Viewing entries tagged
Fully Managed Backup & Disaster Recovery
If the power in your office fails tonight, and all of your computers crash, how quickly can you recover? And more importantly, at what cost? According to the U.S. Department of Labor, 93% of companies that experience a disaster go out of business within 5 years – even if they can recover in the short term.
We’re here to ensure your business doesn’t become another statistic. Our business continuity solution is about more than just backup – it’s designed to quickly revive your network following any unplanned downtime, and ensure your employees are operating productively in almost no time at all.
• Complete end-to-end management of backups
• Block-level encryption
• Continuous Data Protection technology
• Fully-managed & monitored
• Cloud replication
• Off-site virtualization
Unparalleled Peace of Mind
In today’s always-on business landscape, maintaining an effective backup and disaster recovery (BDR) strategy is becoming more important than ever before. Data is playing an increasingly critical role in decision-making processes, and the costs and risks associated with downtime are skyrocketing – not to mention the damage your brand and reputation can suffer in the event of a disaster.
Net DirXions’s business continuity solution includes features like continuous data protection, cloud-based replication and recovery, and more – all for one low fixed monthly price per protected server.
What does that mean? It means you can rest easy knowing that your critical data, emails, reports, and other information are all protected, backed up and securely tucked away until you need them.
Having a backup appliance in place is only the first step in a successful business continuity strategy. To minimize the risk of data loss as much as possible, you’ll want to have technicians proactively monitoring the entire backup process to ensure things are working as expected.
That’s why we’ve got a dedicated team keeping a watchful eye over your protected servers, ready to jump into action should any problems arise. And if the worst should happen, don’t worry – we’ll have you back up and running quickly.
There are some things that only humans can fix. 95% of all security incidents involve human error. Ashley Schwartau of The Security Awareness Company says that the two biggest mistakes a company can make are “assuming their employees know internal security policies” and “assuming their employees care enough to follow policy.” There are many security risks to which your data is susceptible, but there is one method that remains a wonderfully effective hacking tool. That is the phishing scam. This scam is a legitimate looking email that asks the reader to click on a link. If clicked, the link can infect the user’s computer with malicious software that can steal passwords, logins, and other critical data. Alternatively, the email appears to be from a legitimate source, perhaps even duplicating a legitimate webpage.
The distinction is that the phishing email asks the user to enter personal information, including passcodes. In either case, that is how hackers easily get into your systems. What’s the best defense against this one? The single biggest defense is education. Training your people to be constantly wary of all the emails they receive. One way some firms are educating their people is by sending out their own “fake” phishing scams. Employees who click on the link inside are greeted with a notice that they've fallen for a phishing scam and then are offered tips how not to be fooled in the future. Think of it as the hi-tech version of Punk’d.
You may not be ready to go that far, but it is important to provide ongoing training to all of your staff about phishing scams. Your staff are critical factors in your data security plans. To avoid falling into these traps, you must: a) have a plan, b) educate users about your plan, c) make them care about procedures. To give a quick summary, you need to have a defense plan for each of the layers that a hacker can attack: the physical layer (i.e. you need policies to ensure that only authorized personnel can access your devices), the network layer (i.e. make sure that only authorised devices access your network, and your devices only access authorized networks), and the human layer (i.e. you should make your employees practice good password hygiene and are aware of security threats).
You should train employees on your security and disaster recovery policies at least twice year, and your IT person should keep your employees up-to-date on security issues on a weekly basis. Make sure that they understand the risks of a breach.
Most importantly you need to create a “culture of security,” where employees go beyond the minimum guidelines laid down by your IT staff and always ask “is this good security sense” for every action they take. You need to have clearly defined penalties for those who practice bad security, and reward those who display good security sense.
Data Protection and Bring Your Own Device to Work
BYOD refers to a firm’s policy of allowing employees to use their own personal phones, tablets and laptops for all their work applications.This is a pretty common policy, and it has many benefits, but it brings along risks. How are you addressing these risks?
Here are some of the issues raised by BYOD
- A lost device – If you issue company phones, you have the ability to remotely wipe the unit clean if it is lost or stolen. With employee’s personal devices, do you still have that ability. If not, your data is at risk.
- Software updates – Is the employee responsible for updating all the software and virus protection programs on their own devices? If that responsibility transfers to them, you are at the mercy of their willingness to keep track of such tedious tasks. If you accept responsibility for it, do you have the in-house staff to handle all the extra work?
- Back ups – with data being entered on many different devices, something must be done to ensure back up procedures are routinely followed.
In short, BYOD is probably an unavoidable approach to device management. It is unrealistic to expect people to carry around 2 different phones or tablets 24/7. But BYOD means extra work for the in-house staff of a small business. To learn more about these risks and a more affordable, comprehensive approach to BYOD Management, see our e-guide “Now you see it, There IT…Stays“