Please give us a few moments whilst we get your account ready.
Rise in laptop sales leads to data protection worries
Reading, 6 April 2020 – An unwelcome repercussion of employees snapping up laptops for home working ahead of the coronavirus lockdown has been an even bigger spike in cyber-criminal activity.
As Dixons Carphone revealed that like-for-like electrical sales were 35-per-cent higher in the three weeks to 21 March, the UK’s National Fraud and Cyber Crime Reporting Centre announced a staggering 400-per-cent rise in scams.
Mike Norris, chief exec at Computacenter, one of Europe’s largest resellers, declared that people were buying PCs in the same way that they were ‘buying loo rolls’.
With no-one any clearer in the UK whether people will be working at home for two weeks, four months or if Covid-19 is ushering in a permanent shift towards home working, organizations need to assess the need for endpoint backups.
This is critical when changing working arrangements lead to a clear change in the way data is created and shared – and cyber-criminals are preying on any vulnerabilities.
F-Secure principal security consultant, Tom Van de Wiele said: “Home networks have less restrictions and security measures compared to corporate networks and if a company is not pushing all traffic over a VPN tunnel with outbound filtering, then exfiltration of credentials data could become a viable path of attack for those targeting people when they know they are sitting at home and not passing the corporate security perimeter.”
USB drives might seem a convenient backup solution, but they can be lost – and if you have more than one person needing access to the data contained on them, that will prove very difficult to achieve.
Even if only one person needs access to the data on a USB, you will need to encrypt it to keep the data secure.
The appeal of cloud backups is that they are easy and convenient, but backing up and restoring is only as fast as your internet.
You don’t want to be waiting several days to download every file before you can start working on something you need immediately.
Redstor’s unique InstantData technology allows you to recover massive systems seemingly in moments – by immediately streaming what everyone needs, when they need it, from backups or archives.
InstantData creates sparse files in your file system when a recovery is initiated, giving the user the experience of immediate availability. These sparse files are initially empty and are re-hydrated on demand. Less critical data is then recovered in the background.
During the current lockdown with transport restrictions, how sure are you that you can visit a site to fix a ‘backup device’ fail and be certain of business continuity?
Redstor can be silently deployed and configured with your preferred device management tool. Once deployed, the agent can be completely managed remotely through Redstor’s Remote Access functionality.
Ideally organisations will need centralized policy management to ensure that business-critical data is protected on endpoint devices.
Data deemed to be of less business value, like photos or music, can be centrally excluded to ensure that only truly valuable data is protected.
Efficiency by design
Designed from the ground up for secure operation over public networks, Redstor is ideally suited to protect data on users’ devices regardless of their location.
The lightweight client puts minimal strain on devices and the incremental forever technology minimises the volumes of data to be transferred to the storage platform.
The addition of compression further reduces the volume of data to be transferred making Redstor highly bandwidth efficient.
Redstor’s agent-based technology encrypts data at source and deduplicates and compresses it, making the client extremely bandwidth efficient and effective even over mobile connections.
Consistent protection policies
Just because you have moved data into Office 365 or G Suite doesn’t mean it’s fully backed up. Microsoft and Google cover you for outages that are down to them, but not for accidental (or malicious) deletion.
So you will need to have a system to back up your cloud data just as you backup data from your office server.
A powerful, web-based control centre provides the complete visibility you need to assign consistent protection policies across your entire data estate.
As well as simplifying your data backup systems with one central, easy-to-use system, you can extend retention and cater for deleted users with a diverse backup strategy that also allows you to address compliance issues.
Watch our product demos to find out more about our solution.
The recent ransomware attack on Kaseya, a cloud-based IT and security management provider services company that supplies tech-management tools to customers worldwide, has the potential to be the most serious cyber-criminal incident this year.Continue reading