In the corona pandemic, many companies are faced with the challenge of having numerous employees working from home. In addition to how these can be integrated into the company network, data backup also plays a central role.
Of course, much data also accumulates in the home office, or a computer breaks down. This also increases the company’s requirements and costs for backup and recovery, i.e., the backup and restoration of this data.
Backup and Replication are often mistakenly used interchangeably. With a backup, copies of data are created at specified times and stored if the original is lost or damaged. On the other hand, Replication makes instant copies of files in near real-time and then makes them available in the data center or the cloud.
Ransomware is malware used for hacker attacks, in which the data storage of the attacked company is encrypted to extort a ransom. Hacker groups operate like small businesses these days. In most episodes, it is to be expected that the attacker will sooner or later personally log into the attacked system to penetrate deep into the company network. The attackers know: If they cannot get the backups and encrypt or delete them, the attacked company’s willingness to pay is relatively low.
It follows from this: Backups must be specially protected. In other words: it’s about safeguarding backups from the administrator because of what the administrator can do, such as deleting backups. The solution is to protect the data in the cloud storage so that not even the company itself can change it. New German means immutability.
Amazon AWS, for example, offers an object lock with a timestamp for its S3 storage. This can then be configured so that the data remains unchangeable for 30 days, for example. The data in the cloud is therefore safe. The question remains, how can the local primary backup that is on-premises in the company network be protected? The solution is called Linux.
Because Linux file systems such as ext4 support an “immutable flag” that makes files immutable, if SSH is also switched off and root access is generally not allowed, good protection can be guaranteed with standard hardware.
Snapshots in the VMware environment place a heavy load on the systems. Solutions such as Veeam Backup & Replication v11 have a function called Continuous Data Protection (CDP): This involves replicating virtual machines that enable recovery points in a matter of seconds. No snapshots are created, but the data traffic is branched off and mirrored.
Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are important key figures in a backup solution. RTO is about how quickly data can be made available again. It relates to downtime and represents how long it will take to recover from the incident before normal operations are available to users again. RPO means how much data is lost when something is restored. A backup at midnight will result in 15 hours of data loss by three in the afternoon.
The goal is to get as close as possible to zero for both values. CDP enables this and is therefore particularly suitable for the most critical applications. Modern solutions kill several birds with one stone: backup, VM-based Replication, storage snapshots, and continuous data protection.
Another keyword is “Archive to Cloud,” which means outsourcing backups to the cloud. But long-term storage in the cloud usually costs a lot of money. That doesn’t have to be the case if you choose the correct memory. AWS S3 Glacier Deep Archive offers the very cheapest storage space for long-term backups. It costs only a fraction of the conventional S3 storage. As of March 2021, the cost is $ 0.00099 per gigabyte per month versus $ 0.021 for S3. In return, the provision of data takes much longer than with the expensive variants, which can be tolerated with backup archives. Microsoft offers something similar under the name Azure Archive Cold Storage.
The 3-2-1 rule still applies. This means companies should have three copies of the data, on two different media, with one copy in an off-site location. In the context of ransomware, it is also worth adding a 1 and a 0 to the 3-2-1 backup rule, and this is where the “immutable flags” come into play: One of these copies should be “immutable,” that is unchangeable or exceptionally resilient, and thus safe from ransomware or insider attacks – that is the first. This can be done, for example, by using the S3 Object-Lock functionality from cloud providers or by a backup that is activated with insider protection.
Cloud Connect is outsourced to the service provider. Of course, the traditional “tape” also provides good protection, provided that the tapes are regularly swapped out and updated. In addition, regular tests should be carried out to determine whether the data can be restored – that puts the 0 on the tablet. It stands for “zero errors” in restoration. This can be achieved through continuously running and automated recovery tests and anti-virus scans of the backups. The latter can be carried out quickly if a corresponding function is already integrated into the respective security solution.
This can be achieved through continuously running and automated recovery tests and anti-virus scans of the backups. The latter can be carried out quickly if a corresponding function is already integrated into the respective security solution. This can be achieved through continuously running and automated recovery tests and anti-virus scans of the backups. The latter can be carried out quickly if a corresponding function is already integrated into the respective security solution.
The importance of backups for data protection has established itself as an essential task in companies. But that’s only one side of the coin. The backups should not only be backups in the form of dead data, which one can no longer do anything with, but companies can work with the backed up data. Backups can be started in a sandbox, for example, to test migrations, try out patches, or train employees.
It might also be a good idea to scan backups with virus scanners. As part of the backup strategy, companies need to consider which data is most important and which type of recovery is appropriate. In addition, there is the ever-present danger from ransomware attacks and the new scam of double blackmail. Data is encrypted, but previously some important ones were stolen and threatened with publication if the ransom should not be paid.
On the one hand, a micro-segmentation of the network helps enormously protect oneself against ransomware via the IT architecture effectively; conversely, good backup and restore functions are just as indispensable. With a well-maintained backup, encrypted systems can be fixed immediately to prevent the damage caused by encryption. At least stolen data is not entirely in the hands of hackers. In this way, companies regain the opportunity to take action instead of just being victims of the attack.
To protect yourself effectively against ransomware via the IT architecture, on the other hand, good backup and restore functions are just as indispensable. With a well-maintained backup, encrypted systems can be fixed immediately to prevent the damage caused by encryption. At least stolen data is not entirely in the hands of hackers. In this way, companies regain the opportunity to take action instead of just being victims of the attack. To protect yourself effectively against ransomware via the IT architecture, on the other hand, good backup and restore functions are just as indispensable.
With a well-maintained backup, encrypted systems can be fixed immediately to prevent the damage caused by encryption. At least stolen data is not entirely in the hands of hackers. In this way, companies regain the opportunity to take action instead of just being victims of the attack. And stolen data is at least not entirely in the hands of hackers. In this way, companies regain the opportunity to take action instead of just being victims of the attack. And stolen data is at least not entirely in the hands of the hackers. In this way, companies regain the opportunity to take action instead of just being victims of the attack.
Many companies have recognized the charm of the idea of outsourcing backups to a service provider. This goes so far that some service providers provide customers with a black box. The customer no longer has anything to do with it. The service provider takes care of everything. This is particularly interesting for small and medium-sized companies where IT may not be part of the core competency or where the appropriate funds and specialists for self-managed solutions are simply missing. The service providers are then called Backup-as-a-Service (BaaS) and Disaster-Recovery-as-a-Service (DRaaS). Here, of course, it is essential to select precisely which service provider is allowed to take on this critical task because these are essential assets of the company that is now being taken over into its care.
Also Read – Cloud Technologies: Closing The Gap In Cybersecurity Skills
Today, most consumers are no longer sensitive to corporate marketing speeches. More than being present…
In a world that depends so much on effective communication, language barriers still etch remarkable…
Until a few years ago, it might have seemed like science fiction. Today, hearing about…
You'll feel worried that the Word record you designed on your PC the previous evening…
The implementation of a data-centric business model makes it possible to realize the value creation…
For website owners, choosing a web host is essential. There are several and it is…