Last layer of Security

What is the threat to my data?

With the rapid increase of threats to our treasured & private data, cyber-criminals are forever producing new ways to interrupt and fleece our professional and personal lives. One of the cyber threat trends that has seen a sharp upsurge in activity within recent years is Ransomware.

Ransomware takes its action via the procedure of malicious software that restricts or removes your access to file data stored on your computer or server. Transferred from an dishonest website or arriving on your computer via an email link or attachment, the Ransomware application rapidly installs itself & begins to infect or take control of your file data without the computer user even being aware an attack has taken place.

Ransomware, as the name suggests, is a means by which hackers can take something belonging to you or your business and hold it to ransom for release upon receiving a monetary payment from you. Although, there’s no assurance they’ll even release the file upon receiving your money!


Can we stop ourselves becoming a target?

Although it’s serious to ensure you have cyber barricades in place, it is almost impossible to ensure that you are 100% safeguarded from the threat of cyber-crime, predominantly from the specific threat of Ransomware.

The malicious software used to launch a Ransomware attack is constantly developing and can take many forms, despite security vendors frequently updating their software & threat analysis, there is a solid chance that an blameless action by one of your users will result in their machine becoming infected at some point.


What we can do if we’re confronted with an attack?

Initially, make efforts to limit your exposure to attack by certifying you have cyber defences in place and have focused awareness training for your team.

But, when you inevitably suffer from an attack, your last line in the defence against cyber-crime is to rely upon secure recovery point from a current, ring-fenced data backup solution.

With a professional-grade backup service, you can benefit from peace of mind that your data is stored, securely, in an alternate offsite location and is ready for recovery at a moment’s notice in the event of loss or exploitation to any, or all, of your files or system data.


But we already backup data to a disc?

Having a data backup of any kind is a great initial step to take in a bid to recover your data in the event of any loss. But! An undeveloped backup to an external disk is by no means a dependable or protected means to achieve true peace of mind with all your system data.

There are several manual elements to a disk backup that limit its efficiency in a disaster; most critically, the need for a person to take the disk offsite and remember to bring it back again.

In the event of a Ransomware attack, should the disk be connected to the network, it will most likely be infected and render the backup useless. This twinned with limited means of running effective repeatedly scheduled backups, results in a data backup to disk being a too restrictive and risky means of recovery in the event of a disaster.


What should we do instead?

Any business should function with an automated on-site + off-site backup service, authorising to the of 3-2-1 backup rule.

3 copies of your data – one active on your server/cloud storage/computers, one local backup copy and one offsite copy.

2 forms of media – varying medium of disk or device used to store the backup copies.

1 copy held offsite.

The service should be managed and monitored day-to-day by your external IT service provider or member of internal IT personnel – with strict urgency placed on acting in the event of a failure or issue logged from the previous day’s backup.

It all sounds pricey, however implementing a professional-grade backup solution doesn’t have to cost the earth; particularly if you factor in the cost and inconvenience of a total, or even partial, loss of data.

Appointing these rules within your business can go a long way to ensuring a fast & effective recovery from a disaster, should you be involved with the loss or corruption of any data, however large or small.


Who is Iron Dome?

One of our core values is to help educate and empower businesses with the knowledge around cyber security and keeping their IT systems safe. A conversation may not lead to us working together, but if you are able to learn anything from a chat with our team then we have accomplished what we set out to do. Educate!