Disaster Recovery and Data Protection –Now More Than Ever

Recent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems–including call center, communications and collaboration application, customer management, and more–having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.   Review Your Data Protection Plan Key to your data protection plan is identification of mission-critical systems. The most important systems should be redundant, with the ability for failover in the event of a disaster. Your data centers and failover options should be geographically dispersed and on different network backbones. This can minimize downtime and get you back up and running sooner. Having your data backup available in Cloud Storage can help you recover other important files and application data if you lose access to your on-premise systems. SD-WAN for Business Continuity Software-defined wide area networks (SD-WAN) can also provide you a highly reliable and redundant network. Having the ability to switch Wide Area Networks using SD-WAN as an alternative to more costly MPLS solutions can ensure connectivity during a natural disaster. What’s more, Software-Defined Wide Area Networking can save you money in the long run by giving you the flexibility of a multi-carrier solution. Software as a Service for Disaster Recovery More businesses are turning to the Cloud for a range of applications–hosted email, Voice over IP (VoIP), Call Center, and others–to keep communications flowing during a...

The Importance of Maintaining Network Compliance

Last month’s blog provided information about ways to “Avoid Being Held Hostage by Ransomware.” Eight days later, on May 12, 2017, there was a global outbreak of the Wanna Cry Virus. With Cyber Threats on the rise, the importance of maintaining network compliance is top of mind with business owners and IT professionals alike. Industry compliance regulations, including PCI, HIPAA, and SOX, drive best practices in Network Compliance. However, most businesses today rely heavily on their systems to access Cloud Services, Voice, and Data Networks for mission-critical applications that run their business. What can you do to maintain network compliance? Automate Your Network Administration Keeping operating systems and network configurations up to date is a top priority for network compliance. Each device that connects to your network needs to have up-to-date operating system security patches, anti-virus definitions, and malware threat prevention in order avoid un- intended intrusion of your network. There are abundant tools and managed services to help your business stay up to date without adding to your internal labor cost. Proactively Monitor Your Network Monitor your network to identify any systems that are out of compliance. Proactive monitoring can also identify unauthorized devices connected to your network. You can monitor your network traffic to identify unusual use of network bandwidth. Aside from slowing down your systems, excessive bandwidth may be the result of a malware-infected device that is exploiting your network. Documenting Your Network Security Controls Achieving compliance with documented security procedures including password policy, systems maintenance, backup procedures, and compliance measures, is critical to following most industry compliance regulations. It is a  best practice to update...

How to Avoid Being a Ransomware Hostage

Ransomware, spyware, phishing schemes, and other Cyber attacks are commonplace in today’s world of technology. According to a recent article in Forbes, ransomware attacks grew at an accelerated pace in 2016 with reports of 638 million attacks, almost 200 times more than the number of ransomware attacks in 2015. Most experts agree that Ransomware attacks will continue to occur–so what can you do to avoid being a ransomware hostage? Not All Ransomware is Created Equal Before you panic, find out what type of Ransomware you are up against. Scareware is a type of Ransomware that tricks you into thinking you have a bigger problem. A simple scan may quickly remove the pop from your browser cache and get you back on your way. Some ransomware is truly nasty — your entire system may be encrypted, meaning you will need to wipe your system and start over if you have a good backup. Otherwise, you may find yourself hostage to the cybercriminals to unlock your data. An Ounce of Protection is Worth a Pound of Ransom Data protection is an important element in minimizing the impact of Ransomware. Make sure your network security is fully compliant. Backup your data, update your antivirus definitions and make sure your security patches are up to date. Consider using Cloud Backup, Security as a Service, and Managed IT services to keep your network up to date. Having a strong offense to avoid ransomware is your best defense. Don’t Forget the Human Element Train your employees on a regular basis on the importance of staying vigilant against Cyberattacks and how to avoid being a hostage....

Reducing Business Risk with Backup and Disaster Recovery

Does your business have a backup and disaster recovery plan? Businesses of any size should know which applications–and their associated data–they rely on and what the cost of interruption would be in the event of an unintended disruption. Cyber Threat, natural disasters, and systems failures may impact your business; however, human error is said to be the top cause of data breach (58%), ahead of technology errors. To avoid unnecessary downtime, here are some questions to ask to help assess your backup and disaster recovery plans. Assess the Risks of Data Loss and System Downtime With Backup and Disaster Recovery there is always a balance between cost and risk. To allocate your technology spending, it is important to focus on your areas of exposure. Maybe your business relies heavily on an order-processing and invoicing system, or perhaps a manufacturing and inventory control system. If these systems go down you may lose revenue and productivity from employee idle time.   You may also have intellectual property that is important to your business. What would be the consequence if this data was lost and could not be recovered? You may also have compliance exposure, if you suffered a breach of privacy or other data that should be encrypted was exposed. Assessing your risks and ranking the exposure is an important step to evaluate your backup and disaster recovery plan priorities. Not all Backup Plans are Alike For systems you rely on heavily, you may consider having an offsite failover system in the event of a data loss. This can minimize your downtime by enabling you to rapidly cut over to a...

Is Your Network Ready for Cloud Backup?

Ransomware, Privacy Breach, Compliance requirements and Business Continuity make the case to protect your company’s data. Cloud backup and Disaster Recovery as a Service (DRaas) require reliable network access to ensure your IT assets are backed up and available for rapid recovery. Today’s networks also support a range of applications including Hosted Email, SaaS, VDI, VoIP and Call Center Solutions. Your network needs to be in top shape to accommodate these demands. Here are some tips to determine if your network is ready for Cloud Backup. Assess Your Network for Cloud Backup Readiness When adding Cloud Backup, it is important to understand possible points of failure on your network before they happen. Consider starting with a Network Assessment to stress your network in a controlled environment, in order to determine your backup window. Database and file information on a regular backup schedule may impact your network performance if not properly optimized. Make sure your initial backup and incremental backups run smoothly by simulating peak loads for voice and data on your network. In addition, test your backup and recovery scenarios to identify weaknesses in a controlled environment. Proactive network monitoring can identify potential packet loss and latency that can impact connection speed and uptime. This testing is critical to avoid failed backup and recovery.   Proactively Monitor Your Network for Security and Compliance In addition to network usage, Malware and other unauthorized network access can slow your network performance and disrupt your backup and recovery. Your backup may fail when you need it most. Worse, remediating malware during a recovery scenario may delay your ability to bring critical systems...
Skip to content