While our running systems have asset value, the data that is on them is where the value is. Data is the product of our work, contains sensitive information that must be safeguarded(1) and we often cannot sustain losing that data.
Data loss or breach could cost us a client, our identity and cause financial damage.
If you’re relying on a pile of thumb drives, external hard drives or syncing your files to the cloud(2) , you’re putting in the effort, but not doing enough, and at most, you’re performing data backup that’s subject to human error.
At minimum, we need to ensure that we can recover our valued files especially in the even of a catastrophic event. That includes computer failure, ransom-ware, human error or theft.
Data Backup is an essential part of the puzzle. It ensures we can access a version of a file, or your entire file system’s contents, as it existed at a specific point in time.
Only then do we know that we can reconstruct your data and business even if your system was entirely destroyed.
The solutions that can meet your needs are available by subscription or can be bought and installed; it depends upon your needs, tolerance for data loss, and budget.
Put our experience to work in safeguarding your systems. Contact us today.
(1)Safeguarded Data: There are various standards for safeguarding data to comply with depending on the nature of your business. For most businesses, it would be sufficient to encrypt sensitive data and ensure you can recover from any data loss as well as ensure data can not be misappropriated in transit. For businesses processing payments, financial or health records, the standards are more stringent. If you process payments, you should be PCI compliant. If you process health records, you should be HIPAA compiant. To demonstrate top level security compliance as a technical service provider, you’d aim to be certified as SSAE 16 SOC 2 or SOC 3 certified running in a SSAE 16 SOC 1 certified infrastructure. In all cases, you’d protect data privacy by limiting access, applying encryption, having acceptable process that has been demonstrated for at least six months.
(2)Note: You can sync your files to the cloud in near real time using services like OneDrive, DropBox and Google Drive, however, when you make an error or that file gets encrypted by ransom-ware, that undesired file will replace the previous good version; you will not be able to recover older versions from these services.