If You Connect It, Protect It – NCSAM Week 1

Share This Post

Share on facebook
Share on linkedin
Share on twitter
Share on email

In 2020, there are more internet-connected devices than ever before. In fact, the number of connected devices is predicted to hit 50 billion by the end of the year. 

Think about how many of those devices you own. Whether it be for personal or business use, you can most likely think of quite a few. While these devices make our everyday lives easier, the threat of ransomware or phishing attacks are always on the horizon. 

This year there has been a 715% increase in detected and blocked ransomware attacks. With more and more people working from home, hackers are more easily finding their way into networks. So how can you protect the devices that help you every single day? We’re here to tell you!

Backup Your Connected Devices Using the 3-2-1-0 Rule of Backup

The 3-2-1-0 Rule of Backup is simple, but not all organizations follow it. This rule states that you should have 3 copies of your data, on 2 different media with at least one offsite, and 0 errors when testing. Let’s break this down some more:

  • Three copies of data: In addition to the primary or production data, there should be a backup copy of the data and also a copy of the backup data. 
  • Two types of media: Having multiple forms of media prevents drives in the same data center from being corrupted.
  • One Off-site Copy: Physically distancing your copies ensures that a disaster, such as fires, floods, hurricanes, and more will only affect one copy of data.
  • Zero Errors in Testing: Testing your backups is always important, but more importantly, you want to make sure your backups and restores work in case of an emergency.

More information here: Veeam, DRaaS, Immutable Storage

Regularly Test Your Backups

We understand the hesitation some users have when it comes to the cost of testing backups, but how does that compare to the cost of downtime?

Oftentimes getting top management to appreciate and demand comprehensive and professionally managed data protection is difficult, but is the first step in making sure your backups are being managed properly.

Employee Training

In many cases, hackers can gain access to your network by sending a malicious link in a safe-looking email. Resources like KnowBe4 that can help employees identify and avoid these types of errors.

Additionally, limiting the access that employees have to items they don’t need can help stop the spread of malware during an attack.

October is National Cyber Security Awareness Month. Follow along with Managecast, the CISA and NSCA for tips on how you can stay safe online. Do your part, #BeCyberSmart. https://www.managecast.com/cyber-security-awareness-month/

More To Explore

Azure File Share with Veeam

In the Azure portal, you will select the storage account that your file share is currently being stored in. Select the File share that you