<div dir="ltr"><a href="http://www.cloudwards.net/how-to-protect-your-data-when-disaster-strikes/">http://www.cloudwards.net/how-to-protect-your-data-when-disaster-strikes/</a><br><p>Although I’m sure, everyone wishes they could, it’s impossible to keep up with all the new cyber threats coming up every day.</p>
<p>Hackers, like viruses, continuously morph and devise new ways to
bypass developing security technologies, and attack data centers.</p>
<p>So, even when data gets protected by multi-layered security
protocols, there are always people working to find ways to crack it, and
the more complicated a security system, the better.</p>
<p>As a matter of fact, they even hold hacking conferences for the ‘most brilliant’ hackers.</p>
<p>I’m relaying this information to discourage you from implementing security measures.</p>
<p>On the contrary, I think you need to persistently review safety
protocols, ensure they are up-to-date (super important step), and
reasonably effective against the latest types of ransomware and other
forms of malware.</p>
<p>However, you cannot rely on this methodology alone.</p>
<p>Even antivirus software vendors acknowledge that ransomware has infiltrated well-protected systems.</p>
<p>And malware distributors are increasingly sophisticated when it comes to luring end users into downloading their junk through fraudulent emails and links.</p>
<p>Over the last one year alone, <a target="_blank" href="https://fightransomware.com/resources/">95% of businesses</a> have experienced disasters unrelated to natural causes.</p>
<p>Most of the disasters suffered, as you might have already guessed, were caused by malware (particularly ransomware).</p>
<p>And sadly, <a href="http://www.itispivotal.com/2012/08/10-backup-disaster-recovery-statistics-must-know/" target="_blank">93% of companies</a> that failed to restore their data within 10 days ended up filing for bankruptcy within a year. </p>
<p>So, can you protect your data in case of a disaster?</p>
<p>And more importantly, how can you comprehensively prepare a business to effectively handle cyber disasters?</p>
<h2>Conduct a Comprehensive Data Assessment</h2>
<p>The first step in data protection is, of course, mapping out your
entire data center and separating high-value assets from the rest.</p>
<p>Customer data, for instance, is more important compared to temporary system files.</p>
<p>You can afford to lose the latter, but not the former.</p>
<p>That’s why, you should first focus on protecting and backing up more critical files, before proceeding to less important ones.</p>
<p>To simplify this process, consider leveraging a comprehensive data
governance software, which utilizes usage intelligence to classify data
and align it according to corresponding departments.</p>
<p>That way, you’ll be able to prioritize on what to protect and what not to.</p>
<h2>Leverage Cloud Backup</h2>
<p>There is an advantage to using hybrid cloud solutions, as they offer off-premise and on-premise cloud backup.</p>
<p>That way, you can decide which data to keep in offsite backups, and
protect it separately from your onsite systems—which are vulnerable to a
variety of threats, such as:</p>
<p> Power outages</p>
<p> Hard drive failures</p>
<p> Floods</p>
<p> Theft</p>
<p> Godzilla</p>
<p>If ransomware gains access to an administrative account, all backed
up data could get encrypted along with the rest of your drives.</p>
<p>The best recovery and protection procedure, therefore, will be in the cloud.</p>
<p>Personally, I’ve integrated Carbonite into my overall data backup and protection strategy.</p>
<p>To protect myself, I’ve scheduled backups to automatically occur every 24 hours.</p>
<p>In the case of a disaster, Carbonite provides a recovery management
tool, which will help me restore all my files from the most critical to
the less important ones — on a drive of my choice.</p>
<h2>Control and Manage System Privileges</h2>
<p>With the business environment progressively changing, endpoint
devices, have become an integral part of the IT infrastructure in most
companies today.</p>
<p>Unfortunately, through a 2014 <a target="_blank" href="https://www.promisec.com/blog/2014-state-of-the-endpoint-study-an-infographic/">State of the Endpoint study</a>, 65% of IT professionals surveyed, had been victims of advanced persistent threats via their endpoint devices that year.</p>
<p>And according to 71% of them, that, among other reasons, has made endpoint security threats harder to mitigate.</p>
<p>Therefore, even when you employ water-tight measures to safeguard a
system against vulnerabilities emanating from the internet, there are
potentially greater risks from endpoint devices.</p>
<p>Making matters worse 66% of third-party applications are regarded as threats to endpoint security.</p>
<p>In addition to implementing endpoint security measures, therefore, you should adequately control and manage account privileges.</p>
<p>The main admin account should have minimal, if any, connection to endpoint devices like:</p>
<p> Smartphones</p>
<p> Desktop computers</p>
<p> Laptops</p>
<p>Tablets</p>
<p> Printers</p>
<p>That way, any malware that attempts to penetrate your system can be
contained within the entry user account, without affecting the rest it.</p>
<p>Another strategy, especially when a disaster strikes, would be disaster-proofing original files by encrypting them before they are attacked.</p>
<p>Of course, the most important ones should be given priority, as you
try to contain an attack before it spreads to operation-critical data.</p>
<p>By minimizing exposure, you’ll also be protecting other files from unauthorized access.</p>
<p>It’s pretty much like closing off all your valuables in a single safe room when you notice an intruder in the home.</p>
<hr class="gmail-hr">
<h2>In Summary…</h2>
<p>For all these measures to be perfectly aligned, you should have a disaster recovery plan that includes:</p>
<p> Critical protection strategies</p>
<p> Off-premise backup</p>
<p> Restoration procedures</p>
<p> Subsequent recovery processes</p>
<br>
</div>