Skip to main content

Your best security defense includes backup

By October 30, 2017November 16th, 2017Backup, Security

Why should your business have a data backup? Here at OXEN, we highly recommend a backup strategy for everyone as part of a strong security defense. You’ve probably recently heard a lot about the critical need for a backup solution in the fight against ransomware.

Essentially ransomware is malicious software that encrypts your files and won’t decrypt them unless you the pay the ransom. You can’t rely on ransomware being removed. Even if it’s possible to remove it, it could take days and a lot of money. And if you pay the ransom, you can’t rely on the attackers to actually give you your data back. Some malicious attacks are now emerging that look like ransomware, but wipe your data instead of encrypting it.

And that’s the problem with ransomware: No matter what you do, you will either spend a lot of time, effort, and money to remove the attacking software, or you will pay the ransom with no guarantee you’ll get your files back. Either way, you may not successfully restore your files or you will lose money.

This is where a good backup solution comes in. A good backup strategy will send a backup of your files offsite or offline regularly, so that you always have a recent backup (up to 15 minute increments sometimes). It’s important the backed up data is stored safely and encrypted offsite so that your backed up files don’t become infected by ransomware or other viruses.

So if you get hit with ransomware, you can wipe and reset your system and then restore your files from a safe backup. It’s less time consuming, less costly, and the bad guys don’t win. Every attack situation is different and requires a different approach, but knowing that your critical data and systems are backed up brings great peace of mind and will help you get back on your feet faster.

Even a simple file/folder backup solution can help out. If you think your security needs and backup needs warrant it, you may also consider a full-fledged business continuity and disaster recovery solution. This more complex backup solution, commonly called a BCDR, can provide you with both onsite and offsite backup and more recovery methods, such as cloud virtualization, that can be invaluable if you need to restore and run your system and programs from offsite.

But the bottom line is back up your data. Individuals, businesses, and organizations all need to consider backup as a first critical priority in security measures against today’s virulent cyber threats.

Interested in a BCDR solution that goes beyond basic backup? Learn more about OXEN Technology’s OXBOX, a true business continuity and disaster recovery solution with onsite, offsite, and cloud virtualization options.


Recent Posts / View All Posts

social engineering tactics

How Hackers Use Social Engineering Tactics in Phishing Scams

| Business Productivity, Security | No Comments
Social engineering is quite a buzzword these days in the world of cybersecurity. But what is it, and why are businesses so afraid of it? It is a form of hacking that uses deception and manipulation to get victims to divulge information. Companies have reason to be fearful because social engineering tactics have led to a lot of destruction and millions of dollars in losses for businesses worldwide. Phishing is one of the most rampant types of attacks these days. It has been highly successful because it uses tried-and-tested social engineering techniques to hoodwink potential victims. What are these Social…
spot social engineering

Training Employees to Spot Social Engineering

| Security, Tech Tip | No Comments
Social engineering is one of the newest methods hackers use to access sensitive information. Rather than attacking a system directly, this technique relies on human psychology to gain information. This method is brilliant when you think about it because it does not have to deal with going past ironclad network security. If hackers can manipulate even a single employee, they might hand over sensitive information on a silver platter, and the hackers can take control of the organization’s entire system. This is why its important for your employees to learn how to spot social engineering. Companies must understand that if…
Phishing Scam Tactics

Top 8 Phishing Scam Tactics and How to Identify Them

| Business Productivity, Security, Tech Tip | No Comments
Phishing has been a common hacking method for over two decades now. You would think that everyone would already know how it works and how to avoid becoming a victim, right? Sadly, that is not the case for these Phishing Scam Tactics. There are more victims now than ever. In 2022, there were more than 300,000 victims in the US alone, with damages amounting to over $52 million! The thing is that phishing scams have evolved over the years. Hackers are now more adept at hoodwinking unsuspecting victims, and they also have easy access to modern technology that helps elevate…