Sunday, April 19, 2009

Top 4 Threats Attacking Your Network & What To Do About Them

#1 Overconfidence
User overconfidence in security products is the top threat to your network. Failure to “practice safe software” results in nuisance attacks like porn storms (unstoppable rapid fire pornographic pop-ups) and more subtle keyloggers that steal passwords. Surveys promising free stuff, result in theft of information like your mother’s maiden name, high school, etc. used to answer common security questions leading to theft of otherwise secure data. Think before you click!

#2 Social Networking Sites
Social networking sites like Facebook are exploding in popularity. Threats range from malware (eg. viruses, worms, spyware) to scammers trying to steal your identity, information and money. Many businesses and government agencies are using these sites to communicate with clients and constituents, so simply blocking access is no longer reasonable. Defending your company while allowing employee access requires social network education for your employees and the enforcement of strong acceptable use policies. We can help you develop a policy, then monitor compliance using a Unified Threat Management device that controls and reports on network access.

#3 Attacks On Mobile Devices
Everyone is going mobile these days not just the “road warriors.” Once limited to laptop computers, mobile network devices now include PDAs, handheld computers and smart phones, with new appliances appearing in the stores every month. Mobile devices often contain sensitive data yet they are easily lost or stolen. Be sure to password protect and encrypt data on all mobile devices whenever possible. Include mobile devices in your acceptable use policy.

#4 Cloud Computing
“The Cloud,” in its most simple form, involves using the Internet to access and store your data. When you access email using a web browser, you are working in “the cloud.” Using the cloud for automated off site backup is rapidly gaining popularity and is just the beginning. Companies like Microsoft, IBM and Google envision the day when we will use inexpensive terminals instead of computers to run programs and access data located somewhere on the Internet. You need to be sure that any data you store and access across the Internet is secure not just where it is stored, but during the trip to and from the Internet.

Monday, April 13, 2009

The Data Storage Rule of Three

If you really want to keep your data safe and ensure that it will not be lost, destroyed, or corrupted in the event of a disaster, most storage practitioners advise keeping it in at least three locations.

A single location gives you virtually no protection against disaster. Two locations might be enough, as long as one is offsite – but even then you risk data loss if both locations fail at the same time. For example, imagine a virus corrupts your server and wipes out your CRM database. You go to a tape backup to repopulate the database, only to discover that the backup is worn out or corrupted. Or, as we’ve read about numerous times in the news, your tape backup gets stolen out of your home, car, or wherever you’re storing it.

That’s why you really need three separate locations for your data, with at least one of them offsite. While all three locations or media could theoretically fail at the same time, the chances of that happening are minimal.

So why must one location be off site? To avoid a tragedy like the following one happening to your business. (We’re not naming names here because this isn’t a story about a client – but it did happen to somebody we know. We wish they had been clients, because we could have made certain this didn’t happen!)

A long-established company had years’ worth of data to store, including a CRM system and detailed records on past projects. They knew it was important to be well covered when it came to backups, and their technician assured them the data was stored in three places.

Then disaster struck – not through any fault of the company. A fire broke out in a neighboring office, and before long the whole building was engulfed in flames. Every server, every computer, and every other piece of electronic equipment in the building was trashed.

You might think the company would be fine – after all, they had redundant storage, and surely one of their storage devices was offsite, right? Wrong. The data was indeed in three places: on the server, on a drive next to the server, and on another drive in the next room.

This story illustrates precisely why it isn’t enough to keep multiple copies of your data. One or more of those copies must be stored offsite – preferably in a geographic location that’s not prone to flooding, hurricanes, or tornadoes. (That’s why many high-security data centers are located in the desert: they’re far from major metropolitan areas that are more vulnerable to terrorist attacks and power outages, and they also tend to suffer from fewer natural disasters.)

So the next time you talk to your IT provider, you might ask them two things:

1. How many copies of our data are we keeping?
2. Where are those copies being kept?

Once you have those answers, you’ll know a lot about how well equipped your business really is to weather disaster.

CMIT Guardian, our backup and disaster recovery service, automatically stores data in highly secured data centers with round-the-clock monitoring and security, advanced fire detection and suppression systems, seismic safeguards, and diesel generators for continuous and reliable protection. To find out more about CMIT Guardian, give Thor a call at 916-984-6243.