Backups. Backups. Backups! I cannot tell you how important backups are to the security of your business. The data on your computer is the most important part of that computer. Computer hardware can fail, data can become corrupted, and computers can be lost, stolen or destroyed. You can reinstall operating systems and applications, but your data will be lost forever. Backing up that data is one of the most important things that you can do to protect your business or personal data.
With the rise of malware and ransomware, your data and computer security is at risk. We at ACT Technologies can assist you in this matter. We offer a range of different solutions that will make sure you are protected as part of your Disaster Recovery plan. If you do not have a disaster recovery plan, please call us and allow us to help you in getting one put in place.
Recently the Cybersecurity and Infrastructure Security Agency (CISA), Multi-State Information Sharing and Analysis Center (MS-ISAC), National Governors Association (NGA), and the National Association of State Chief Information Officers (NASCIO) published 3 steps to protecting against ransomware:
- Back up your Data – Now and Daily
Backing up your data is the most important step in this process. ACT Technologies offers two different ways to backup data. The first is an offsite and onsite package that is a bare metal recovery in case of damage or corruption requiring a complete restore. Backups jobs are backed up locally to an external hard drive then replicated to the cloud. The frequency can be set to your desired needs.
The second option is a File level backup. We backup once a day and only backup files that are selected.
We verify backup integrity on a regular basis and make the necessary adjustments and changes to make sure everything is backed up and recoverable.
- Reinforce basic cybersecurity awareness and education
The majority of malware and ransomware attacks require a human element to succeed. In order to help prevent these attacks, it is recommended that employee training and briefing be implemented to allow users to recognize threats, phishing attacks, and suspicious links or emails. An important part in the fight to protect your data is to stay safe and vigilant. Always report suspicious activity to your IT professional. ACT Technologies will gladly assist in training employees in spotting suspicious links.
- Revisit and refine incident response plans
As part of the Disaster Recovery Plan, organizations should have a clear plan to address attacks when they occur, including when internal capabilities are overwhelmed or exceeded. Make sure Incident Response Plans include how to request assistance from external cyber first responders and state agencies, Like ACT Technologies, CISA, and MS-ISAC, in the event of an attack.
Call us today to see how we can help you to protect your organization and your data.