We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
A Two-Factor (2FA) solution uses App or SMS verification to prevent malicious access. With 2FA enabled, you’ll have to use an application or input a code sent via SMS to gain access to a secure system. 2FA protects against malicious access, even if your login credentials fall into the wrong hands.
Two-Factor also protects your business from insider threats. Threats such as careless employees choosing to ignore company policy and use a weak password because it’s easier to remember. However, these easy to remember passwords are also easy to guess and easy to crack with brute force attacks. Did you know that a shocking 25% of respondents in a survey by Troy Hunt use a word that can be found in the Oxford dictionary, such as ‘password’.
Compromised passwords were the common denominator in the biggest 2017 breaches, including Yahoo!’s 3 billion customers, Equifax, Uber, and more. Users can compromise passwords just by sharing them with colleagues. Users can even leak passwords by using the same one to access work and non-work-related systems, such as Facebook or a website. Therefore, your organisation needs a strong password policy.
Strong passwords contain at least 10 characters, are not words that can be found in the dictionary (see why above) and include a number and a special character. For added measure, use a mixture of capital and lowercase letters.
Read “5 Ways to Create Strong Passwords You’ll Never Forget” to create the building blocks of a strong password policy.
It’s easy to forget that an off-site back-up alone doesn’t cover you if a server fails. Create an achievable Disaster Recovery (DR) plan that focusses on bringing up mission-critical servers in a realistic time frame. Consider using a Disaster Recovery-as-a-Service (DRaaS) solution that allows you to replicate VMs and spin them up in the Cloud in minutes to avoid prolonged downtime.
Something important to note about DRaaS is that not all solutions are the same. The difference lies in the degree of self-management required to maintain them. Whether that’s configuring the solution, initiating recoveries or performing failover tests. Managed DRaaS solutions take away the majority of these requirements and will in most cases regularly test failovers – complete with results. This ensures the solution is fully operational and delivers value for your business.
Industry analysts such as Gartner, Forrester and Aberdeen are constantly highlighting the rising costs of downtime on today’s increasingly data-dependent businesses. The cost of downtime can be calculated in various ways, but in most cases, it can cost a small organisation thousands of pounds for every hour of downtime. This can rise to tens of thousands of pounds for mid-size organisations.
Therefore, nightly backups are not sufficient enough to protect your business. Make sure to backup at regular intervals that are tolerable for your business. Whether that’s by the second, minute or hour.
Also, adhere to the 3-2-1 rule. Keep 3 copies, in two different formats and at least 1 offsite. Make sure nobody can access these backups and that they are encrypted.
Most Cloud solutions offer encryption during transit but, encrypting data at rest is just as important when protecting your data in the cloud. The best practice is to utilise a blanket approach and encrypt all data and devices at all times. As a minimum, your organisation should be using SHA128 encryption, but we highly recommend configuring SHA256 encryption for added protection and future interoperability.
There are just a few of the advantages of storing data in the cloud and there are many more steps you will need to take in making sure your cloud data is protected. And no single step will guarantee security. However, by following the industry best practices in this guide, you can help protect your business from the growing threat of a data breach.
If you want to know more about cloud data protection, get in touch with us and one of our technical specialists will be happy to help.