Category Archives: Data Protection

Picking the Right Backup Strategy

As part of our backup series, we will be continuing our discussion on backing up your most valuable business asset, your data.

Having a great backup application, like the StaySafe Protection Program, isn’t enough if you don’t have a good backup plan.

A good backup plan includes three components:

  • schedule and frequency
  • retention
  • recovery

Schedule and frequency

When considering your backup strategy, you need to know how often and what time you want your backup to be performed.

Most businesses simply default their programs to nightly because that is what they were told. There was a time when that was the prevalent strategy because of technology limitations. Backups would take all night, clog bandwidth and cause any day time work to come to a screeching halt.

However, times have changed. Newer “smart” programs like StaySafe Protection Program can send data incrementally, thus reducing the network load. They can also detect what has changed and only update those files that have been altered.

Good backup strategy goes beyond technology. Businesses need to consider how they are using their data to properly devise a schedule and frequency.

For instance, let’s say you have an accounting program that is only run once a month after payroll. It would be a wasted effort then to perform daily checks and backup of the data since it only changes every month. Alternatively, there might be a program that collects critical information every second, such as a highly regulated environment. This data may require more frequent backup but only during office hours.

All data shouldn’t be treated the same. Some of your information is more critical for your operation than others. Correctly identifying this information and isolating it will help ensure your backup plan protects your business at the right levels.

Retention

Now that you’ve backed up your data, how long do you keep it?

In a hypothetical world, we’d love to keep the data forever and never risk losing anything. In the real world however, storing data takes up valuable space. Be it a local storage device or remote cloud service, that space is finite and costs your business to increase thus you can’t consider your retained copies as an infinite storage.

So what is the right retention policy?

In many ways it comes down to:

  • schedule and frequency of backup
  • size and type of data
  • BUDGET

If your backup schedule is only monthly and you only retain a month of data, then you will only be as good as the last copy of events. This is hardly any protection from loss or corruption. If you store large files, such as graphic images or videos, the space you require per file increases drastically. The biggest consideration is – how much are you willing to spend on something you may never look at again?

As you can imagine, there is much to consider in this space before you start any backup plan

Recovery

Most business owners are knowledgeable when thinking in terms of backup but many never really spend any time to think about recovery. They assume that as long as the data is “backed up” it must be recoverable.

Unfortunately, that is not always the case. In some situations, the process of backing up changes the data format, making it unreadable by the original application.

Alternatively, the process of recovery could take hours if not days to become operational once more.  Having the appropriate Business Continuity Device, such as the devices by Cornerstone Backup, a Solve-IT.ca partner, can ensure your operation is back in a short period of time.

In still other situations, such as email, newer information may be lost if the backup were to be restored. A decision and procedure needs to be in place to ensure important new information isn’t erased by the recovery procedure.

In still other situations, the business has not set up the right schedule/frequency and retention for backup and the necessary copy of the information is not available for recovery.

The worst situation is when there is an emergency occurs and the necessary people can’t be contacted to get the recovery started.

In all situations, it is advised that after the business has devised a backup plan, including recovery procedures, they include the plan as part of their Business Continuity Plan. At scheduled times this plan is reviewed and tested to ensure it works. Consider it as a “fire drill” for all components including your backup recovery.

Without considering all 3 aspects of recovery, the best backup program in the world cannot properly safeguard your data.

If you need help coming up with a properly developed plan or would like a demo of our StaySafe Protection Program, call us at 905-388-2597 or send Solve-IT.ca an email or contact us directly and we will be happy to work through a plan with you.

 

Safeguarding Your Laptop

In today’s fast paced world, business is always on the move. If you are like many businesses today, this means more than just some glossy metaphor. With lighter, more powerful laptops, your office can travel with you. You don’t have to be out of touch with your critical information simply because you’re “on the road”. With cloud computing and virtual desktops, every aspect of your business can be available to you at the tips of your fingers.

But what happens when you lose the ability to use that laptop? What happens when you have information stored on your laptop that you just can’t afford to lose? Perhaps it’s that latest details of your next major project or the start of a presentation you’re planning on delivering. Perhaps it’s a copy of an agreement or revision notes you’ve taken while you were speaking with a client. Can you afford to lose that work?

As we’ve discussed before, information is one of the most valuable assets of your business. Losing it can cost you and your business a lot.

There are many ways you could lose your laptop, including but not limited to:

  • theft
  • hardware failure
  • damage or dropping your device
  • hard drive corruption

Is the information on your laptop safe from these situations?

According to FBI’s Computer Crime Survey, the estimated cost of computer security incidents is $67.2 billion annually. And based on a recent study by Ponemon Institute, organizations lose up to $7.2 million each data breach and an average of $49,246 of data per lost laptop.

If you are concerned at all, consider the StaySafe Protection program. The Protection program is the newest member of our StaySafe suite of services all designed to help keep your most valuable asset, your data, safe. What makes StaySafe Protection unique is that is has a laptop specific component, Mobile Vault, designed for the “on-the-go” business person.  Mobile Vault provides your laptop will receive industry leading business-class backup service, fully encrypted data transfers, IP tracing and remote data removal. Compare this with traditional backup strategies.

Traditional Backup Plans StaySafe Protection Mobile Vault
Business-class backup of data
AES 256-bit encryption of data ?
Load balance/silent data transfer ?
IP Tracing of devices
Remote data destruction

Business-class backup of data

Let’s face it, not all backups are created equal. Business-class backup comes with a level of integrity that you can’t get from at home versions of backup. Business-class backup includes:

  • redundant systems to ensure optimal uptimes
  • professional level software enabling greater level of control over data
  • ability to apply policies and create procedures the increase compliance of data

AES 256-bit encryption of data

One of the greatest dangers of working with data over the Internet these days is the fear the information can be stolen. Without proper encryption, your business intelligence and competitive advantage is just floating out there for someone to pick up and steal. AES 256-bit encryption is the latest and greatest in industry techniques.

Load balancing and silent transfer of data

Most traditional backup plans will require you set a time to “run” the backup. It utilizes all of your system’s resources to upload the computer’s information into a remote location. This process can take hours to complete and tie up critical systems, slowing down the internet and any other operations on that system. As such, most businesses schedule traditional backup plans to run late at night, when they expect low traffic on their network.

But with remote systems, you can’t always predict when you’ll be hooked up to the internet and available to do this backup. Under the traditional backup plans, that could mean your computer will miss these critical backups. Or worse, your already slow remote connection will move even slower because you’re trying to share the bandwidth with your backup process. Many times, you’re not connected to these remote internet services long enough to truly perform a full backup, thus potentially corrupting your backups and losing your critical data.

Under Mobile Vault, the service is intelligent enough to perform data transfer in increments, transferring small packets so it not only using less bandwidth but can optimize on your limited remote access. If you lose connection to the internet, it will simply resume where it left off and thus prevent data corruption.

IP Tracing and Remote data destruction

One of the scariest things that can happen to any business person is losing their laptop. Not only is it a physical asset loss, it could also mean the loss of critical information and compromise of the business. With Mobile Vault, businesses are now able to track and remove critical information even if the computer is physically lost.

Using the administrative interface, Mobile Vault can put a listener out on the Internet. As soon as the computer tries to connect to the internet again (which is a standard process triggered when most computers turn on), the system will retrieve the location of the computer via IP address. From here, the lost device can be located and any critical information removed remotely from the system.

Interested to learn more about what StaySafe Protection or any services under the StaySafe line can offer your computer? Just give us a call or email today. We’d be happy to assist you further and help evaluate if this service is right for your business.

Get Your Data in Order

In today’s business world, information is your most precious commodity.  Data you keep on your computers can make or break your company.  That is why it is so critical to safeguard the data you store on your network.

There are many solutions these days for you to consider such as remote and local backup systems, ghosting, cloud storage.  Before you can consider any of these options, you really need to take a moment and consider the most critical non-technical decision you will need to make:

How is my data organized?

Organizing your data on your computer is about having a system and sticking to it.  It is the filing system of today and should be taken with as much integrity and seriousness as maintaining critical business records in any other form.

When we talk about data organization on the computer, obviously we’re talking about files.  All too often, I find people putting files everywhere, mixing types and using names that aren’t Windows friendly.  These all lead to complications down the line, difficulty in backing up and recovery, and increased storage costs.

The best organized data has the following characteristics:

  • Information is easy to identify and locate
  • Files are all consolidated into one main area/folder
  • Different types of files are separated where appropriate
  • Files names do not exceed 256 characters (this includes the folder tree and filename itself)

Information is easy to identify and locate

The best test for a good system is when you’re out of the office and you need to send someone instructions on how to find the files to a particular project.  If you can direct someone to locate the necessary file within a sentence or two, your structure is probably good.  If you have to hunt and peck, trying to pick different folders across the network, then you may want to consider spending some time in harmonizing your file structure.

Consolidate files into one folder

Often, people are in a rush and decide to put something up on their desktop so they can access it quickly.  This is fine for the one-off solution but if it’s a file that you need to retain, you should have a designated location for this file.  Having everything in one folder, such as “My Documents”, makes it easier to locate and easier to establish a backup procedure.

Separate file types

In some businesses, projects are run with a large number of different types of files, such as music, video, and images.  These types of files tend to be very large and can be costly in terms of storage and backup.  But if you can isolate them to specific folders, it becomes easier to identify these files and isolate them for different, less expensive forms of backup.

The other key is to separate personal files from business files.  Many people maintain personal data, such as iPod music, downloaded pictures, and personal documents.  While these may be important to the individual, they have no place on your business’ network.  If they are mixed in with business data, you’ll be wasting backup space to these “other” types of information.

Smart file names

When Microsoft allowed the use of long file names they created an annoying “Catch 22”. This was a great boost for many companies who wanted a more descriptive file name.  Unfortunately, one item that many businesses are not aware of is that most backup applications (and other operational programs) don’t like these logical file names.  They end up truncating the filesnames and folder paths making it a challenge to restore.  Best case, they cause you to have to restart the application. In the worst case scenario, they can corrupt your information, making it unreadable and unrecoverable by any program.

Rather than trying to fit everything in the file name, use detailed file structures.  If you’re working in Microsoft Office, you can also use file attributes such as title or subject instead to extend the information you have on the document.

Choosing a good file structure before you move on to implementing a backup solution will save your company a great deal of time and money.

Symantec Says: Small Business Not Protecting Data When Virtualizing Servers

The good news about virtualization among small businesses is that it is growing in popularity (though small businesses are still learning how to adopt it in their organizations). The bad news is that as they implement server virtualization, small businesses are putting their data at risk.

In the 2011 Small Business Virtualization Poll conducted among 658 respondents from 28 countries worldwide, Symantec Corp. found out that most small businesses aren’t taking the most basic steps to secure and protect their virtual environments.

The survey also found that financial benefits were the main reasons for businesses to turn to virtualization.  Seventy percent of respondents said their organizations are considering virtualization. 70 percent cited that reduced capital expense would drive their decisions to deploy virtualization while 68 percent said it was reduced operating expense. The ability to use fewer servers for the same number of applications (67 percent) and improved server scalability (65 percent) were found to be other reasons.

Despite the growing interest in virtualization, small businesses have been forced to limit virtualization only to discussions. What could be holding them back? The answer is “Limited IT Skills”. On the other hand, nearly a third of small businesses not planning virtualization blamed it on lack of experience. Out of those surveyed, only 10 percent have deployed virtualized servers and even they are focusing their early-stage efforts on simpler, less critical application areas. Performance (60 percent), backup (56 percent), and security and patch management (56 percent) were cited as top challenges.

The survey also found out a shocking fact; only 15 percent always back up their virtualized servers and 23 percent do it infrequently or not at all. And even worse is the fact that only 40 percent completely secure their data. Budget and staffing issues were cited to be the main hindrances by respondents. Even those who said they are somewhat or completely secure are less secure than they think. The survey found that 78 percent don’t have antivirus on their virtual servers, 48 percent don’t have a firewall, and 74 percent forego endpoint protection.

So, what should small businesses do? Here are a few recommendations for them to make sure they are properly protecting their data and systems:

  • Define a virtualization strategy by working with an IT consultant. By assessing your data protection and security needs, build a strategy complete with guidelines. Also determine if moving to these cloud services are right for you. Once you have a strategy in place, develop a plan and follow it.
  • Secure your virtual environments by considering what security solutions you need to secure your virtual environment; think firewall, antivirus, and endpoint security. Don’t forget to establish security practices.
  • Protect your data with backup solutions for both physical and virtual environments. Want to save space and time? Consider a data deduplication solution.
Talk with us today, Solve-IT specializes in helping business throughout the Niagara region with all their computer and business network support.  We look forward to serving your Niagara computer support needs.