The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups

Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past several years that have fallen victim to data breaches and lived to survive:

  • Premera Blue Cross had 11 million member’s names, birthdates, email addresses, addresses, telephone numbers, Social Security numbers, member identification numbers, bank account information and medical claims information compromised in 2014.
  • Sony had 47,000 current and former employee’s names, addresses, Social Security numbers, internal emails and other personal information exposed in 2014.
  • Staples had 1.16 million customer’s credit card numbers from 115 stores stolen.
  • Home Depot had 56 million customer’s credit card numbers stolen.
  • LinkedIn had passwords for nearly 6.5 million user accounts taken by Russian cybercriminals in 2012 which resurfaced in May 2016.
  • Worse yet, in 2013, the U.S. Army, Department of Energy, Department of health and Human Services had their databases breached which included personal information on at least 104,000 employees, contractors, family members and others associated with the Department of Energy, along with information on almost 2,0000 bank accounts.

At the risk of sounding like misery loves company, you are clearly not alone and anyone is susceptible to a breach in data security. In fact, a survey conducted by security consultancy company CyberEdge found that 71% of those surveyed fell victim to a cyber attack in 2014 and 52% believed they would be hit by a successful cyber attack in the near future. Another online backup survey found that 56% of SMBs store mission-critical data both on-premise and in the cloud, identifying that extra precautions are common practice.

security-insider

While Malware comes in different forms of destruction, Ramsonware is one of the newest ploys to handicap the systems of cyber victims. “’Ransomware’ is malicious software that allows a hacker to access an individual or company’s computers, encrypt sensitive data and then demand some form of payment to decrypt it. Doing so essentially lets hackers hold user data or a system hostage,” reports Security Magazine.

Cybercriminals could seek to exploit weak or ignored corporate security policies established to protect cloud services. Home to an increasing amount of business confidential information, such services, if exploited, could compromise organizational business strategy, company portfolio strategies, next-generation innovations, financials, acquisition and divestiture plans, employee data and other data.”

So how do you backup your cloud so that you can recover data without falling victim to Ransomware? Many cloud platforms BDR (backup and disaster recovery) services allow you to schedule backup frequency and replicate data off-site to reduce the possibilities of losing valuable information due to a Ransomware attack, natural disaster or other cause which prevents you from accessing your cloud. For example, if you use Microsoft Azure, they offer Azure Site Recovery which can replicate workloads to the company’s Premium Storage tier of cloud storage which uses SSDs packed with flash chips to speed up cloud applications and associated storage operations. “If you are running I/O [input/output] intensive enterprise workloads on-premises, we recommend that you replicate these workloads to Premium Storage,” wrote Poornima Natarajan, a Microsoft Cloud and Enterprise program manager, in a blog post. “”At the time of a failover of your On-Premises environment to Azure, workloads replicating to Premium storage will come up on Azure virtual machines running on high speed solid state drives (SSDs) and will continue to achieve high-levels of performance, both in terms of throughout and latency.

While it may be a hassle to backup your cloud data, not doing so could be detrimental to your business. From natural disasters to hackers to human error, taking the time to secure your cloud-based data may cost you a few minutes but could end up being priceless.

By Alex Miller

Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...
Rakesh Soni
Businesses now see the cloud as a standard, and they are always on a hunt for ways to leverage the cloud to its full potential. And if enterprises need to be competitive in the ever-expanding ...
Dana Gardner
Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they’re benefiting from APIs -- ...
Louis
Why cybersecurity spending Is resilient Cybersecurity tech stacks must close the gaps that leave human and machine endpoints, cloud infrastructure, hybrid cloud and software supply chains vulnerable to breaches. The projected fastest-growing areas of cybersecurity ...
Rakesh Soni
Customer Experience: Living In A Connected World and Winning the IoT Race IoT and smart interconnected systems have already created an invisible aura of convenience, usability, and a rich user experience around us. However, when ...
  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.