Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Critical Data Backups vs Cyberattacks
Tagged: Backup security
2017-12-23 at 04:26 #12941
I was participating in a discussion forum on cybersecurity and critical data protection. One of the points that were brought up during the discussion was on the security of backups and whether these backups could themselves be subject to a cyberattack and I’m really interested in getting more insight on the subject.
How can someone ensure the sanity of their backups? How can they make sure they haven’t backed up a malware along with their data? Are there any tips or best practices for backup procedures?
2017-12-24 at 11:35 #12956
This is an interesting question. Data backup software should have something built in, to where your only backing up specific folder/files/directories , and changes to those that are already backed up. As far as new files/folders onto the backups, having good antivirus/antimalware , firewall rules in place would help. Nothing is ever guaranteed though, you can follow the best practices established and pray for the best.
2017-12-24 at 15:05 #12953
This is a very interesting question about the integrity of data backups. One idea is to periodically restore your backups to an off-line network, and test the data backups with anti-malware/anti-virus software.
2017-12-25 at 14:28 #12970
Attack on backups is very much possible. What is there is a malware or virus in your primary data which is backed-up? The process that many folks overlook is not scanning the data for viruses – in your primary data stores and your backups. Just to avoid the risk of zero day attacks, it is recommended to test both primary and backup as and when a new AV signature is published.
2017-12-26 at 18:09 #13018
Does it make sense to keep the back up databases encrypted? Is it worth the additional expense to protect the backed up data on tier 1 applications?
2017-12-27 at 16:38 #13045
From my perspective, i also believe it is best and important to protect your data using what is known as the 3-2-1 rule. It simply states that at least 3 copies of data (so no single event will destroy all copies); data should be stored in at least 2 different formats ie. disk, tape, cloud, etc), one copy should be kept offsite to protect against fire, theft, flood, and other physical disasters.
2017-12-31 at 04:38 #13099
Very good insight on this 3-2-1 model. However, I think what is most important is understanding the areas and perimeters where the data are being stored in. Once this visibility is confirmed, layered perimeter defenses should be set up, and the bulk of the defenses should be put around the core infrastructures and systems.
2017-12-28 at 20:53 #13066
Very interesting topic on data backups, cloud security and GDPR.
To add to this relevant topic I would suggest to bring out the question of having strong European private company clouds. In a perfect world, data should flow through clouds seamlessly around the world. As a matter of fact only european data is “free for the world” and Europe might already be loosing the AI race because its data is being fed for free in foreign clouds. Only three continents are ready for the current data revolution, including Big Data and artificial intelligence: the US, China and Russia.The United States dominates the global cloud industry with its Amazon (AWS), Microsoft (Azure) and Google Cloud. By abolishing net neutrality in recent days, the United States has just created a very strong defense weapon against the current arrival of Chinese applications and services (which are the only real threat) on their market…like Ali Cloud. The Chinese government has decided to censor the internet. The firewall can block content and some sites, including Google, Facebook and Twitter, considered undesirable. This protectionism is entirely favorable to Chinese companies: to do business in China, it is necessary to deploy its services on an infrastructure in the interior of the country, and thus to duplicate its software architecture, to keep the Chinese data in China and contractualize with a local host (such as Alibaba for example). Russia censors the internet and doing so protects its data.
Europe implements GDPR and ePrivacy, measures that, despite data protection intentions of European Internet users, ultimately favor GAFAs, which, by their size, are more successful in getting the consent of Europeans to share their data than smaller local cloud companies.
Europe needs time to gather momentum for its own cloud companies to grow and become more secure, they need time to be able to protect their data and backup their data locally in order to allow its digital ecosystem to grow stronger to be able to compete with the outside world. The solution pushed forward is to require all Internet providers present in Europe to operate their services on clouds located in Europe, while creating a ban on importing data from Europeans outside the European area. Such a measure would force the giants to invest in Europe to duplicate their software architecture to operate in Europe, forcing them to keep the data of Europeans on their territory, and push employment of data scientists dedicated to the European market to back up, clean, secure and analyze this relevant european data: the true wealth of a reborn european nation.
GDPR might only be the beginning for a much wider European Data Protection Program which has to be carried forward by strong leaders from the digital world and hand in hand with Bruxelles.
2017-12-30 at 09:06 #13090
I used iCloud for phone data back up. My old phone has problem and can’t be use anymore, but I like to wait for the new model, so didn’t buy new phone at that time.
Used my hubby’s old phone temporarily. Thus when I bot the new phone and update all my original phone data from PC to the new phone (the usual step). Wants to combined the data from iCloud and PC, found out that I can’t.
Can either downloan eveything from iCloud or PC, but cannot combined both. If that’s the case, can use PC for back up instead of using iCloud.
Also is iCloud back up safe?
2017-12-30 at 13:33 #13093
Data Backup is a critical mitigation step against the cyber hacking . The mission critical and Operational data should be backed up with a proper security in place . It could reside in the same network or sub network with multilevel authentication and Authorization process . We need to make sure that data getting backed up is clean and virus free so that we can retrieve the data entirely just prior to getting hacked or getting impacted with malware.
I would like to know what members think about blockchain technology and whether it can help us against cyberthreat.
2018-01-01 at 13:14 #13118
@beep I have sincere doubts about security in the Data backups. I had sold one of my Iphones by clearing all the data with the help of Apple technician. The person who bought the iphone from me called one fine day and asked if its okay to delete my information from his phone. I was surprised and shocked at the same time. He told me that he could find all my text messages to my friends and families.
2018-01-01 at 21:52 #13138
I would think many firms rely on a third party service providers to assist with their disaster recovery programs which would include the storage of data. However this can also be the proverbial double edged sword in that a third party service provider could also be hacked and your firm’s confidential information could be breech. As someone who is just beginning to study cyber security I would think at least 2 series of redundancy of protected data should exist.
2018-01-02 at 12:09 #13183
We are often encouraged to safeguard data with data backup to Cloud services. In terms of an organization backing up data to an offline network or storage capacity, I am curious to know whether there are any significant costs (e.g., monetary or human resource assignment) associated with such a backup strategy? Thanks for any feedback.
2018-01-02 at 15:46 #13200
Interesting discussion. How vulnerable is Data that’s backed up to the cloud? Any recent cases that can be shared ?
2018-01-02 at 16:23 #13203
What we have learned is that to protect data a multifaceted hybrid backup strategy is required. Having both onsite and offsite backups allows for faster recovery times. With a clear understanding of your organizations Recovery Point Objective (RPO) and Recovery Time Objective (RTO)s.
A Hybrid solution that allows multiple hourly data snapshots and VM image backups allow redundancy is your data protection strategy. With a more affordable cloud storage solution such as Wasabi; $3.99 per month per Terabyte of data, it’s becoming more accessible to have offsite backup solutions.
Retention time plays a critical factor in ensuring that you have clean backups of your data and systems in case of an infection. Encrypting backups is also essential to ensure backup data will not be compromised in case of a 3rd party storage host is breached.
2018-01-02 at 21:08 #13219
Can a flat backup system help? In this system the data are stored in the same format as it’s original form. The advantages of a flat backup system includes a simplified restore process and the possible cost savings. A deployment of flat backup system is essentially a perpetual snapshot, to key data. The benefit of this snapshot-based backup approach is that data is never deleted from an object, so it is possible to recover to a point in time just before the ransomware started to corrupt the storage system, meaning a relatively easy recovery if both the ransomware start point is known and all the files are recovered to the same point in time. The snapshot can take recovery in stride, since it is just choosing earlier blocks to transfer instead of the most current, corrupted data. To apply recovery to individual files requires a good user interface or else it becomes tedious. In this situation, just for backup, is finding the right file then the right version is a function of how well the interface is written.
Check out the source of this information provided:
2018-05-02 at 07:48 #30636
Information Reinforcement is a basic alleviation advance against the digital hacking. The mission is to set up appropriate security for all basic and operational information shared in web. It helps in multilevel validation of data and approval of the same with this type of security system. Cyware provides several cyber security tips and advices to improve your cybersecurity awareness and survivability.
You must be logged in to reply to this topic.