fbpx Skip to main content

Your best security defense includes backup

By October 30, 2017November 16th, 2017Backup, Security

Why should your business have a data backup? Here at OXEN, we highly recommend a backup strategy for everyone as part of a strong security defense. You’ve probably recently heard a lot about the critical need for a backup solution in the fight against ransomware.

Essentially ransomware is malicious software that encrypts your files and won’t decrypt them unless you the pay the ransom. You can’t rely on ransomware being removed. Even if it’s possible to remove it, it could take days and a lot of money. And if you pay the ransom, you can’t rely on the attackers to actually give you your data back. Some malicious attacks are now emerging that look like ransomware, but wipe your data instead of encrypting it.

And that’s the problem with ransomware: No matter what you do, you will either spend a lot of time, effort, and money to remove the attacking software, or you will pay the ransom with no guarantee you’ll get your files back. Either way, you may not successfully restore your files or you will lose money.

This is where a good backup solution comes in. A good backup strategy will send a backup of your files offsite or offline regularly, so that you always have a recent backup (up to 15 minute increments sometimes). It’s important the backed up data is stored safely and encrypted offsite so that your backed up files don’t become infected by ransomware or other viruses.

So if you get hit with ransomware, you can wipe and reset your system and then restore your files from a safe backup. It’s less time consuming, less costly, and the bad guys don’t win. Every attack situation is different and requires a different approach, but knowing that your critical data and systems are backed up brings great peace of mind and will help you get back on your feet faster.

Even a simple file/folder backup solution can help out. If you think your security needs and backup needs warrant it, you may also consider a full-fledged business continuity and disaster recovery solution. This more complex backup solution, commonly called a BCDR, can provide you with both onsite and offsite backup and more recovery methods, such as cloud virtualization, that can be invaluable if you need to restore and run your system and programs from offsite.

But the bottom line is back up your data. Individuals, businesses, and organizations all need to consider backup as a first critical priority in security measures against today’s virulent cyber threats.

Interested in a BCDR solution that goes beyond basic backup? Learn more about OXEN Technology’s OXBOX, a true business continuity and disaster recovery solution with onsite, offsite, and cloud virtualization options.


Recent Posts / View All Posts

Social Engineering

January Recap: All You Need to Know About Social Engineering

| Managed Services, Security | No Comments
This month, we covered a range of topics concerning social engineering. Social engineering is now considered one of the most prevalent risks when it comes to online security. Most hackers rely heavily on social engineering tactics to lure unsuspecting users to divulge information. It sounds complicated but it's nothing more than the practice of manipulating people into revealing information through the use of false pretenses. It often creates a sense of urgency, fear or excitement, playing with people's emotions to get them to do exactly what the hackers want them to do. In case you missed any of them, here…
Cybercriminals Use Social Engineering

The Top 5 Ways Cybercriminals Use Social Engineering

| Managed Services, Security | No Comments
Advanced technology and cutting-edge hacking techniques have been the main tool that cybercriminals use for online attacks. But did you know that the most effective method that hackers use for enticing victims online is something so much simpler? Cybercriminals use social engineering or in other words, manipulate people by establishing trust and playing on their emotions. Common Methods of Social Engineering Attacks There are a number of creative ways that social engineers go about their devious ways. However, there are five ways that stand out on how cybercriminals use social engineering for their personal gain. Phishing This method is by…
Social Engineering scams

Where Does Social Engineering Scams Come from?

| Managed Services, Security | No Comments
Social engineering scams are so much more rampant these days than ever before. There will certainly be suspicious-looking items in your inbox when you check your emails, which are most likely phishing emails. Many people now know to avoid clicking these malicious emails, which is a good thing. But still, their vast amount makes you wonder, where do social engineering scams come from anyway? The very simple answer to that is social media. How Social Media Is Used for Social Engineering scams According to the latest count, there are more than 4.74 billion social media users today. For hackers, each…