sb-nz logo
Story image

Why data backups should be a part of daily operations

17 Dec 2018

Private, public and hybrid clouds are growing in popularity as lift and shift cloud apps are making migration easier for businesses. 

Routed enterprise business development spokesperson Christian Mahncke says that while cloud computing has proven that it is a better option than in-house servers, security challenges remain a concern and businesses require a solid cyber-security strategy.

Mahncke says, “It is evident that companies are still experiencing common security challenges such as backup and Disaster Recovery (DR) failures, ISPs being hacked or Ransomware attacks. All of which is exposing the network and potentially sharing valuable personal information.”

“These businesses are neglecting this important aspect within their cloud strategies, failing to include backups and DR in the overall planning.”

He says that including security and a backup plan comes naturally for anyone that has migrated or developed new applications in the cloud: “It is simpler to secure data by creating a DR environment in the cloud than doing so on-premise. 

Once all your applications are in the cloud, it takes care of all backup and DR requirements quickly and more cost-effectively. Cloud provides one virtual environment, as opposed to a number of disparate applications each requiring individual backup and DR needs.

The importance of looking after data, inside and outside of an organisation remains lacking, which means that DR is probably equally absent. Mahncke says that there is a need for security policies and associated regular backups. This will automatically result in ensuring that proper DR is in place, and it works.

“So often backups only get tested after a server crash or security breach, only to discover that the backups do not exist or were never taken. DR is often absent as there is a belief that a multitude of backups constitutes DR,” explains Mahncke.

He stresses that backups are not DR, nor can multiple backups amount to any kind of DR. Backups are useful for immediate access to restore a document, but do not facilitate the failover of a total environment if the infrastructure becomes compromised.

“Backup is simply a copy of data intended to be restored to the original source, while disaster recovery requires a separate production environment where the data can live. All aspects of the current environment should be considered, including physical resources, software, connectivity and security,” says Mahncke.

Data backups should be automated and part of daily operations, while DR planning is an integral part of any organisations IT strategy, and is becoming essential as security breaches and network outages become common threats.

“DR needs to address complete system failure and provide a set of security policies to govern disaster incidents. A cloud platform provides for this in the most efficient form,” says Mahncke.

Story image
Check Point exposes Android malware vendor using dark net to rebrand products
Check Point security researchers have exposed an Android malware vendor using a marketer on the dark net to rebrand its products, with the intention of supercharging business and throwing off security vendors. More
Story image
A brief history of cyber-threats — from 2000 to 2020
Many significant cybersecurity events have occurred since the year 2000 — not every one of them ‘firsts’, but all of them correlating with a change in security behaviour or protection.More
Story image
IT professionals destroying end-of-life hardware over fears of data breaches - report
IT directors are destroying end of life tech hardware as opposed to erasing its data out of fear of making a mistake and facing data breaches.More
Story image
CompTIA forms Cybersecurity Advisory Council, led by 16 security execs
The new body will be co-chaired by Tech Data director of security solutions Tracy Holtz, and Alvaka Networks chief operating officer and chief information security officer Kevin McDonald.More
Story image
Sophos named a Numbering Authority in CVE programme
The programme, which runs an open data registry of vulnerabilities, enables programme stakeholders to correlate vulnerability information used to protect systems against attacks. More
Story image
Online gaming a 'hotbed' for DDoS attacks — report
The latency and availability issues present in online gaming, in particular, presented an attractive target to attackers, in addition to the enduring popularity of gaming in the era of COVID-19.More