02.05.2019 Views

Cyber Defense eMagazine May 2019

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

Cyber Defense eMagazine May Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cybersecurity expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

●<br />

●<br />

●<br />

●<br />

External HD;<br />

Magnetic tapes (not in use);<br />

Local and isolated servers (standalone); and<br />

Cloud-based backup services (e.g., AWS S3).<br />

Each option has its advantages and disadvantages. For example, an external HDD is more portable than<br />

most other solutions. For Cloud-based solutions, it does not expose the information in an online service<br />

that could potentially be exposed to cyber-attacks, and information subject to data breaches.<br />

However it can also be damaged or misplaced more easily than a cloud-based solution. In addition,<br />

creating snapshots in a multi-device location may become less viable and time-consuming.<br />

Organizations have for many years opted for the use of automated backup solutions on their own servers.<br />

Despite the high installation costs, this type of tool brings more security and privacy to those who do not<br />

want to transfer the structure to the Cloud. In addition, this type of backup allows for greater scalability<br />

and supports a large amount of data.<br />

Cloud backup, on the other hand, has been notable in recent years for its low cost, high scalability and<br />

security. Today, companies in the industry can deliver services that use secure connections, encrypted<br />

data storage for a low value. With an internet connection, it is possible to hire a tool that can be accessed<br />

anywhere in the world for the configuration of a security backup routine.<br />

Take the Sunday Afternoon to Think About the Subject<br />

<strong>Cyber</strong> threats are constantly increasing. Technologies and software tend to become increasingly<br />

complex, with more lines of code (LOC), and with that the number of faults and potential vulnerabilities<br />

also tend to increase.<br />

With this in mind, cybersecurity must be on the agenda of the meeting as a priority topic. There are no<br />

bulletproof systems. Note that the exploitation of a zero-day vulnerability could compromise an<br />

organization. If a solid backup security policy has not been established, some of the server configurations,<br />

software licenses and sensitive information may be corrupted and destroyed.<br />

It’s therefore essential to lay out all points of failure to prevent and avoid problems this nature. These<br />

problems can cause irreversible damage to market positioning and consumer confidence.<br />

40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!