Disaster recovery strategies for effective business continuity

Issue 3 2022 Infrastructure

Not having access to critical data for even a few hours can cause irreparable damage in the form of lost business, fines and reputational damage. According to Gartner, the average cost of IT downtime is US$5600 per minute.

Whether it’s ransomware, riots or the malicious behaviour of a disgruntled employee, for organisations to recover effectively from a disaster they first need to be sure all their critical data is backed up. However, given the complex nature of today’s multi and hybrid cloud IT environments, there’s every chance they won’t know they have everything valuable protected until it’s too late.

Keeping track of data on multiple different platforms and having visibility of it all is already a major headache for IT departments, never mind ensuring business-critical data is backed up. Therefore it’s important to deploy a backup and recovery solution with the widest coverage and the ability to identify gaps in protection.

Downtime is costly enough when it results from accidental failures in technology, but when it’s down to hackers or malicious behaviour, the monetary consequences can soar to an alarming, often business-ruining rate. The expansion of data across on-premises infrastructure, cloud infrastructure (public, private and multi-cloud), SaaS applications and endpoint devices has only increased the attack surface.

The potential vulnerabilities, arising from configuration weaknesses, are providing cyber-criminals with greater opportunities to wreak havoc.

Adopting a layered defence-in-depth approach with the latest anti-malware for backups enhances the ability to spot zero-day threats, which can make all the difference in avoiding encryption and downtime, as well as exfiltration and extortion. Deploying multiple methods to protect your environment also conforms with guidance recommended by leading government communications and cybersecurity agencies.

There’s no way of keeping on-premises, cloud or SaaS infrastructure or applications 100% safe from a ransomware attack, so it’s vital to protect backups. Whatever malware detection is deployed to scan live data, it makes no sense to use the same for backups. If the software simply checks for the same signatures, malicious files will be missed in both live and backup data.

Deploying a solution that harnesses artificial intelligence (AI) to police backups and detect threats not only verifies the health of backups, it provides yet another chance to spot ransomware before it encrypts everything.

Backup strategy to enable successful recoveries

Air gap: Guarantee that the primary and backup storage systems are physically separated. Bad actors won’t be able to access the backup data copies because of this physical break.

3-2-1-1 strategy: The most recent best practice provides three copies of data, two separate media for backup storage, one offsite backup storage location (online) plus an offsite backup storage location (offline/air gapped).

Backup data malware detection and removal: Ransomware frequently stays idle on a network for long periods of time before encrypting systems, ensuring that it is present in all backup versions, making malware-free recovery impossible. To effectively protect against ransomware, the capacity to detect and remove ransomware from backup data, as well as having an isolated location in which to restore data, has become critical.

Instant/rapid recovery flexibility: Downtime can be just as detrimental as data loss. To be effective, a backup strategy must allow users to get back to work quickly by allowing temporary access to data if needed and prioritising crucial data recovery if it is required.

Backups are the best last line of defence for ensuring a quick recovery, but critical to this is the ability to test those systems on a regular basis to ensure they are working correctly. Your solution should deliver access to files and information immediately in the event of a disaster and the technology exists that allows you to stream on demand whatever is required to keep employees working, while the rest of your data is restored in the background.

Establishing, refining and recording DR steps will improve your operational response and minimise disruption, should an incident occur. An efficient and cost-effective way to do this is to have your backed-up systems and data presented for temporary access as a virtual drive and for permanent recovery to a destination of your choice.

With a cloud-based backup and recovery platform you can also avoid the expense of duplicate data centres and failover infrastructure that sit idle most of the time. A good solution should allow you to start protecting multiple sites on day one with zero upfront costs and scale infinitely with total cost predictability, while regular testing of your disaster recovery processes should give you peace of mind and the confidence that you can respond rapidly in the event of a crisis.

Redstor, the MSP’s backup and recovery platform, offers the simplest, smartest way to serve customers and drive profitability. The solution unifies backup and recovery to protect modern, legacy and SaaS infrastructure with a single app. Streaming provides instant data access and fast recovery, with AI finding and automatically removing malware for safe restores.

Learn more at www.redstor.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Understanding shared responsibility
Infrastructure
Data management is increasingly coming under the governance spotlight, yet a significant vulnerability often goes unnoticed. Many businesses operating on Microsoft 365 assume their data is comprehensively backed up.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...
Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.