Will business data survive?

November 2018 Editor's Choice, Infrastructure, Security Services & Risk Management

When it comes to business continuity and disaster recovery, companies often think it’s acceptable to have backups of their data to cater for unexpected events. At the same time, certain companies also try to ensure they have an alternate location for their staff to work from in case of an extreme event like flood, fire or political violence.

Iniel Dreyer
Iniel Dreyer

Iniel Dreyer, managing director at Gabsten Technologies warns that, while the above are necessary and should be part of any continuity plan, people need to realise that a business’s data really is key to any backup plan you may have. This doesn’t mean you simply need to make a backup of your data, but that you must ensure it is accessible, even in a worst-case scenario.

Even if a worst-case scenario happens and a business premises is inaccessible, a company could even have its employees working from home as long as they can access the applications and data they need to do their jobs. All too often, however, this will be a problem because the company’s planning did not cater for these types of events.

Dreyer gives an example of a fire, which is pertinent given recent events in Johannesburg. If a company’s building is inaccessible because of a fire, where is its data? They may have a backup copy in a fireproof safe, but how do they get to it when access to the premises is forbidden? Perhaps the company has a data centre and has designed it correctly so that it is fire proof, but again, even if you can access the location, how do you get to the data once the fire department has cut the electricity to the building?

The same concept applies to data on computers and laptops (and in certain cases, even mobile devices) these days. Executives may have critical information on their computers and if a device is stolen it’s easy to wipe the data remotely, but where is the data backup for easy access? In many cases, a USB drive would have a backup, but it would be in the individual’s laptop bag which is now in the wrong hands.

In cases like this, one has to consider how the backups were done. Is it encrypted so that even if the wrong people get it they can do nothing with it, or did the user simply copy files to a USB without thinking of the consequences?

And this applies to all companies, from large enterprises through to small- and medium-sized businesses (SMBs). Gartner recently found that only 35% of SMBs have disaster recovery plans in place, and Dreyer says these companies are hardest hit by disasters.

The cloud in a crisis

When an SMB loses its data, or access to its data, it can’t service its existing customers or get new customers. And for a small company on a budget this can have serious implications, both for the company and its employees.

A relatively cheap and easy solution is to use a service such as Dropbox to store your data in the cloud (although it’s advisable to ensure you meet local regulations in terms of storing sensitive data offshore). Cloud-based solutions like this are very useful. However, Dreyer says that these large companies would see an African SMB as a blip on the radar and if you have a problem it is very hard to be able to speak to someone and get help when you need it. You are basically on your own and you may end up having to download gigabytes of data from an international location before you are up and running again – if everything goes as expected.

What happens if you accidentally deleted a file from your cloud service provider’s server? What do you do then? Dreyer says this is why it is critical to have a local partner to phone when something goes wrong. In the worst case, you may need more than a phone call and a technician may have to come out and spend some time getting you up and running. International cloud services are cheap because there is no interaction apart from email, which may take a long time to be answered.

It’s worth reading the contracts, or terms and conditions of cloud providers to see what they actually guarantee to provide. They provide a convenient infrastructure, but do they back up your data? What happens if they are hit by a disaster or some form of cyber-attack like ransomware?

Even if you regularly back up your data to an external drive and keep it offsite, how sure are you that when you plug it in you will have all your data available. (How many people test their backups to make sure they can be restored?)

It’s all about service

The solution, according to Dreyer, is to deal with the basics before you get into the complexities of a full business continuity and disaster recovery plan. For example, ensure there are multiple copies of your data backed up, including having it available at a different location (not on the same site or in someone’s laptop bag). Additionally, you should store two copies offsite, one of them on a different medium than the original – a cloud solution could be used for this.

He warns that companies need to choose their cloud providers with care, ensuring they take the necessary steps to ensure that the data entrusted to them is available, even if their infrastructure goes down. As noted, the ability to contact a trusted service provider is also of importance.

In the end, it’s all about service, not just having your data stored somewhere. When you need help, you need to know it’s easily and conveniently available. And most important of all, always remember that your data is something you need to use. Getting it back from a service provider is one thing, but getting it back and available for normal business use quickly is another challenge altogether.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What is your ‘real’ security posture?
BlueVision Editor's Choice Information Security Infrastructure AI & Data Analytics
Many businesses operate under the illusion that their security controls, policies, and incident response plans will hold firm when tested by cybercriminals, but does this mean you are really safe?

Read more...
What is your ‘real’ security posture? (Part 2)
BlueVision Editor's Choice Information Security Infrastructure
In the second part of this series of articles from BlueVision, we explore the human element: social engineering and insider threats and how red teaming can expose and remedy them.

Read more...
From the editor's desk: The beginning of the end
Technews Publishing News & Events
            As we come to the final issue of SMART Security Solutions, we can look back on a tough year: long decision-making cycles, squeezed budgets and the expectation of miracles on a shoestring. SMART Security ...

Read more...
IQ and AI
Leaderware Editor's Choice Surveillance AI & Data Analytics
Following his presentation at the Estate Security Conference in October, Craig Donald delves into the challenge of balancing human operator ‘IQ’ and AI system detection within CCTV control rooms.

Read more...
AI and automation are rewriting the cloud security playbook
Technews Publishing AI & Data Analytics
Old-school security relied on rules-based systems that flagged only what was already known. AI flips the script: it analyses massive volumes of data in real-time, spotting anomalies that humans or static rules would miss.

Read more...
Onsite AI avoids cloud challenges
SMART Security Solutions Technews Publishing Editor's Choice Infrastructure AI & Data Analytics
Most AI programs today depend on constant cloud connections, which can be a liability for companies operating in secure or high-risk environments. That reliance exposes sensitive data to external networks, but also creates a single point of failure if connectivity drops.

Read more...
Toxic combinations
Editor's Choice
According to Panaseer’s latest research, 70% of major breaches are caused by toxic combinations: overlapping risks that compound and amplify each other, forming a critical vulnerability to be exploited.

Read more...
Syndicates exploit insider vulnerabilities in SA
Information Security Security Services & Risk Management
Today’s cyber criminals do not just exploit vulnerabilities in your systems; they exploit your people, turning trusted team members into unwitting accomplices or deliberate collaborators in their schemes.

Read more...
Short-range indoor LiDAR sensor
OPTEX Perimeter Security, Alarms & Intruder Detection Infrastructure Products & Solutions
The REDSCAN Lite RLS-1010L has been developed to provide comprehensive coverage and protect high-risk security zones and vulnerable, narrow indoor spaces that are difficult to protect with traditional sensors.

Read more...
Direct-to-cloud surveillance platform
Surveillance Infrastructure
Oncam has announced a forthcoming end-to-end, direct-to-cloud video platform that combines AI-enabled cameras, intelligent IoT devices, and cloud-integrated video management software to deliver smarter performance with reduced complexity.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.