Why do you use a computer?
Computers have become part and parcel of our every day lives, but what are you actually using them for? Is it for online shopping, checking Facebook, Googling, storing your photos, using specialist programs such as CAD or Adobe Photoshop, doing your company’s accounts, creating and reading Word documents or Excel reports, storing important personal data?
For most people, whether at work or at home, it will be a combination of the above.
In today’s world, devices and applications are becoming increasingly more complex and powerful, however it is still your data that is the most important aspect. Regardless of the hardware and software your company may possess, could it survive without its data? Could you imagine no longer knowing your customers’ details or who owes you money?
What are the computing risks to my business?
Despite the growing complexity of modern technology there are still computing risks to your business, specifically to your data.
– Hardware failure: In recent years, this has become a lower and lower threat to businesses, as most modern servers include redundant hardware and disks to mitigate a single point of failure. Although you might want to check that your all-important documents are actually stored on your businesses server and not your desktop or my documents!
– Disaster: This can cover a multitude of scenarios from a water-logged server room to theft. And if your data is only stored on your laptop simply leaving it on a train could result in a business-critical disaster.
– Computer Virus: A more common risk in the modern world, although most good anti-virus software, if configured and setup correctly, should help to reduce this risk. The implementation of a good Unified Threat Management device (UTM) over a firewall within your business will help to reduce this risk.
– Social Engineering: We are seeing an increased number of “targeted” attacks on businesses. This is where an email or request, that appears to be legitimate, comes in to the business asking for money to be transferred or for a bill to be paid. The email often impersonates the member of staff who would normally make this request. Training is the best course of action to prevent social engineering attacks and it is imperative that a phone call is made to follow up any unexpected email requests.
– Cryptolocker: Unfortunately, this is the most common threat we are seeing in businesses at the moment and is a form of ransomware. Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. The best course of action for to resolve Cryptolocker, or other ransomware, attacks is to ensure you have an extensive and current backup of all your data.
How can you use backup’s to protect your data?
Microsoft OneDrive, iCloud, Dropbox and Google Drive all offer online storage and most accounts will start at no cost, with different payment levels for increase storage capacity.
It is good practice to ensure that you have File History switched on for your device and that you create restore points.
Level 1 – Managed Level Replication (Small Business)
IT3000 offers managed file level replication for file servers and workstations. The product performs scheduled replications, provides a basic reporting engine and can store files locally, on the cloud or both.
Level 2 – Veeam Endpoint Backup (Small Business Server and Workstation)
Veeam offers an endpoint backup product that integrates with Veeam Backup and Replication. This endpoint product allows an image based backup to be created to a schedule. This can also be integrated with Veeam Backup and Recovery 9.5 to allow for advanced offsite replication, management and reporting.
Level 2 – Veeam Cloud Connect (Larger Businesses and Virtualized Servers)
At IT3000, we are a Veeam Cloud Connect Partner, which enables us to backup your entire virtual network with both onsite and offsite using cloud replication. We can restore your entire server network with one click to get you back up and running on our datacentre disaster recovery systems.
Our Veeam services differ from file level backups as they create an ‘image’ of your entire server, not only including all of the important files and documents but all of the system files that a server needs to run as well. Using Veeam Cloud Connect, we can take a backup as often as every 15 minutes to a local Veeam server, so that in the event of a failure of your primary system we can get you recovered in next to no time.
Contact us today to find out how we can protect your data.
01202 830 830 / 01455 247 830