Cybersecurity

Data Backup is Not Enough - You Also Need Data Protection

May 30, 2023

The need to back up data has been around since the era of floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once.

The need to back up data has been around since the era of floppy disks. Data loss happens due to viruses, hard drive crashes, and other mishaps. Most people using any type of technology have experienced data loss at least once. There are about 140,000 hard drive crashes in the US every week, and every five years, 20% of small and medium businesses suffer data loss due to a major disaster.

But one thing that has changed with data backup in the last few years is security. Simply backing up data so you do not lose it is no longer enough. Backing up has evolved into data protection. This means that backups need more cybersecurity protection than they once did. They face threats such as sleeper ransomware and supply chain attacks. Cloud-based backup offers the benefits of being convenient, accessible, and effective, but there are also important security considerations with any online service.

Some of the modern threats to data backups include data center outages, where the servers hosting your backups can crash or experience downtime; sleeper ransomware, which stays silent after infecting a device with the goal of infecting all backups before activating so that no clean backup remains; supply chain attacks, which involve attacks on cloud vendors that then spread throughout their clients; and misconfiguration, where improper security settings can allow attackers to gain access to cloud storage and download or delete files.

What to Look for in a Data Protection Backup System.

Just backing up data is not enough. You need to make sure the solution you use provides adequate data protection. Here are some key features to look for when evaluating a backup solution.

Ransomware Prevention. Ransomware can spread throughout a network to infect data on computers, servers, mobile devices, and cloud platforms syncing with those devices. Ninety-five percent of ransomware attacks also try to infect data backup systems. Any backup solution you use should include ransomware protection that restricts automated file changes that can happen to documents.

Continuous Data Protection. Continuous data protection backs up files as users make changes, rather than on a schedule such as once per day. This ensures that the system captures the latest file changes and mitigates data loss that can occur if a system crashes before the next scheduled backup. With the speed of data generation today, losing even a single day's worth of data can be very costly.

Threat Identification. Data protection incorporates proactive measures to protect files. Look for threat identification functions in a backup service. This type of malware and virus prevention tool scans new and existing backups to help stop sleeper ransomware and similar malware from infecting all copies of your data.

Zero-Trust Tactics. Cybersecurity professionals promote zero-trust security measures such as multi-factor authentication and application safelisting. A zero-trust approach holds that all users and applications require ongoing authentication. Features to look for include multi-factor authentication, distinct file and folder permissions, contextual authentication, and verification of permissions for file changes.

Backup Redundancy. If you back up to a single USB drive or CD, you have only one copy of those files. Cloud backup providers should have backup redundancy in place, meaning the server holding your data mirrors that data to another server. This prevents data loss in the case of a server crash, natural disaster, or cyberattack.

Air Gapping for More Sensitive Data. Air gapping keeps a copy of your data offline or otherwise separated from internet-connected systems. This involves making a second backup copy of your data and storing it on a server disconnected from external sources. If you deal with highly sensitive data, this feature helps ensure you have at least one copy of your backup walled off from common internet-based attacks.

Need Help with Secure Backup and Data Protection Solutions?

Have you updated your backup process for today's threats? The team at Cyber One Solutions can help you evaluate and implement the right data backup and protection strategy for your business. Contact us today to schedule a chat.