![]() ![]() Storing backups of critical data in a separate, offsite facility can help your organization prevent data loss. Regardless of the type of storage devices you use, you need to ensure you protect them, and the data contained on them, with other security controls, such as encryption, malware scans, and proper sanitization or disposal. However, ransomware can attack NAS devices and affect your backups. Network-attached storage (NAS) devices connect directly to your network and enable users whose devices aren’t connected directly to removable storage media to access the stored data. However, this media and your data must be protected against damage, theft, and loss. tapes, CDs, DVDs, USB flash drives, and external hard drives) is convenient and relatively inexpensive. We recommend storing a copy in another location to prevent data loss.ĭifferent storage devices include the following examples: However, if you are only storing backups onsite, you may still experience data loss if your entire facility is affected by a fire or flood, for example. Backups are readily available should you need to initiate your recovery process. Onsite storage is convenient and can be time efficient. With onsite storage, you store your backups within the physical space of your organization. However, having backups stored in a secondary location (offsite or in the cloud) can help you resume your business activities. Natural disasters can cause damage to buildings and physical assets that may restrict your ability to access them. Most businesses have emergency plans to respond to these incidents, and backups should be a part of those plans. Natural disasterįire, floods, and earthquakes can happen. With backups and a recovery plan, you can minimize downtime during recovery. Threat actors use this attack to disrupt business activities and services or create a distraction while you’re trying to recover, they may be stealing data. ![]() a server) with traffic to crash systems and makes websites and internal services unavailable. In a denial of service attack, a threat actor floods a target (e.g. While backups can help you restore your systems and information, keep in mind that they won’t prevent a threat actor from selling or leaking any stolen data. By having backups, you don’t need to pay the ransom (sometimes paying won’t guarantee you restored access anyway). Ransomware is a type of malicious software that locks you out of your systems, devices, and files until you pay the threat actor. Backups can ensure that your organization doesn’t lose critical information as a result of a failure, a crash, or an unplanned outage. ![]() Systems and devices can fail or crash, causing downtime or outages that can impact your business processes and activities. There may be times when your organization will be glad it has backups, including some of these common example scenarios: Failure or outage In the event of an outage, a natural disaster, or a cyber attack, you can use your backups to restore systems, get your business up and running as quickly as possible, and minimize the amount of information, time, and money that could be lost due to downtime. Recovery: Recovery is the process of restoring your systems and information.In the event of an outage, a natural disaster or a cyber attack, backups ensure that your employees, partners, and customers can continue to access the information they need, when they need it. Availability: Protecting the availability of systems and data is a key component of cyber security.If something does happen to your organization, your backups are critical for two reasons: You never hope for natural disasters and cyber attacks, but they can happen. If your networks, systems, or information are compromised by a threat, such as a virus, or damaged due to a natural disaster, a backup helps your organization minimize downtime and get back to business quickly. Having a backup (a copy) of your organization’s information is one step that you can take to improve your cyber security and your resiliency as a business. Alternate format: Tips for backing up your information (ITSAP.40.002) (PDF, 260 KB) ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |