To understand the IT piece of disaster recovery and business continuity today, it helps to look at the not-so-distant past. It really wasn’t very long ago that backup meant daily incremental and weekly full backups to tape or a dedicated disk backup target. Duplicate tape copies were created and shipped offsite for disaster recovery— typically to a secondary site maintained by the business or to a tape vaulting facility (e.g. Iron Mountain). Many businesses continue to use this model today, and depending on your recovery needs it may be perfectly adequate. However, disaster recovery from offsite tape can be painfully slow. First, you need to retrieve the tapes from an offsite location. Once they are back on premise, you must ingest data to your backup server. At that point, you can restore data and applications to your primary servers. This, of course, means considerable downtime.
As your IT service provider, we know that protecting your business from ransomware is not a single-prong approach. Being able to mitigate or prevent attacks is our top priority. We have put in place a multi-layered approach that can adapt as new and increasingly hostile threats emerge. Our best-in-class approach consists of six layers.
Is your company transitioning to Office 365? Office 365 is a good thing. So is a good Backup. User Error is the number one cause of data loss with cloud services such as Microsoft’s Office 365 and Google GSuite Applications. Corruption and Ransomware can also make your cloud data inaccessible for days, if not permanently.
More and more, ransomware has emerged as a major threat to individuals and businesses alike. Ransomware, a type of malware that encrypts data on infected systems. When the malware is run, it locks victim’s files and allows criminals to demand payment to release them. Unless you’ve been living under a rock, you are probably well aware that ransomware is a hot topic in the news these days. Organizations of all types and sizes have been impacted, but small businesses can be particularly vulnerable to attacks. And ransomware is on the rise.
When thinking about cybersecurity, it’s not just about “if” your business will be attacked; it’s about “when” it will be attacked. Infection methods are more sophisticated and phishing scams look more realistic. Two of the more recent ransomware attacks serve as valuable evidence.