Author Archives: lverbik

The Latest Malware Threat Will Make You Wanna Cry

24 May 17
lverbik
, , , , , , , , , , ,
No Comments

Wannacry, Wannacrypt, Wannadecrypter, these are just some of the names of the latest string of malware circulating both the news cycles, and the internet.  They are all part of a Major Ransomware sting that hit the scene last weekend.  In case you don’t know Ransomware is a bug that infects your computer and then encrypts whole drives with an encryption key, making them useless unless you have the key to un-encrypt them.  The bad guys then offer to “Sell” you the key for $300 Bitcoin.  (Bitcoin is an internet currency that is untraceable, and gaining popularity as a global currency, and not just by the bad guys).  Wannacry exploited a vulnerability in Windows to encrypt the computers.  Microsoft had released the Patches back in March, and we had them set up to go out then.  We checked through our software and found that all of our clients that are on the Advantage Care Monitoring packages were already patched (there were a couple of un monitored computers that didn’t have the patch, but we took care of that).  We just wanted to let you know that we are taking these security threats serious, and are doing what we can to help protect you.

Things to watch out for:

  1. Strange attachments that you are not expecting in an email. If you get an email with an attachment that you are not expecting.  Before you open it, reach out and see if the individual actually sent something to you.  It was said that the Wannacry was being distributed via email (worm where bug would replicate itself and email it out to everyone in your contacts list).
  2. If you get that pesky window that pops up saying that it wants to run windows updates… let it.
  3. If you are on a maintenance plan with us, but you shut your computer down every night, we can’t push out the updates to you, and end up trying to push them out during the day, disrupting your work flow. This can be avoided by leaving your computers turned on at night, when we do the updates, and other housekeeping duties to ensure that your computers are up to date, and fresh for you the following day.
  4. Be mindful of where you are going on the internet. The internet is full of corrupted web sites, some are just malicious, and others are corrupt and could infect you just by visiting them.
  5. Nothing on the internet is “Free”. Free games, and Free coupons come with a catch.  They get to install stuff on your computer that sends them info, and leave you vulnerable.  Once these things get on your system, they reach out to their “Paying” friends and invite them to the party on your computer, and now all of a sudden your computer is crawling because all of this unwanted software is clogging everything up, and potentially doing harmful things in the background.
  6. Backup, Backup, Backup!!!!!! The best defense against Ransomware is just blow away the infected computer/files and rebuild it. A backup is essential for this.  An offsite, disconnected version is essential these days as well.  There have been cases where an external hard drive with all of the companies backup files were encrypted also (because they were connected to the computer when it was infected). So just having a backup file may not be enough.

We are taking extra steps to ensure all of our client’s security.  If you have any questions, feel free to contact us and we can  discuss this more.

4 E-mails You Should NEVER Open

17 May 17
lverbik
, , , , , , , , , , , , , , , , , ,
No Comments

No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an e-mail sent by a cybercriminal. Some spam is obvious (can you say, “Viagra at a discount”?) but others are VERY cleverly designed to sneak past all the filters and trick the recipient into opening the door. Known as a “phishing” e-mail, this still is the #1 way hackers circumvent firewalls, filters and antivirus, so it’s critical that you and your employees know how to spot a threatening e-mail. Here are four types of e-mail ploys you should be on high alert for.

The Authority E-mail. The most common phishing e-mails are ones impersonating your bank, the IRS or some authority figure. The rule of thumb is this: ANY e-mail that comes in where 1) you don’t PERSONALLY know the sender, including e-mails from the IRS, Microsoft or your “bank,” and 2) asks you to “verify” your account should be deleted. Remember, ANY important notification will be sent via old-fashioned snail mail. If it’s important, they can call you.

The “Account Verification” E-mail. Any e-mail that asks you to verify your password, bank information or login credentials, OR to update your account information, should be ignored. No legitimate vendor sends e-mails asking for this; they will simply ask you upon logging in to update or verify your information if that’s necessary.

The Typo E-mail. Another big warning sign is typos. E-mails coming from overseas (which is where most of these attacks come from) are written by people who do not speak or write English well. Therefore, if there are obvious typos or grammar mistakes, delete it.

The Zip File, PDF Or Invoice Attachment. Unless you specifically KNOW the sender of an e-mail, never, ever open an attachment. That includes PDFs, zip files, music and video files and anything referencing an unpaid invoice or accounting file (many hackers use this to get people in accounting departments to open e-mails). Of course, ANY file can carry a virus, so better to delete it than be sorry.

Cybercriminals Confess: The Top 3 Tricks, Sneaky Schemes And Gimmicks They Use To Hack Your Computer Network

21 Apr 17
lverbik
, , , , , , , , , , , ,
No Comments
  1. We’re masters at getting you to click on fake e-mails. One of the most common ways hackers gain access to computer networks and devices is via phishing e-mails. Gone are the days when you could easily spot a spammer’s e-mail because of its poor English, typos and punctuation mistakes – attacks are getting more and more sophisticated. That’s because cybercriminals have access to the same cutting-edge online marketing tools that legitimate companies have, giving them the ability to send highly targeted messages that look completely legitimate from sources you trust. These e-mails often use your name, your professional title and may even reference a group you belong to. Further, if you click on the e-mails or respond, you’re inviting a hacker into your network that bypasses a firewall and antivirus software. The only way to avoid getting snared by a phishing e-mail is to NEVER click on, open or respond to any e-mail requesting personal information, passwords, login details, etc. Always go directly to the site.
  2. We automate attacks that work around the clock. Hackers have software programs that systematically test millions of possible passwords to break into your PC. Easy-to-guess passwords are worthless against the power, automation and sophistication of these super-apps that will constantly hammer away at guessing your password. Because of this, make sure your passwords contain both uppercase and lowercase letters, at least one number and special characters – and NEVER use easy-to-guess passwords like “letmein” or “password.”
  3. We can use legitimate web sites to attack you. A growing number of cyberattacks are coming via “drive-by” download, where a hacker gains access to a legitimate, honest business web site (or sets up a site that looks legit on every level) but has malicious code installed called an “exploit kit.” An exploit kit can discover a vulnerability fast by probing your operating system, browser and the software you have installed (like a PDF reader or video player) to find a way to access your PC or network. If you (or your IT company!) aren’t applying regular security updates, you are unprotected against these exploits.

While these are common ways hackers gain access, there are dozens of other more straightforward ways hackers gain access if you’re not diligently updating and patching your network, maintaining an up-to-date firewall, antivirus and spam-filtering unified threat-management system. The days of “That could never happen to me” are gone.

If you want peace of mind that YOUR business isn’t a “sitting duck” to hackers, call us for a free assessment at 317-857-0150. You’ll discover if you truly are protected from common hacker attacks and what you can do now to avoid being an easy target. Call today at 317-857-0150.

4 Must-Have, Low-Risk Cloud Solutions

05 Apr 17
lverbik
, , , , , , , , , , , , ,
No Comments

Let’s face it, your business has more competition than ever. And they’ll eat you alive if you fall behind in today’s technology “arms race.”

Maybe your network needs greater security. Or you haven’t yet taken advantage of new cloud-based apps that help your team get more done in less time. Today, the action is in the cloud. And if you don’t know what’s out there, it’s just that much easier for competitors to pull ahead.

To help you stay on top, here’s a quick survey of four ways to put the cloud in your corner, along with examples of each.

Network Security

As devices on your network become more diverse and mobile, monitoring them in real time is absolutely critical to averting cyber-attacks. A good network-security tool probes for weak points and alerts you to potential threats. It can employ both hardware and software technologies. And today’s environment demands a bevy of checkpoints, from access control to WiFi-intrusion monitoring.

But how do you protect against threats that evade your monitoring efforts? Due to the recent spread of “fileless” malware, no antivirus program is 100% “bullet-proof.” However, you should be able to find basic software protection for around $40 per user. Look for features such as e-mail security, data loss prevention, network segmentation and behavioral analytics. And ideally, it scans quickly, takes up little space on your devices and may even be able to recover files encrypted by ransomware.

Collaboration

Giving your team the right cloud collaboration tools can be almost as good as giving them steroids… (Except, of course, it’s legal.) With the wide array of apps available today, the trick is finding the best one – or the best combination – for your company. Top contenders include Asana, Slack, Teamwork, Trello and Google Drive. These and similar apps can improve efficiencies in areas like project and task management, team communications and collaboration, brainstorming, document processing and storage, and more. And with cloud collaboration, you’re no longer restricted to bringing aboard talent from your local area alone.

Contracts & Accounting

Contracts and proposals that get bogged down in logistics can hurt monthly revenues. Is your sales team still asking customers to sign and fax back important documents? If so, they’re losing precious minutes every day. Then there’s the cost of storing and managing physical files. It all adds up. It’s no wonder so many companies now use electronic signature apps, such as DocuSign, Adobe Sign and RPost. They’ll let you manage the signing of important documents entirely online, and will encrypt and store files for you. Some are even court-approved and create a full audit trail.

For small business accounting, industry veteran QuickBooks, now with an online version, and upstart Xero can help you keep the books with relative ease. They both offer a clean, intuitive UI and affordable pricing with a comprehensive set of features. And, of course, being cloud-based, they can be accessed from a variety of locations, adding flexibility to your workforce.

If you’d like to know how well your company is (or isn’t) taking advantage of today’s cloud, contact us.

Network Abuse: Don’t Push Your ‘Luck’

16 Mar 17
lverbik
, , , , , , , , , , , , , , , , , , , , , ,
No Comments

Look around your office. Isn’t it great to see your team hard at work on their computers? Yet if we take a closer look, let’s see what’s really happening…

Joe, your new sales rep, is poring over last weekend’s game stats…

Amy in marketing is looking for a new job, surfing your competitors’ websites, chatting with their HR people…

Wes, over in customer support, just bogged down your entire network by downloading a video file of Metallica in concert…

Guy, your new hire in shipping, is on hotdate.com, viewing questionable photos…

Bob in accounting is browsing stock-investing sites, in search of a hot tip…

Okay, so maybe it’s not that bad at your company. But this type of behavior will happen to some degree if you don’t proactively prevent it. The real problem is, unfiltered content often links to malware and other threats. Ignore it and you risk productivity losses, legal liabilities, extortion, blackmail and fraud. And not only that, the resulting data loss and corruption can cost your company big-time. Cyberthreats stemming from unfiltered content aren’t something you can count on your lucky leprechaun or four-leaf clover to protect you from.

In today’s mobile environment, content filtering has becoming a greater challenge than ever before. Your company may already be doing some filtering at the network level. However, when was the last time you checked the number of mobile devices linked to your network? As your workforce goes mobile, your network is exposed to a rapidly expanding “attack surface.” With BYOD (bring your own device) now the norm, the old rules of content filtering just don’t cut it anymore.

Are You Making Any Of These Mistakes?

Old content-filtering models presume your network has a safe “firewall.” But now, with BYOD, you need a different way to protect your data. And that’s where endpoint security comes into play. Endpoint filtering keeps devices on your network safe from infection, no matter where they hook into the Internet.

But make ANY of the following mistakes with endpoint security and your network could be a sitting duck:

  1. Missing even ONE endpoint. This applies to tablets and smartphones as well as home-based machines that VPN into your network.
  1. Skimping on security policies, protocols and training. Believing that tech tools alone will keep your network secure is a recipe for breaches. In fact, no technology can keep a network safe if users cut corners.
  1. Leaving endpoint filtering out of your overall security plan. Ad hoc security invites disaster. An improperly designed system exposes holes that hackers love to find.

So, What Exactly Should You Filter?

Forrester Research states that companies whose users access the cloud should:

  • Detect and intercept unusual or fraudulent activities related to data in the cloud.
  • Detect, neutralize and eliminate malware in cloud platforms.
  • Detect and monitor unsanctioned cloud applications and platforms usage.
  • Protect against leaks of confidential information.
  • Encrypt structured and unstructured data in cloud platforms.
  • Investigate suspicious users and incidents.

Between BYOD and ever more complex cyber threats, you simply can’t afford to run around putting out fires. You absolutely MUST proactively defend your network in depth with endpoint content filtering.

Lost Employee Smartphone? Do This NOW!

15 Feb 17
lverbik
, , , , , , , , , , , , , , , ,
No Comments

“Hey boss, I lost my smartphone.”

How well have you prepared for this moment? It will happen sooner or later. If your company has a plan in place, no big deal. If not, you may suddenly get that sinking feeling in your gut …

And well you might. You now have three big worries:

Compliance Issues – If your employee had access to information covered by any number of regulations, your company could be subject to stiff penalties. One employer we know of wound up with a $900,000 fine.

Data Security – Sensitive company data in the wrong hands could spell disaster. Access to your network, secure sites, proprietary files, work-related e-mails and corporate secrets may now be out of your control. You must move quickly to prevent serious financial harm.

Employee Privacy and Property Concerns – If a valued employee had family photos and movies on the device, and you remotely delete all data on the phone, you may now have a disgruntled, or even uncooperative, employee. Especially if company policy regarding BYOD (bring your own device) and data loss were not clearly stated and agreed to up-front.

So how do you prevent a relatively minor incident from blowing up into a big problem? Here are seven smart measures you can take right now to prepare for the day an employee smartphone is lost or stolen:

  1. Install a mobile device management (MDM) system on any employee device to be used at work. This software can create a virtual wall separating work data from personal. It facilitates any security measures you wish to impose. And to protect employee privacy, it can limit company access to work data only.
  1. Determine which devices will be allowed and which types of company data people may access from them.
  1. Require that employees agree with an Acceptable Use Policy before they connect to your network. Make sure these include notice as to conditions in which company data may be “wiped” – i.e., destroyed. Also include specific policies regarding device inspection and removal of company records.
  1. Put strong data protection practices in place. Require use of hard-to-crack passwords and auto-locking after periods of inactivity. Establish protocols for reporting lost or stolen devices. Mandate antivirus and other protective software as well as regular backups.
  1. Designate someone at your company to authorize access to software and critical data. This person can also be your main point of contact for questions about BYOD policy and practices. It might also work well to distribute a resource page or FAQ document to your employees.
  1. Establish a standard protocol for what to do when a device is lost or stolen. Both Android and iOS phones have features that allow device owners to locate, lock and/or “wipe” all data on their phones. Make sure your policy requires that these features are set up in advance. Then, when a device is lost or stolen, your employee can be instructed to take appropriate action according to your protocol in order to protect company data.
  1. And finally, your best protection is to implement a well-crafted BYOD policy in advance. Develop it in partnership with risk management and operations personnel, as well as legal counsel and IT professionals, to come up with an effective and comprehensive plan.

Do not delay on this – it is a serious vulnerability that can and must be addressed in order to assure the safety of your company’s data and systems.

 

Backup

Don’t Rely on Cheap Online Backups for Your Data!

08 Feb 17
lverbik
, , , , , , , , , , , , ,
No Comments

Last Night I Was Startled Out Of Bed In A Cold Sweat,

Heart Racing, With Fear Racing Through My Mind…And YOU Were The Reason For My Panic!

Was I having a nightmare? Was I just watching too many reruns of The Twilight Zone? Had I eaten a big meal before bed? No – it simply occurred to me that you might be relying on cheap, online backups for your data!

And if that data was erased, corrupted or destroyed, you might not ever get it back! The thought of that happening scared me half to death!

You see, your business network creates a lot of important data every day, which means you need regular backups to ensure that you always have access to this information. Many cloud storage services offer remote backup for low prices, but the promise of cheap backups is often too good to be true. Instead of getting the reliable storage you need to protect your business data, you may run into frustrating pitfalls. And THAT is what had me up in the middle of the night.

Here are a few nightmares you might run into in real life, if you’re using one of those cheap cloud backups:

Data Restrictions

Some cloud services claim to have unlimited storage. However, there’s always a limit to what a server can hold. Most cheap backup services don’t have the space that businesses need. This makes it impossible to secure all of your data. Getting more space incurs extra fees, and this could be a problem for small businesses with tight budgets.

Limited Devices

Business networks can be extensive. Many cloud backup services only cover the data stored on one machine. This might work for companies that store all necessary data on a central server, but others may require a more extensive backup solution that covers multiple machines and handles larger amounts of information.

Slower Speeds

Running a backup can take a long time when you have a lot of files to copy. A cheap cloud service can’t offer the resources necessary to speed up this process. Many of them put a cap on the amount of bandwidth you get. This could lead to incomplete backups, especially for businesses that need to copy several dozen gigabytes of data every day.

Lack of Syncing and Versioning

One benefit of cloud storage and backup is the ability to sync the latest versions of files across all of your company’s devices. This service can be a lifesaver for businesses whose employees do a lot of remote work using smartphones or tablets. However, cheaper backup options don’t usually include syncing. They also don’t back up multiple versions of files. Versioning is necessary in the event that a current file becomes corrupted and an earlier version needs to be recovered.

Uncertainty

Although data stored in the cloud can be accessed from anywhere, it’s written to physical servers that belong to the company that handles the backups. All hardware is subject to failure at some point. If this happens, you could lose all the data that you thought was safe. That’s why every backup plan needs to have a fail-safe. You should plan to have at least one storage option in addition to the cloud.

Shaky Security

Business data includes sensitive information that requires encryption before being transmitted. This is true no matter what type of backup you use. Not every cheap cloud solution provides this level of security. Anyone can access information sent without initial encryption. This means that customer data and business transactions could be hacked during a routine backup. Data also needs to be encrypted once it’s on the server to prevent intrusion by hackers. Even then, there’s a chance that employees of the cloud service have access to the key that’s meant to provide this protection on the server end.

Cloud Alternatives

With all of these potential drawbacks to consider, cheap cloud service isn’t likely to be the best choice for your business backup needs. Fortunately, there are many other options that can be set up onsite to give you control over what happens to your data.

Is your data being backed up correctly? Contact us for a free analysis.

5 Tools To Keep Your Kids Safe Online

30 Jan 17
lverbik
, , , , , , , , , , , , , , , , ,
No Comments

School is in full swing, your kids are digging for the data they’ll need to fill all those reports, papers and projects that fuel their passing grades…

And Mr. Google can be their greatest friend when it comes to finding tons of tidbits to keep teacher happy.

But with great opportunity comes great risk…

Threats to your kids’ safety and well-being, posed by bullies, scam artists and pedophiles, lie in wait for the innocent. For example, according to CBS news, odds are about one in seven your kid will get picked on by a cyberbully.

Fortunately, you have a few tools and tricks up your sleeve to keep your kids safe. Here’s a helpful handful that we recommend:

  1. Kids may come across offensive web pages as they search the Internet. They can avoid this content by using child-oriented search engines, such as AskKids or KidsClick.org. This method isn’t always completely effective, so you may want to combine it with filtering software.
  1. A low-cost tablet and smartphone application can monitor, restrict and time your kids’ online activities. Mobicip blocks access to sexually explicit web sites. You may also use it to filter out various other material, such as news, social media or chat rooms.
  1. Cyber Patrol Online Protection offers a similar solution for desktop and notebook PCs. It blocks harmful web sites, logs online activity and limits the amount of time that kids can surf the web. This software also does its best to detect cyberbullying and warn parents.
  1. The STOPit smartphone app lets children tell adults about cyberbullying without risking retaliation. When kids see mean-spirited posts about their peers, they can anonymously forward the messages to parents or teachers. A high school in New Jersey successfully reduced bullying by urging students to use this app.
  1. Garfield, Nermal and Dr. Nova teach kids about Internet bullying in an interactive cartoon known as Professor Garfield Cyberbullying. The iPad app gives children tips on what to do when peers engage in this hurtful behavior. It uses a story about an online animal dancing contest to keep young learners interested.

These tools can make a big difference, but it’s still vital to talk about Internet safety. Be sure to discuss the potential risks with your child. Kids usually benefit when parents take the time to listen and offer helpful advice about specific issues.

Cloud Computing: Good, Bad & Ugly

18 Jan 17
lverbik
, , , , , , , , , , , , , , ,
No Comments

When a network of IT gadgets like routers, DVR machines and closed-circuit TVs can take down hardened, well-provisioned Internet giants like Twitter, Spotify and Amazon – as happened last October – you’ve got to think twice before moving your data to the cloud.

Yes, a move to the cloud can yield big payoffs in terms of cost savings, increased efficiency, greater flexibility, collaboration for your workforce and more. Yet there is a dark side. It would be naive to think otherwise. Your choices about whether and how to use cloud technology in your network merits serious consideration.

So, just what is “the cloud”?

Instead of constantly buying new equipment and software, cloud computing allows you to pay for just what you need. Just as with a utility company, you get software and storage on a monthly basis, with no long-term contracts. Chances are, most of the software you now use is cloud-based. You simply access it on a pay-as-you-go basis.

Similarly, you can store data in the cloud, where it can be easily accessed when you need it. This reduces the need to buy and manage your own backup gear and software, thus reducing overhead. Yet, as with any major decision, it’s critical to be aware of both the benefits and pitfalls of putting your company’s data in the cloud.

The Pros

There are three major advantages offered by cloud computing:

  1. Scaling up or down can be done without major investment or leaving excess capacity idle. It also enables your entire workforce to get more done, where and when they need to.
  1. With data and software in a shared cloud environment, staff can collaborate from anywhere. Everything from HR to accounting, and from operations to sales and customer relations, can be managed from diverse and mobile environments, giving your team greater power to collaborate effectively.
  1. Disaster Recovery. Typically, data stored in the cloud can be easily retrieved in the event of a disaster. It also augments local backup and recovery systems, adding protective redundancy.

The Cons

While the cloud offers obvious benefits, it also increases your company’s potential “attack surface” for cybercriminals. By spreading your communications and access to data beyond a safe “firewall,” your network is far more exposed to a whole bevy of security concerns. Many of them can be addressed with these three best practices:

  1. Social Engineering Awareness. Whether you go cloud or local, the weakest link in your network is not in your equipment or software; it’s in the people who use them. Cybercriminals are aware of this fact. And you can count on them to come up with an endless variety of ways to exploit it. One day it’s a phone call ostensibly from your IT department requesting sensitive data, the next it’s an e-mail that looks official but contains malicious links. Make sure your employees are aware of and trained to deal with these vulnerabilities.
  1. Password Security and Activity Monitoring. Maintaining login security is absolutely critical any time you’re in a cloud environment. Train your staff in how to create secure passwords and implement two-factor authentication whenever possible. Take advantage of monitoring tools that can alert you to suspicious logins, unauthorized file transfers and other potentially damaging activity.
  1. Anti-Malware/Antivirus Solutions. Malicious software allows criminals to obtain user data, security credentials and sensitive information without the knowledge of the user. Not only that, some purported anti-malware software on the market is actually malware in disguise. Keep verifiable anti-malware software in place throughout your network at all times, and train your employees in how to work with it.

Your #1 MUST-DO Resolution For 2017

28 Dec 16
lverbik
, , , , , , , , , , , , , , , , , , ,
No Comments

With every New Year comes the chance to reset priorities. Unfortunately, when the topic of implementing a data recovery plan comes up, the comment we most often hear is “I know I should, but I haven’t gotten around to it yet…”

So…what if the pilot on the next flight you’re on announces right after takeoff, “I know we should have run through our preflight checklist, but we haven’t gotten around to it yet…???”

Without a solid backup and recovery plan in place, just one mission-critical file that gets lost or stolen could put your company in a world of serious hurt. When you compare the high cost of replacement, repair and recovery to the relatively trivial price of keeping good backups, the choice is an absolute no-brainer.

Why disaster recovery planning matters more than you think

Let’s face it, data is the nucleus of your business. That means that a single ransomware attack could wipe you out in a matter of minutes. Today’s cybercriminals are raking in literally billions of dollars (yes, billions) preying on the unwary, the poorly protected and those who “haven’t gotten around to it yet.” Let’s consider the facts…

Ninety-seven percent of IT services providers surveyed by Datto, a data protection company, report that ransomware attacks on small businesses are becoming more frequent, and they expect that trend to continue. These attacks are taking place despite anti-virus and anti-malware measures in effect at the time of the attack.

Windows operating systems are most often infected, followed by OS X. Cloud-based applications, particularly Dropbox, Office 365 and Google Apps, are also being targeted.

Ransom demands typically run between $500 and $2,000. About 10%, however, exceed $5,000. And even at that, paying a ransom demand is no guarantee that encrypted files will be released.

For a typical SMB, downtime from ransomware can cost around $8,500 per hour, and will take an average of 18.5 hours of the company’s time. That’s a hit to your bottom line somewhere in the neighborhood of $157,250. Yet in many cases the ultimate cost has reached into multiple hundreds of thousands.

In a recent survey of 6,000 IT professionals by the Ponemon Institute, 86% of companies had one or more incidents causing downtime in the past 12 months. Typical downtime was 2.2 days, with an average cost of $366,363. And that’s just the average. Could your company survive that kind of hit? It’s no wonder that 81% of smaller businesses suffering such an attack close their doors within three years.

It’s tragic. And yet the solution is so simple…

The #1 antidote for a data disaster

What’s behind these costly incidents? Here’s the breakdown of contributing factors:

  • Human error: 60%
  • Unexpected updates and patches: 56%
  • Server room environment issues: 44%
  • Power outages: 29%
  • Fire or explosion: 26%
  • Natural disasters: 10%

Note that human error accounts for 60% of the breaches. It’s no wonder then that ransomware attacks are on the rise, since they can be triggered by just one employee inadvertently clicking a bad link in an e-mail or social media site. Human behavior is hard to control. However, the #1 antidote for a ransomware attack is having a secure backup ready and waiting to replace encrypted files.

And when you scan through the rest of the list above, it becomes clear that, while you need to implement a comprehensive set of data security measures, having a solid and reliable data recovery plan in place and ready to go the moment disaster strikes is still your best defense.