A hospital in California was subjected to a ransomware attack closing the hospital for 2 days and resulting them ultimately having to pay $17,000 to get control of their files and folders back.

These kind of attacks are becoming more frequent.

So how does Zypha try to mitigate this risk?

1. We use end point security which is proactive in heading off any attack.

2. We block spam emails on a ‘points’ basis

3. We remove any programs or executable (.exe) attachments from any email in any case

4. We do not allow any users to have admin rights and therefore they cannot install programs – instead we install programs for them to assure security

5. We do not allow such programs to be secretly installed from websites. There are many unsecure websites out there which prey on users who click through to them

6. We only allow browsers which can block program installation and other malicious add-ons. This is why we do not include Firefox in our desktop service.

Alone or collectively these serve to minimize the risk of attack or infiltration – however it is clear that millions of businesses of all sizes do not instigate the kind of strong protection offered by Zypha. This is particularly true in the case of small and medium sized businesses which simply do not have the technical knowledge, time or resources to ensure this level of robust security. Remember that hackers are increasingly targeting small and medium sized businesses because they are large in number, less sophisticated, easier to hack for profit and lack the size to be taken seriously by law enforcement compared to a Fortune 500 company which can seek to pursue perpetrators given their access to greater resources.

Everyone says they have it…others rave about it…BUT, do you truly have a good backup of your Data? Yeah, sure…you spent the money for the backup software license, you bought a new RDX drive with a few TB cartridges or a shiny new NAS, spent a few hours setting up your backup jobs and SUCCESS right?! When the jobs finish, you get to see an email or log entry which tells you that your backup jobs worked. You can check the cartridges or HDD’s and see that hey, there is a bunch of data there! Nice work Sparky…

Oh wait! Hold on just a sec while you pat your own back there…have you tried to RESTORE the Data? Have you tested the limits of your backup software and performed any test restore jobs to ensure that it actually grabbed the data you specified? Can you successfully restore your CEO’s mailbox back to Exchange? Find that spreadsheet from accounting that has your bonus info? Hmmm. Good question, eh?
Just about everyone I’ve ever spoken to about backups (both tech pro’s and clients) usually answer that question with a cold, blank stare…almost as if they are imagining themselves sitting next to their server, at 4am, after a failure, and NOT being able to restore Data, wondering OHHHH SNAP! (Not exactly the word SNAP, but you get the idea…)

It’s a great question to ask. It really works in having the person think about what it is backups are really for – RESTORING DATA!! Anyone can “setup” a backup system. It’s easy to buy software/hardware, come up with a bullet-proof strategy…yada, yada, yada. BUT – can you restore the Data?? Since most folks never try, then you can’t REALLY say that you have it. And you definitely cannot RAVE about it either. 

My suggestion of course, put your backup system through its paces. Perform a few mock data restores of different types of Data and ensure that you are the Superhero your boss thinks you are. Otherwise, you’ll find yourself at 4am, next to your server, after a failure, wondering…WHY ME?!