{"id":13439,"date":"2019-11-30T08:00:06","date_gmt":"2019-11-30T02:30:06","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=13439"},"modified":"2020-01-22T13:23:20","modified_gmt":"2020-01-22T07:53:20","slug":"how-to-secure-backups-in-automated-data-protection-systems","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/how-to-secure-backups-in-automated-data-protection-systems\/","title":{"rendered":"How to Secure backups in Automated Data Protection Systems?"},"content":{"rendered":"<p>Amidst the ever-evolving threats facing enterprises today- the task of completely securing an organization from a multitude of external and internal threats becomes increasingly tedious with each passing day. Not only do enterprises have to worry about malicious third-party agents wreaking havoc by stealing sensitive information, or by launching\u00a0 different\u00a0 attacks- an insecure business can also lead to the loss of valued customers. The crucial tie that <a href=\"https:\/\/www.the-next-tech.com\/artificial-intelligence\/ais-dark-side-a-rising-threat-to-cybersecurity\/\">cybersecurity<\/a> shares with the financial well-being of a company is further validated by the fact that a staggering<a href=\"https:\/\/www.vox.com\/sponsored\/11196054\/why-every-small-business-should-care-about-cyber-attacks-in-5-charts\" target=\"_blank\" rel=\"noopener\"> 60% of small businesses close down <\/a>in the aftermath of a data breach.<\/p>\n<p>Taking the dire need for better cybersecurity into account- the first step that organizations can take to foster security against external and internal threat agents is to simply educate themselves. This also includes training on <a href=\"https:\/\/vpnoverview.com\/internet-safety\/business\/security-awareness-training\/\" target=\"_blank\" rel=\"noopener\">security awareness and its importance<\/a>. Unfortunately, however- a majority of cybersecurity teams employed by enterprises fail to hit the mark, and prefer to stay in the dark about the potential loopholes in their cybersecurity infrastructure.<\/p>\n<p>One such overlooked aspect of an organization\u2019s security infrastructure is backup security- which is a key element of securing an enterprise in the present age of rampant ransomware, malware and data breaches.<\/p>\n<h2><strong>What is backup security and why does it matter? <\/strong><\/h2>\n<p>As mentioned above, an often overlooked part of an enterprise\u2019s security structure is backup security. As more and more organizations ride the wave of digitalization and increase their reliance on technologies such as <a href=\"https:\/\/www.datapine.com\/blog\/cloud-computing-risks-and-challenges\/\" target=\"_blank\" rel=\"noopener\">cloud computing<\/a>&#8211; backup security becomes necessary for organizations to exercise, since backups contain highly sensitive and confidential data, which could have disastrous consequences if breached.<\/p>\n<p>Furthermore, with the looming danger of ransomware attacks hanging over enterprises, investing in backup security becomes a necessity, rather than a \u201cmiscellaneous IT expense.\u201d Once an organization realizes that it is under a ransomware attack; having a backup of all the data encrypted by the <a href=\"https:\/\/www.the-next-tech.com\/security\/ransomware-heres-all-about-to-know\/\">ransomware<\/a> comes in handy- and prevents an enterprise from having to pay a hefty ransom to the cybercriminals.<\/p>\n<p>However, the increasing sophistication of ransomware attacks, combined with the ever-evolving threat landscape of today\u2019s cybersecurity world leaves a lot of room for ransomware attackers to encrypt the backup files as well- which is where the road to achieving cybersecurity splits in two impossible choices for enterprises to select. The first choice requires the organization to pay a large ransom for the decryption key, while the second choice entails that an enterprise makes peace with the digital destruction and exploitation of highly confidential information.<\/p>\n<p>If your enterprise decides to go for the first option, hoping that you\u2019ll gain access to all of the compromised data immediately- you\u2019re just setting yourself up for disappointment. There have been multiple instances when an enterprise didn\u2019t receive all of their data back, with some estimates suggesting that complete data recovery could take up to a month or longer.<\/p>\n<p>In addition to the prominence of the dire threat posed by <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-2016-story-of-the-year\/76757\/\" target=\"_blank\" rel=\"noopener\">ransomware attacks<\/a>, a fundamental and general disregard for cybersecurity, as demonstrated by the fact that more than <a href=\"https:\/\/www.iii.org\/sites\/default\/files\/docs\/pdf\/small_business_big_risk_101218.pdf\" target=\"_blank\" rel=\"noopener\">two-thirds<\/a> of businesses don\u2019t invest in cybersecurity insurance coverage, which amps up the damages caused from disastrous to absolutely catastrophic.<\/p>\n<p>Taking all of this information into account, the need for improved backup security becomes apparent- even more so, when we factor in the potential damage that malware can cause as well. Usually, modern cybercriminals employ malware to silently target a network over a longer course of time, and once the malware has entered every device on the network- the ransomware is activated- the consequences of which we\u2019ve already discussed above.<\/p>\n<p><strong>Related:<\/strong> &#8211;\u00a0<a href=\"https:\/\/www.the-next-tech.com\/artificial-intelligence\/how-artificial-intelligence-is-changing-the-world\/\">How Artificial Intelligence is Changing the World<\/a><\/p>\n<p><strong>What are the problems encountered in securing backups in automated services? <\/strong><\/p>\n<p>Up till this point, we\u2019ve made it seem like cybersecurity experts are recusing on a private ranch somewhere, while the cybersecurity world burns in flames around them. Despite the bad rep that they\u2019ve garnered, cybersecurity experts try their best to combat the threats posed to backup files- it\u2019s just that sometimes the situation gets out of their control.<\/p>\n<p>One such security strategy formulated for the purpose of protecting backup files against ransomware attacks is the \u201cair gap\u201d strategy. Widely considered to be the most effective way to protect backups- the air gap approach to protecting backup dictates that all backup files are physically detached from the network. Usually, the files are removed from the recording device and are stored offsite.<\/p>\n<p>In the instance of a data breach, or a ransomware attack- the backup files need to be physically relocated and transferred for the IT team to restore the data set. Although creating an air gap works perfectly in most cases, there are several problems that arise with the continued reliance on air gaps, particularly in automated services.<\/p>\n<ul>\n<li><strong>Creating an air gap tends to be impractical: <\/strong>Perhaps the biggest problem that we\u2019ve encountered with the air gap approach to protecting backup files is how impractical it is. Usually, organizations rely on auto-backup features, which backs data up regularly within a short span of time- which renders the shipment of backup files to an offsite location virtually impossible. Moreover, even attempting to do so would result in a major financial loss for the company.<\/li>\n<li><strong>Authentication difficulty: <\/strong>With automated service, relying on the air gap approach creates an authentication difficulty, since the complete recovery of data requires for a trusted agent to use multi-factor authentication in order to gain access to the backup files for recovery.<\/li>\n<li><strong>An air gap is not self-sufficient: <\/strong>The most significant problem that arises in emulating the air gap approach with automated services is that it is not self-sufficient. The first step that enterprises need to take towards securing backup files on automated services, is to ensure that all the files are kept as \u201cread-only.\u201d In addition, organizations will also need to create different and separate domains for the storage of these files, complete with different authentication keys.<\/li>\n<\/ul>\n<p>Although the creation of an air gap is usually the most effective way to protect backups, enterprises need to rely on other alternatives to secure backups- especially as far as automated services are concerned. However, the process of securing backups can be made easy by following the procedure mentioned below.<\/p>\n<p><strong>Related:<\/strong> &#8211;\u00a0<a href=\"https:\/\/www.the-next-tech.com\/future\/big-data-technology-advantages-and-challenges\/\">Big Data Technology: Advantages and Challenges<\/a><\/p>\n<p><strong>\u00a0How can enterprises secure backup files? <\/strong><\/p>\n<p>Before we can get into the details of securing the backup files of an enterprise, it is highly important that we clear the air of some doubts that our readers might be harboring. For starters, it is highly important that enterprises ensure that the content of the backup files is secure as well. Our go-to way of ensuring that backup files remain secure is by granting access to a limited number of trustworthy administrators.<\/p>\n<p><em>With that said, enterprises can rely on the following steps to ensure that their backup data set is protected from cybercriminals:<\/em><\/p>\n<ol>\n<li>The backup files should only be accessed by a limited number of trustworthy administrators only.<\/li>\n<li>All the backup files should be encrypted, and the keys should be placed under extreme protection and scrutiny.<\/li>\n<li>Store your backup files, along with decryption and authentication keys on a separate network.<\/li>\n<\/ol>\n<h2><strong>Parting words<\/strong><\/h2>\n<p>Although securing an enterprise seems like an arduous task, following the steps mentioned above can prevent devastating consequences- consequences that are all too likely to happen in the present-day conditions of the <a href=\"https:\/\/www.cisco.com\/c\/en_in\/products\/security\/what-is-cybersecurity.html\" target=\"_blank\" rel=\"noopener\">cybersecurity<\/a> world!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amidst the ever-evolving threats facing enterprises today- the task of completely securing an organization from a multitude of external and<\/p>\n","protected":false},"author":448,"featured_media":13442,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[699,698,700,209],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/13439"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/448"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=13439"}],"version-history":[{"count":5,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/13439\/revisions"}],"predecessor-version":[{"id":15576,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/13439\/revisions\/15576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/13442"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=13439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=13439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=13439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}