Tag Archives: data protection

The Importance of Data Protection Before a Disaster

Hurricane Dorian is just one event that can potentially affect a business’s access to its data and reemphasizes the importance of having a data protection plan in place. Other events can have the same effect—cyclones, earthquakes, and hurricanes–suspending business operations for days or weeks.  Even a brief power outage can put your company at risk, not to mention the threat of cyberattacks. Read on to learn more about keeping your business’ data safe and accessible. 

Reasons to Safeguard Your Data

Data can be considered the lifeblood of your business, enabling transactions as well as access to customer or patient records, and containing a company’s intellectual property. Loss or compromise due to corruption by malware and viruses, or even a brief outage, can result in costly downtime. Not only that, a company can suffer a loss of revenue and even reputation. If subject to industry regulations, a business can incur fines for revealing personal information. These consequences can be prevented with a solid data protection strategy. 

Assess Data Protection Needs to Develop Your Plan

A data protection strategy starts with assessing your business’ needs. Consider first which data and applications are mission-critical for keeping the business running—for example, phone communications, Internet, and email. Depending on your business type you may need to comply with certain regulations—HIPAA, for example. Consider natural hazards common to your area, and whether you want your data to reside on-premises, or in a cloud data center. With your data in the cloud, it can be accessed remotely and without interruption. If using the cloud, decide which environment is best, whether public or private.  

Test Your Plan and Involve Your Staff

Once your data protection plan is in place, test it regularly to make sure it works. An added benefit is that a test can show any gaps or potential problems, giving you a chance to correct them. It can serve as a good “dry run” for a real disaster. Educate your employees about what practices to follow to protect company data, including how to recognize and report phishing attempts. 

While data protection incorporates numerous practices and procedures, its bottom-line purpose is preserving your company’s revenue and reputation. For help developing your data-protection plan, contact your trusted technology advisor today.

The Importance of Data Protection in Business Continuity and Disaster Recovery

In the last week, two earthquakes have shaken southern California, alerting us to the need to have our businesses prepared for a disaster, whether natural or manmade. Not only can fires, floods and earthquakes cause business interruptions, but so can systems failures, human error, malware and ransomware attacks. It’s never too soon to evaluate what needs to be done to prepare your business for a disaster. And a disaster doesn’t have to be large-scale; a power outage of an hour or two can be enough to stall business operations. Read on to learn about the most important things to do before an emergency

Make Data Protection a Key Part of Business Continuity

Data is the lifeblood of many businesses, its loss or compromise affecting their ability to do business. Data is needed for transactions and communications, among other functions, and even a short period of downtime can have a potentially disastrous impact on revenue and reputation. When considering the data protection aspect of your business continuity plan, focus on your mission-critical data and applications. What do you need in order to stay in business during a disaster, or recover afterward? Perhaps it’s customer records, or an in-house research database. Be sure to get mission-critical data backed up first, so your business can continue operating. Make sure there is failover—when one network backbone falters, another picks up the slack.  

Different Methods Can Achieve the Same Goal

While the ultimate goal is to remain in business without compromise of revenue or reputation, different methods exist to realize this goal. However, one common thread is the idea of storing data offsite, in the cloud or in geographically diverse data centers. Throughout the working day, “snapshots” can be taken of business activity, and copies placed in these data centers, which adds an extra layer of security. Software-defined wide area networks (SD-WAN) are another good option, with multiple carriers providing redundancy and reliability. Finally, storing data in the cloud can help you access it in case you can’t get physical access to your office. Many tools exist for helping minimize the impact of a disaster.

Instead of waiting for a disaster to slow or stop your business operations, learn how protecting your data can keep your business running during and after a disaster. To evaluate your preparedness and make strides toward business continuity, contact your technology advisor today.

The Importance of Data Protection

Cyber attacks and data breaches are regularly in the news, and often come with a loss or exposure of customers’ data and a loss of reputation to the business. Large, well-known businesses are often in the headlines; small to medium-size businesses, however, are just as much at risk.  Knowledge of cybersecurity practices has yet to keep up with new threats. According to CompTIA’s 2018 Trends in Cybersecurity report, “Businesses with fewer than 100 employees are far more likely than their larger counterparts to feel that their IT security is simply adequate or unsatisfactory. Without a deep resource pool to lean on, smaller firms struggle to address new facets of IT security.” To learn more about protecting your data, read on.

The Importance of Data Protection

When a cyberattack occurs, customer data can be either lost or get in the hands of cybercriminals. As a result, customers can lose trust in your company to keep their data safe, data that is generated through online interactions with your company. How do you protect this data, your relationships with your customers, and your company’s bottom line? Your business may also be subject to regulatory compliance, such as following GDRP, HIPAA or PCI-DDS. As ever, it’s important to keep antivirus and anti-malware definitions up to date and to monitor your network. Backing up data in the Cloud is also an option to consider. But just as important is to develop a culture of cybersecurity in your organization.

Develop a Culture of Cybersecurity

Managers and CEOs can set the tone for a culture of cybersecurity by emphasizing the benefits of data protection. Not only does it keep customers safe, it can keep employees safe, too. Educate your employees about every individual being an end-user, both at work and outside of work. Remind them of the importance of protecting their own data on social media, and how it’s easier to prevent a breach than repair the effects of one. The same goes in the workplace. Data protection can help keep the business running and keep employees working effectively without experiencing downtime.

Training employees doesn’t have to be a one-time event, nor does it have to be dull. Inventive executives can create incentives and rewards, such as the confidence that they are protecting the company and themselves or giving a prize to the first person to accurately recognize a phishing attempt.

Assess Your Current State of Security

A good place to start is to assess your current level of data security; an audit of your computing resources will help you know where you stand.  Contact your technology advisor today to start on the road to data security.

How To Stay in Business with a Business Continuity and Disaster Recovery Plan

With technology growing by leaps and bounds, and regulations assigned to protect the data generated by this technology, you need a business continuity and disaster recovery plan in place to determine how that data is collected, protected, analyzed and stored. Read on to find out how to protect your company from data loss and its consequences.

Why You Should Care About Data Protecting Your Data

According to COMPTIA, data protection will be a key trend in 2018 and beyond. Businesses will continue to generate large amounts of data; for some companies, regulations such as PCI, GDPR and HIPAA require protection of data and plans for business continuity in the face of potential data loss. Even without the need for compliance to regulations, businesses need access to their data even in the event of a natural disaster or a cyberattack.

How Much Downtime Can you Afford?

The average cost of downtime is $5,600 per minute. Not only that, but if your business is inaccessible during a flood, fire or other disaster, or simply a power outage, customers can lose confidence in the product or service you provide. Even more serious is the prospect of confidential data being lost or exposed. Having a plan in place can make the difference in whether your business stays in business.

What to Include in Your Plan

How much data can you afford to lose, and how long can you be without it? The best plan provides for storage and restoration of data during and after a disaster. How long can your systems be down before it affects profitability? How will you restore data that is lost? A robust plan is one that enables your company to retrieve lost data as quickly as possible. Data can be stored on-premise on a server, or in the cloud, or a combination of both. Once you have a plan in place, test it to make sure it works, and verify it periodically to make sure all your data is accessible.

Having a plan for business continuity can keep your business in business during a disaster and afterward. If you do not yet have a plan, or if you’re not sure the plan you do have is optimal, contact your trusted technology advisor today.

Is Patch Policy Part of Your Data Protection Plan?

Data security needs to operate on more than one front. Not only does your network need to keep data secure, it needs to respond to threats both inside and outside the business. There are numerous protections, including current anti-malware and anti-virus software and operating system patches, to keep your network stable and secure. Read on to find out how operating system patch policy can be part of your data-protection plan.

The Role of Operating System Patches

Operating system patches are updates that help maintain the stability and security of your network. These updates come out on a regular basis and are needed to keep systems working. Typically, operating system patches are frequently available, although older operating systems past end of life may no longer have patches. Windows 7 and Windows server 2008 are next up for end of life in January of 2020. Some are vital to your mission-critical systems and must be accessed immediately, while others may pertain to less-vulnerable systems, and can be postponed.

How a Service-Level Agreement Can Help Protect Your Data

Instead of trying to choose which operating system patches need to be installed now, let your managed service provider take over. Draw up a service level agreement that specifies what services the managed service provider can take care of, including backup, data recovery, network security updates, and operating system patches. Keeping your systems—including operating system patches—current helps protect your data and prevent downtime. The MSP can detect and resolve many problems remotely, outside of business hours.  Problems can be solved before they result in downtime for your business, and a reputable IT business can help to prevent a potentially expensive problem before it even starts.

Your network is only as strong as its most vulnerable point. Talk to your technology advisor today about how a service plan, including current operating system patches, can help keep your business running smoothly.

Technology Budget

What’s in Your Technology Budget Next Year?

Many companies start their budget this time of year. As you are thinking about strategic investments, consider how you can leverage technology to improve customer service, make your employees more productive, and possibly save money. Here are a few considerations for next year’s technology budget.

Network Upgrade

Your network is the backbone of your technology infrastructure. Growing demand for high bandwidth activities including Communications and Collaboration, Call Center and Cloud Backup all require a bullet-proof network. What’s more, a number of advancements in Software Defined Wide Area Networking (SD-WAN) could save you a bundle. Consider having a network assessment or Telecom Expense Audit to see if you can save on your communications and networking costs next year.

Fixed Priced IT

If you haven’t deployed Managed Services to augment your technology infrastructure, you might consider how you could benefit from this model. By proactively monitoring and managing your infrastructure, your systems will work better and your cost of systems updates and support will be fixed.

Cloud Computing

The economic model of Cloud Computing allows companies to avoid unnecessary capital expense (CapEx) and use operating expense to subscribe to a range of Cloud Services.  Software as a Service (SaaS) provides the latest version of your popular productivity applications, and Infrastructure as a Service (IaaS) offers a consumption model for scalable computing power.

Data Protection

Cyber threat, privacy data breach, human error and natural disasters can put your business at risk. Having a solid data protection plan helps businesses avoid the unnecessary downtime, fines, legal fees, and loss of reputation associated with data loss.

There are many ways to invest in the future of your business. Technology infrastructure is one of them. Consult your technology advisor now to get input on your planning for next year.

Disaster Recovery and Data Protection –Now More Than Ever

Disaster Recovery PlanRecent Hurricanes Harvey and Irma, along with major earthquakes in Mexico, remind us how vulnerable we can be to disasters, and underscore the importance of data protection. As businesses depend on access to a range of systems–including call center, communications and collaboration application, customer management, and more–having a solid data protection plan can help you in a disaster recovery scenario. Now more than ever, a range of options exist to help maintain business continuity. Here are a few options to consider.

 

Review Your Data Protection Plan

Key to your data protection plan is identification of mission-critical systems. The most important systems should be redundant, with the ability for failover in the event of a disaster. Your data centers and failover options should be geographically dispersed and on different network backbones. This can minimize downtime and get you back up and running sooner. Having your data backup available in Cloud Storage can help you recover other important files and application data if you lose access to your on-premise systems.

SD-WAN for Business Continuity

Software-defined wide area networks (SD-WAN) can also provide you a highly reliable and redundant network. Having the ability to switch Wide Area Networks using SD-WAN as an alternative to more costly MPLS solutions can ensure connectivity during a natural disaster. What’s more, Software-Defined Wide Area Networking can save you money in the long run by giving you the flexibility of a multi-carrier solution.

Software as a Service for Disaster Recovery

More businesses are turning to the Cloud for a range of applications–hosted email, Voice over IP (VoIP), Call Center, and others–to keep communications flowing during a disaster. Using Software as a Service (SaaS) for these important communications and collaborations applications keeps your employees, customers and business partners connected even when you are unable to gain physical access to your facilities. Having these applications in the Cloud can help you ensure everyone on your team is present and accounted for.

Don’t wait until a disaster strikes to review your data protection and disaster recovery plans.  Contact your technology advisor today if you are unsure how well you will weather the storm.

Considering Cloud Security

Cloud ComputingAccording to a recent research report “Assessing the Cloud Security Landscape” by the Computing Technology Industry Association (CompTIA), 85% of business owners and IT professionals participating in a survey responded that they are Confident in their Cloud Service Provider. No wonder research firm IDC predicts the market for public and private cloud security to more than double over the next few years. What Cloud Security Concerns are top of mind with business owners, and what can you do to reduce your risk? Read more to find out…

Cloud Security Concerns

According to the CompTIA research, the biggest security concerns are: system downtime and business interruptions; exposure or loss of data during file transfers to the cloud; and concerns over encryption of data (either transactional or at rest). Rounding out the top five concerns from the research are physical security of cloud service provider data centers, and shared technology vulnerabilities in a multi-tenant environment. Many of the risks related to these issues can be avoided with appropriate technologies, and by adhering to industry compliance regulations.

Questions to Ask About Cloud Security

To help you sleep at night, there are a number of questions you can ask your Cloud Service Provider to better understand security considerations. You may want to know where your data resides. Understanding data residency could help you navigate standards related to regulatory compliance or specific country requirements on data residency. Consider asking your Cloud Service Provider about their encryption policies, business continuity and disaster recovery plans, and their data integrity and retention policies.

Is the Cloud Right for All of My Data?

Data that is strictly regulated by industry compliance, or that is highly sensitive or competitive, may not be right for Cloud Computing. This makes the case for having a solid internal IT infrastructure in addition to investment in Cloud Computing technology.

As Cloud Computing matures, so will the technologies designed to protect against threats. To stay on top of these issues and trends, reach out to your technology advisor to understand the impact of Cloud Security concerns for your business.

 

Can A Business Continuity Plan Save Your Reputation?

Reputation Management is a hot topic in the boardroom these days. Having a solid business continuity plan could make or break your company’s ability to survive a data breach or other systems failure that could tarnish your hard-earned reputation. Company news about data loss, systems downtime and other unplanned interruptions occur with regularity. According to technology research firm Gartner, a business that has a catastrophic data event has a two-year survival rate of just 6%. Surprisingly, your company can avoid these scenarios by having a solid BC/DR Plan. It is no surprise that recent research by MarketsandMarkets forecasts the spend on DR as a Service (DRaaS) to grow from $1.68 Billion in 2017 in revenue to $11.11 Billion by 2020. Read on to find out how a Business Continuity Plan could save your business.

Understand Your Business Continuity Risk and Exposure

A great place to start with Business Continuity planning is a review of your company policies and procedures. Your business continuity policies should — in addition to identifying the technical standards for managing your company’s applications, data, and related infrastructure — should identify acceptable risk, what your employees will do in a disaster recovery scenario, and identify any compliance requirements. It is important to understand what information is most important and to consider the risks of suffering a data loss. What would be the impact to your revenue, productivity and reputation? If you could not access your information, or it was subject to data breach, how may that impact your customers’ trust and your business’s reputation?

An Ounce of Planning is Worth a Pound of Cure

Ensure you have a solid data protection plan. Ask yourself; how often is your data backed up, how fast could you recover if needed, who are the stakeholders and how would you communicate with them if you suffered a data loss? Another consideration is your Recovery Time Objective (RTO). Your RTO is how long it will take to restore your data. The size of your data and backup methodologies can impact how long recovery may take. Your network may also be a factor in how quickly you can get up and running. Network bottlenecks can turn a routine restore into a never-ending project. Make sure your network is robust enough to meet your Recovery Time Objectives. Also, remember to train your employees on how to avoid malware and phishing schemes. Last but not least, test your backups regularly to ensure data integrity.


Proactive Communications and Rapid Recovery are Critical

If you find yourself in a situation where your data has been compromised, most experts agree you should respond quickly and proactively. As of last count, the United States had 48 state data breach notification laws to comply with. Many countries around the world have various data protection breach notification laws as well. The EU is in the process of implementing The General Data Protection Regulation (GDPR), which establishes data protection guidelines for its citizens’ information.

Having a Business Continuity plan could save your business. Being able to rapidly respond in a disaster recovery scenario is a critical element of survival. Not only will it help you get back up and running quickly, you will avoid unnecessary fines and protect your company’s reputation. If you feel your business would benefit from a risk assessment, contact your technology advisor today.

The Importance of Maintaining Network Compliance

Network SecurityLast month’s blog provided information about ways to “Avoid Being Held Hostage by Ransomware.” Eight days later, on May 12, 2017, there was a global outbreak of the Wanna Cry Virus. With Cyber Threats on the rise, the importance of maintaining network compliance is top of mind with business owners and IT professionals alike. Industry compliance regulations, including PCI, HIPAA, and SOX, drive best practices in Network Compliance. However, most businesses today rely heavily on their systems to access Cloud Services, Voice, and Data Networks for mission-critical applications that run their business. What can you do to maintain network compliance?

Automate Your Network Administration

Keeping operating systems and network configurations up to date is a top priority for network compliance. Each device that connects to your network needs to have up-to-date operating system security patches, anti-virus definitions, and malware threat prevention in order avoid un- intended intrusion of your network. There are abundant tools and managed services to help your business stay up to date without adding to your internal labor cost.

Proactively Monitor Your Network

Monitor your network to identify any systems that are out of compliance. Proactive monitoring can also identify unauthorized devices connected to your network. You can monitor your network traffic to identify unusual use of network bandwidth. Aside from slowing down your systems, excessive bandwidth may be the result of a malware-infected device that is exploiting your network.

Documenting Your Network Security Controls

Achieving compliance with documented security procedures including password policy, systems maintenance, backup procedures, and compliance measures, is critical to following most industry compliance regulations. It is a  best practice to update these procedures annually. Reviewing your Network Compliance policies gives your business an opportunity to stay up to date and serves as a reminder of the importance of maintaining network compliance.

Contact your Technology Advisor if you have questions about maintaining network compliance or other concerns regarding ransomware and other related Cyber Threats.