4 Checkpoints to Make Your Disaster Recovery Plans Bulletproof

If you store larger volumes of files or customer data, your business is always at risk of a data breach or ransomware attack. If you can save your business from being encrypted, the second hurdle comes with meeting the compliance for your industry, as well as the companies you serve. As business’ working in the SF Bay Area, it’s our responsibility to assist in the various data-protection regulations that cost companies, more than money, sometimes it costs a business their reputations.

In this blog, we will discuss the key elements to building your next backup strategy:

1. Determine What Frequency Fits YOU
Most of the time, business’ have a hard time finding a starting point when it comes to disaster recovery and data retention. First, you will need to define how often you should back up, these are based on industry attacks or the amount of data you’re hoping to save. Does it depend on the volume of data that your end-users produce? To maximize both your investment backing up data every 24-hours has become the minimum for most industries, with once a week slowly dying out. Planning today for the worst, especially when coughing-up large amounts of money for ransomware payments are no guarantee that you get your data back.

2. Can Your Backups become Automated
Don’t leave a margin for error to occur, forgetting to run a backup device has no excuse! If you’ve made the mistake of losing large volumes of data or forgot to run your backup rest-assured in knowing, most enterprise-grade backups work to fix the “human error,” by automating the process entirely.

3. Data & Backups Can Scale
In the past, scaling infrastructure was cumbersome and difficult. To avoid the headaches, companies have begun safeguarding data, by taking several routes to backup data. With ransomware becoming more prevalent with encrypting backup devices, a single copy for many larger organizations simply won’t be enough.

Having local on-premises backups (accessible faster) works great when paired with storing data in the cloud. Many businesses’ have begun this process, between Microsoft OneDrive (Excel, Word, PowerPoint) Adobe Suite (Acrobat) and customer information, do you really know where all these copies reside? Does your business have a fail-safe strategy in place for fast recovery?

4. Avoiding the Trial by Fire Mindset
I’m sure many of you have heard that practice makes perfect, but regularly testing backups, and monitoring their alerts daily has become common-place in today’s connected landscape. One of the many famous stories surrounding backup incidents can be found no further than Pixar’s California Office in Palo Alto, CA.

“Back in 1998 the developers at Pixar were creating the movie, Toy Story 2. An animator working late on file cleanup entered a command that accidentally deleted almost all the production files. Recalling the backups taken every day, the animator didn’t panic. However, when the team went to recover the files after coming in the following day, they found a solution that was no-longer working. This was in 1998, so the amount of time needed to properly test these solutions was far-greater, and the procedures have quickly become streamlined. In a sudden turn of events, the technical director for the movie had an offsite backup they used to restore the footage and bring the $100,000,000 Doller film to market.”

As you and I both know, the movie was produced but this story highlights one of the MOST common ways a business suffers from not having a backup solution, and a plan to compliment it. Building a solid strategy should be mission critical to businesses currently going without. Bring together your solutions arsenal and align your backups, ransomware protection. Staying protected from such attacks as ransomware, 24 hours a day, 7 days a week, 365 days a year, can be tough, but making sure your business is prepared, cannot be ignored, learn a better methodology to alerting your staff of backup success, and status.

bay area disaster recovery and business continuity solutions

Managed Service Provider Best Practices for Protecting Your Employees

Cybercrimes are reaching all-time highs, with many organizations being hit with at least one of the 230,000 attacks that occurred in 2017. As a Managed Service Provider, it’s our job to make security a priory for clients in 2018. By following 3 simple best-practices, we use to begin protecting NetCentral Partners. Built to enhance MSP security, mitigate client risk, and grow your revenue.

User Education

Effective anti-virus is essential to keeping your business protected, but it’s simply not enough. With increased risks and social engineering, many have found the need for user education as a major objective for 2019. By educating end-users through security awareness training can reduce the cost of infection or data breaches. These tactics have evolved, and are beginning to target businesses through social engineering, and the favorite method for delivering an attack.

Common Social Engineering Includes:

  • Typically, an email from a trusted friend, contact, or colleague, whose account has been compromised. The message will usually have a URL link to open or download, and invoice or website.
  • Phishing emails, comments, or text messages luring readers to confirm the legitimacy of your accounts. These are usually fake email vendor emails that have been spoofed or recreated by these criminals.
  • Fraudsters are more common in major business cities like San Francisco, Oakland, San Jose, California. These criminals leave USB or zip-drives around the company’s premises, in hopes a curious employee takes it. Hoping a curious employee will insert the temporary storage it into a computer providing access to company and personal data that is saved on your systems.

These attacks are usually devised through relevant and timely education can minimize your exposure to breaches caused by user error. By training our partners and clients on social engineering, and other tactics including ransomware, email passwords or data protection, you assist in fostering the behavior with which you wish to see across your organization.

Backup & Disaster Recovery Plans

Your IT support team should always stress the importance of backups and creating a disaster recovery plan, with regular testing of each asset. If hit with ransomware, without a secure backup, businesses face the intended ultimatum. To pay the ransom and risk the money or lose countless amounts of company data.

We’ve continued to offer our clients options to fit their network, with automated cloud-based backups and physical appliances for any company’s data retention policies to avoid encryption. With access to data anywhere at any time, the best form of proactive support comes with the industry knowledge gained from building business continuity plans.

Things to Consider:

  • Who declares the disaster?
  • How are employees informed?
  • How will you communicate with customers?

The secret to building the perfect disaster recovery plan for your business comes after the plan is implemented. The most common failure point for many businesses before NetCentral support is a failure to test a backup solution. Then a small-scale disaster or accident occurs, and your business can’t restore its data. Imagine the loss of business financials, intellectual property, client data. Insurance won’t pay you for lost information, and your disaster recovery plan is the only thing between business risk and your employees. Once a plan has been implemented and adopted by the staff, it’s important to develop your process.

Patch Management

Patch Management continues to be one of the largest areas of vulnerability for businesses with more than 2 “production” servers. Most updates are security related and should be updated as needed. Outdated technology, including an operating system (OS) or Java, are common exploits in several of this year’s largest cyber attacks. By staying atop of operating system updates, you prevent your business from learning a “very costly lesson.” A great example, of this, was back in 2017, with Windows 10. Win10 initially only marked 15% of malware files, while Windows 7 machines saw over 63% according to Webroot’s 2018 Threat Report.

Patching Process

Your patching process should feel like “a never-ending cycle,” of auditing existing systems to generate a complete inventory of all your production systems, their standardization, and operating systems and applications. By building these standards with a trusted IT support team, your patching process will become easier. Through the classification of vulnerabilities, higher priorities can be remedied, while lower vulnerabilities begin to be automated, never disrupting your workday again.

By following these best practices, your business can begin thinking like an MSP. This will ensure the safety of your business, but also securing customer data. Business owners looking to scale operations should be looking to align business objectives, with an MSP that focuses on your IT experience, if you’re in need of IT Support and Services, we can help! Contact us, to begin talking about your IT stance.

Take your technology to the cloud with cloud computing solutions

Educating Partners On Risk Management & Disaster Recovery

According to the data, there were a total of 3 natural disasters in the state of California in 2018, resulting in $180.8 billion in insured losses. That’s up from the $23.8 billion last calculated in 2016. With a bad wildfire season just around the corner for the Bay Area, we’ve already seen an active Winter, with mudslides, and flooding through-out, followed by that sweltering California heat.

Despite their frequency, natural catastrophes aren’t the only disasters you and your customers have to worry about. The rest is attributed to instances such as data corruption, system failure, and human error. In fact, hardware failure is responsible for half the downtime that small to midsize businesses experience.

Read more

How To Devise A Budget That Includes Your Disaster Recovery Plans

Planning and disaster recovery, more importantly, budgeting, is one of those tasks few business continuity managers look forward to completing every year. After all, it can become a pretty involved, and complicated processes for anyone, often seen as sobering to tally-up the final bill. Love-it or hate-it, devising a business disaster recovery (BDR) budget is…

Read more