Data Security & Backups

Keeping you protected

Protecting your data from loss comes in two parts: preventing malicious outside attacks and making sure you have viable backups should the worst occur.

Not all data loss results from outside attacks; data loss is more likely to occur due to hardware failure or human error. But there are some key areas of which to be mindful to help protect yourself and your business.

Data Security

Data, it’s your whole business digitally stored on a computer, and it’s always at risk. Protecting it should be as apparent as locking your office door or activating the security alarm.

Data Backups

The absolute worst has happened: you can’t access your data, and you need a solution to get your business back up and running a quickly as possible. Think of Data Backups as a digital safety net.

Remote User Risks

Your business data security is only as strong as the weakest link. With changes in how employees access this data, there is a risk that your security has holes that you have not considered.

Data Security

Threat Spotlight

Ransomware

Ransomware is software that holds you to ransom. Once it infects a computer, it locks the user out. The only way to regain access is to pay the attacker to unlock the system. Ransomware is particularly damaging because there is no guarantee that the attacker will not lock the computer again. The best way to deal with ransomware is to prevent it from happening in the first place.

Data security that most people are familiar with is online security. We’ve all been aware of virus and malware since the dawn of the internet. Our job is to ensure that your online work does not open your business up to threats such as virus, malware and other malicious attacks.

But why would someone want to attack my business?

In most cases, they don’t. Viruses spread, well, like a virus. That’s how they got their name. They are transferred from computer to computer as connections via networks, the internet, or infected portable drives. They are seldom sent to a particular target – we’re not in a spy movie!

Malware and Trojan Horses are much the same. Most are infections of opportunity, not targeted attacks.  The danger comes from the sheer number of active viruses and the ease at which they infect systems.

How bad is it if we get infected?

It depends entirely on the type of software with which you are infected. Some are designed to be a nuisance, deleting files that enable your computer to function.

Others are more insidious. They track your usage to copy passwords and information that may grant someone access to your data or finances. They may even be mining for enough personal information so that an “identity thief” can gain access to your real-world assets.

Threat Spotlight

Ransomware

Ransomware is software that holds you to ransom. Once it infects a computer, it locks the user out. The only way to regain access is to pay the attacker to unlock the system. Ransomware is particularly damaging because there is no guarantee that the attacker will not lock the computer again. The best way to deal with ransomware is to prevent it from happening in the first place.

What we offer

Advanced Firewalls

The best way to prevent an online attack or infection is to block it before it gets to your system—our advanced firewalls monitor and stop threats from infecting your computer or network.

Protection Software

Firewalls won’t protect your computer against viruses introduced via an infected drive or other internal file sharing. You need comprehensive anti-virus software to scan for and isolate any detected infections.

System Recovery

In some cases an infection requires additional intervention. We can work to remove the infection from your system or reinitialise it in a “clean-state”, virus-free and ready for your files to be re-installed.

Let's talk prevention

Whatever the reason, corrupted or lost data can quickly bring any business to a grinding halt. We’re here to make sure that doesn’t happen to you.

Data Backup & Recovery

Threat Spotlight

Underestimating the impact

If you are a small business, the loss of what may be your “main work computer” can be catastrophic. Larger companies may feel less worried about a single workstation going down, but what if it was your central network server?

Having a Backup of your data is your number one best defence against catastrophic data loss. Like many IT solutions, data backups seem like another thing for the “too-hard basket”. They’re often dismissed as unimportant – until you wish you had one.

But it’s only in case of a virus infection, right?

Malicious software infection is what a lot of people think is the main threat. And for this reason, they justify not doing backups because they can’t imagine someone wanting to infect their computer. I’m afraid that’s not right for two reasons. Firstly, as stated above, infections are rarely targeted, and secondly, this type of attack is not the most likely cause of data loss.

So what’s the real risk?

A simple system failure is the most likely cause. Whether it caused by a software conflict or your physical hardware faulting, it’s far more likely that your computer or network storage will just stop working. Now imagine that happens. Your computer won’t turn on. You don’t have access to your client work – how are you going to service them? What about your accounts? Can you pay bills you can’t access? Invoice clients? Pay your employees?

Threat Spotlight

Underestimating the impact

If you are a small business, the loss of what may be your “main work computer” can be catastrophic. Larger companies may feel less worried about a single workstation going down, but what if it was your central network server?

Our Solutions

Remote Servers

You should always have a remote copy of your backup files. Many are content with a backup on their local server or separate hard drive. But what if an office fire or natural disaster occurs?

Cloud Backups

The cloud is the ultimate in off-site locations. And as an online storage solution, we can access it remotely, thus restoring a system without being dependent on the right hardware in the right place.

Backup Verification

It’s one thing to have a backup copy; it’s another to know it works. We test every client backup on an independent machine to verify it’ll work if needed.

Multiple Copies

We store our backup copies in multiple locations. Even if your workplace and our workplace both burned down, we’d still have files to get you up and running.

Let's back you up

When you consider all the ways you could lose your data and what it will mean for your business, you can quickly see why backups are critical.

Remote Worker Risks

Threat Spotlight

Personal Computers

  • What machines are your remote employees using to access your company data?
  • How many people in their household will have access to that computer?
  • Do they all access it using a shared user profile?
  • Does it contain any malicious code on it?
  • Is their internet connection secure?

How your remote workers access company data securely has always been an issue for any business serious about protecting their data. But the Covid lockdowns, which began in 2020, shone a light on this issue for companies who previously had not considered the threats this exposed them to.

How are remote workers a threat?

Consider this. You have a company serious about security, and you have your internal systems in place to prevent data loss, attacks and infections. Everyone works in the office on protected machines tied to your protected network—a lovely little virtual security fence around your data.
Now, in the panic of setting up staff to work from home and granting them access to your business servers, did you consider what machines they would be using? Did they take their workstations home, or are they using unsecured personal computers? Are you confident that it’s as secure as your office system?
Every one of those remote workers connections is a potential hole in your virtual security with a welcome mat rolled out for data threats.

But what about when we’re not locked down?

Think of the national lockdown as a social experiment that forced many businesses to re-evaluate where their staff work and the impact. In many cases, it turned out that productivity was not severely affected, and workers appreciated the flexibility of choosing their hours of work. As long as the job got done, it did not matter where the staff where located.

For this reason, many workers are moving to full-time or part-time remote work schedules even without lockdowns. Fewer on-site staff is excellent for businesses too, reducing their need for large offices and thus their overheads. While not all workers can or will move to remote employment, there is speculation that we will see a large shift to this type of arrangement in the near future, so it’s best to be ready.

Threat Spotlight

Personal Computers

  • What machines are your remote employees using to access your company data?
  • How many people in their household will have access to that computer?
  • Do they all access it using a shared user profile?
  • Does it contain any malicious code on it?
  • Is their internet connection secure?

Remote Worker Checklist

Firewall Protection

Most personal computer users would not even be aware if they had a firewall, let alone switched on. Make sure their computer and router firewall are active and up to an appropriate standard.

Protection Software

Even though many personal computers do employ some anti-virus software, it is typically a bare-bones package and must be upgraded to a proper business-level solution.

Backups

Computers in the home are statistically more likely to be damaged than those in an office. For this reason, they must have a regular off-site backup routine in place.

Limited User Access

If using a work computer, the employee should be the only one with user access. If using a personal computer, a “work profile” with security access must be employed.

Work Remote & Safe

Let’s chat about getting all your remote worker security sorted.  It’s a lot easier to organise with an expert than leaving it for your employees to figure out!