are feeling a false sense of security, until it is already too late.”

Heithcock’s advice to businesses is to invest in a reliable data capture tool. He explains: “I like to say, ‘backup is one thing, but recovery is everything.” In other words, choose a backup solution that ensures the recovery piece (which surprisingly, not all of them do).”

In terms of key advice to businesses, Heithcock recommends: “Look for a provider with vast experience, as well as a track record for continuous innovation that ensures its offerings are prepared to meet prevailing conditions.”

He adds that to be effective, then: “The solution(s) should provide broad platform and application support and ensure protection of every part of your IT environment, on-site, remote, in the cloud and at the edge.”

Following this, Heithcock puts forward: “Next, the backup solution should auto-verify the entire backup process, checking each file in its entirety to ensure the files match across all environments, and you are able to recover in the event of an outage, disaster or cyber-attack. And, as a last but highly critical step — at least one backup should be immutable — unable to be altered or changed in any way, at any time.”

The expert concludes his advice to readers, saying: “Even if the ransomware took a ride along with your data to your backup site, during the last backup.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

Stop pretending to know what you’re talking about. You’re wrong and you know you’re wrong. So does everyone else.

Social Media

The US House of Representatives will again vote Saturday on a bill that would force TikTok to divest from Chinese parent company ByteDance.

Business

Two sons of the world's richest man Bernard Arnault on Thursday joined the board of LVMH after a shareholder vote.

Entertainment

Taylor Swift is primed to release her highly anticipated record "The Tortured Poets Department" on Friday.