From the distant past going forward, the need for businesses to retain data has been a necessity and in the digital age, this need continues to grow in its complexity. Simply assuming that your data and your backups are safe is dangerous and potentially damaging.

Viruses, hard drive crashes, theft, and Ransomware are just a few of the ways data is lost. Most people using any type of technology have experienced data loss at least once.

There are about 140,000 hard drive crashes in the US every week – averaging out at 20,000 per day. Within every five year time span, 20% of Small and Mid-size Businesses (SMBs) suffer data loss due to a major disaster. This has helped to fuel a robust cloud backup market that continues to grow.

The danger remains if you labor under the false assumption that your data backups are automatically protected once they’re in the cloud. They are NOT.

Cybersecurity continues to evolve and change in regard to data backup. Simply backing up data to avoid losing it is not enough anymore. Data protection must move to the forefront of any backup solution.

It’s wise to have an in-depth discussion with your IT services professional – whether an internal IT Support Department or external Managed Services Provider.

What does data protection mean?

Simply put, data protection means that backups need more Cybersecurity protection than what is typically in play with the main network because they face threats such as sleeper ransomware and supply chain attacks. Cloud-based backup has the benefit of being convenient, accessible, and effective, but there is also a need for certain security considerations with an online service.

Not a single one of the major cloud providers like Microsoft Azure, Google Cloud Platform (GCP), or Amazon Web Services (AWS) guarantee that your data is protected against data breach – that is up to you and whatever IT services you use.

You need to consider data protection when planning a Backup and Disaster Recovery strategy, and the tools you use need to protect against an ever-growing number of threats.

Some of the current significant threats:

Sleeper Ransomware: ‘Standard’ Ransomware locks up your system as soon as it’s let in, but this newer strain is crafty. It gets in and hides, staying dormant until it receives a predetermined cue. In the meantime, it snakes through the system and infect all your backups. Once activated, the victim doesn’t have a clean backup to restore – unless the victim has good IT Support which has set up backups unconnected to the operating network.

Data Center Mishap: The cloud is nothing more than a data center filled with servers that house your data but are connected to the internet and can therefore be hacked. They can also crash. Data centers holding the servers can have outages and are not immune to fires, floods, and earthquakes.

Supply Chain Attacks: There has been a lot of buzz about the vulnerabilities of the supply chain in the last few of years and attacks on aspects of the supply chain for the IT services industry have been growing. They include attacks on cloud vendors that companies use. Once those vendors suffer a cyberattack it can easily be spread to their clients.

Misconfiguration: Misconfiguration (click the link to learn more) of security settings is a very real problem, and it’s self-inflicted. It can allow attackers to gain access to cloud storage. Those attackers can then download and delete files as they like.

What makes a good backup plan?

Whatever backup solution you center on, you need to make sure the applications you use provides adequate data protection. Here are some of the things to look for when reviewing a backup solution:

Ransomware Prevention

Ransomware’s typical modus operandi is to spread throughout a network to infect any data that exists, including data on computers, servers, and mobile devices. It can also infect data in any cloud platform syncing with those devices. 95% of ransomware attacks also try to infect data backup systems.

Any data backup solution you deploy must have protection from ransomware. This type of feature restricts the automated file changes that can happen to documents.

A secure, reliable backup system MUST be unconnected to the main network. If it’s connected, it’s infected. One relatively inexpensive solution is a solid state external hard drive.

Continuous Data Protection

This is different than systems that back up on a schedule, like once per day. Continuous data protection will back up files as users make changes.

This will mitigate the amount of data that is lost after a system crash or ransomware attack, because recovery includes re-installing the data. If the last backup was the previous night, you’ve lost all the data generated today. With the speed of data generation these days, losing a day’s or even a few hours’ worth of data can be very costly.

Threat Identification

Be sure to incorporate proactive measures in your data protection measures. When selecting a backup service, look for threat identification functions - a type of malware and virus prevention tool.

Threat identification tools seek out and identify malware in new and existing backups. This helps stop sleeper ransomware and similar malware from infecting all backups.

Zero-Trust Tactics

Anyone who considers themself a bona-fide Cybersecurity professional will be using zero-trust security measures which include multi-factor authentication and application ‘safelisting’. The zero-trust approach requires that all users and applications need ongoing authentication – no free passes.

Some of the zero-trust features to look for include:

Multi-factor authentication

Distinct file and folder permissions

Contextual authentication

Verification of permissions for file changes

Redundancy

You should keep at least 3 copies of your data – as in the 3-2-1 strategy: 2 local copies on different devices and 1 copy off-site. If you back up to a USB drive or CD, you have one copy of those files. If something happens to that copy, you could experience data loss.

Any cloud backup provider you consider should have backup redundancy in place. This means that the server holding your data mirrors that data to another server (cloud to cloud). This prevents data loss in the case of a server crash, natural disaster, or cyberattack.

Air Gapping for More Sensitive Data

Air gapping is a system that keeps a copy of your data separate from your network – either offline or in another way. This entails making at least a second backup copy of your data, then putting it on another server which is unconnected from external sources (internet).

This is a feature that you would be wise to look into if you deal with highly sensitive data. It helps to ensure that you have at least one other copy of your backup, which is walled off from common internet-based attacks.

Think of Tom Cruise in the first Mission Impossible movie entering the CIA’s mainframe room by suspending himself from the ceiling. The only way to access their data was to be at the keyboard in that room.

Make it impossible for cybercriminals to get to every copy of your backups.

Frequently Asked Questions

What backups are necessary?

Ideally, you should have these three:

Local Backup (in your office, unconnected to the network
Cloud Backup (make sure you provide enhanced security)
Cloud to Cloud Backup (an extra layer of protection)

Are external hard drives good for backup?

There are pros and cons to this backup method:

Pros

No Internet Access
You can connect an external hard drive to your computer and access the backup at any point in time – without involving the internet. An external hard drive speeds up the overall backup process since you don’t need to be online to back up or access files. This data backup strategy can come in handy when you want to access a few files from backup.

Inexpensive
Hard drives are comparatively less pricey than other backup mediums. 2TB external hard disk costs you around $60. Small organizations can save their backups on external HDDs with minimal costs.

Data is Safer
An unconnected hard drive is not exposed to hackers. They would have to physically steal it in person. The hard drive is only vulnerable to attacks when it is connected to a computer.

Compatibility
External hard disk drives are compatible with most operating systems: macOS, Windows, Linux PCs, etc.

Unlimited Write Cycles
You can rewrite the hard drive as many times as you want.

Cons

Can fail because of a hardware issue

Needs to be connected to a computer for use

Can be lost, stolen, or misplaced by anyone

Transporting the hard drive from one place to another can be a tedious task

Backup needs to be maintained manually (if not configured to do this automatically)

How do I protect my cloud data from hackers?

1) Back up your data locally – in a solid state external hard drive and a NAS or SAN unit not connected to your main network – so you maintain control of your data that hackers cannot get to. You may want to go the extra mile and secure your most sensitive data locally, rather than in the cloud.
2) Use a cloud service that automatically encrypts your data, and make sure it is set up to do so.

What is the best backup for Office 365?

According to afi.di, a Georgia company that specializes in digital data protection, the best is actually one of the software platforms we use here at ITFIRM.COM. They ranked the top 9 providers based on a number of factors from performance and reliability to cost and the #1 backup software was Veeam.

How secure is your network?

As a longstanding, reputable member of the Charlotte IT Support community, ITFIRM.COM offers a FREE, no-risk network and Cybersecurity assessment. We perform a non-intrusive scan that allows us to deliver a comprehensive report of the state of your system and its vulnerabilities that is yours to keep. There are no strings attached, and you are under no obligation ever to use our Managed IT services.

The two best defenses are next-generation Cybersecurity to protect your data from theft, and a top-notch Managed Services Provider to ensure continued reliability and defenses against newly emerging threats.

We put our 100% Money Back Guarantee in writing, so there is no risk in trying us out. Because we do not require a ‘hard’ contract, our clients can fire us at any time with 30 days’ notice. We have to be good.

Among the Managed IT services we provide:

IT HelpDesk Service
Onsite IT Support
Cybersecurity
Cloud migration and management
Email migration services
Backup and disaster recovery
VoIP phone systems
IT disposition and recycling
Office moves
White label services (IT to IT)

Planning an Office Move?

We have the experience to ensure a seamless transition. Your employees will arrive at the new location to find their IT infrastructure ready and open for business! For more information, or to receive your FREE no-risk network and Cybersecurity assessment, just fill out the form on this page or call us at:
704-565-9705