Posted on: February 18, 2021 Posted by: Riley Comments: 0

There are many things that can go wrong and result in data or system loss. Data protection strategies need to identify risks and prescribe actions to mitigate those risks. So what could go wrong? Hardware can fail, be damaged or get stolen. Staff can accidentally or deliberately delete or damage data. Malware (malicious software such as viruses) can delete or hijack data. Hackers can steal or vandalise data.

Hardware Failure

While it isn’t always possible to stop hardware from failing, we can try to minimise the disruption when it occurs. Hard drives are one of the most important component in the modern server. This is where the irreplaceable data is stored. CPUs, memory and power supplies can all be easily replaced, but the contents of a failed hard drive are more difficult to replace if the appropriate preventative measures aren’t taken. Bizcare recommends servers and other important machines storing data be configured with multiple hard drives which operate together in arrays. If one drive fails it’s data is still held on the other drive(s). These are called RAID (Redundant Array of Independent Disks) arrays and are the first line of defence against hardware failure. If a drive fails a replacement drive can be sourced and installed.  The data is then synchronised with the other array member drives to restore redundancy.

Staff Actions

Sometimes staff can stumble upon – or go looking for – items that they shouldn’t normally have access to. Well designed permissions structures give employees access to the data they need to do their job while denying them access to data they shouldn’t be able to see. Bizcare can assist with designing and implementing permission structures that protects sensitive data from misuse. Access permissions also help to minimise damage in the event of a security breach. An employee may open an unsafe attachment on an e-mail or have their account “hacked”, but only the data they have write access to will be at immediate risk.

Malware Attacks

Malware or malicious software is the term used for any software which is designed to compromise computers and equipment. It includes traditional viruses, the well-documented trojans, adware and more. Bizcare uses cloud-based anti-malware technology called Webroot. Webroot will assess any new executable files against a real-time online database of threats and determine if it is safe or dangerous. If it doesn’t immediately know, it will allow the software to run in a controlled environment, logging its actions and stopping it from making permanent changes to the system. Once the software has it’s final determination the anti-malware either rolls back the changes made (malicious) or makes the changes permanent (not malicious).

Hacker Attacks

Hackers will try to gain access to your systems to steal or vandalise your data.  They may also use the system as a launching pad for other damaging actions. These actions include sending SPAM and attacking other systems. A quick look at any server with public facing services will show multiple attacks every day. We are able to blunt most attacks at the probing stage by using strong password policies, minimising internal system’s exposure to the outside world and correctly implementing firewall solutions.

Backups

Most important of all is your backup strategy. Good data protection strategies will reduce the risk of data and system loss, but eventually something will go wrong. When that happens it is sometimes necessary to recover deleted or damaged files. In some cases we may need to restore complete systems after catastrophic hardware or software failure. Bizcare uses the industry leading Storage Craft software to create an automated backup system which is robust and comprehensive. We can schedule your backups to run as often as every 15 minutes with minimal impact on system resources. Backups are generally made to a Network Attached Storage (NAS) device. These devices are configured with disk in a RAID array to protect the backup files. We recommend an automated offsite backup process which replicates all backups to a location outside of your premises.  This make sure that systems can be restored in the event of  fire, theft, or vandalism of the onsite equipment.

Leave a Comment