Is commuting to work or driving to a client an essential part of your success in business?
Is counting on a functional computer or network of computers an essential part of your success in business?
If there was no seatbelt law, would you be driving without using one every day? Maybe just most of the time?
If not, then why would most small businesses either have no reliable backups, or at best, occasional backups?
We have had first hand experience with a client who skipped backups more often than not. Our client decided to forgo our recommendations on IT backup best practices and opted for a backup protocol that entailed daily swapouts of 2 external backup drives--one for the other. Unfortunately, our client did not follow their own protocol diligently and as a result, the backup was not swapped for 6 months. In addition to forgoing our backup recommendation and mishandling their own backup protocol, they also decided against dividing up access rights to different groups and limiting the read/write rights of the individuals, despite our recommendations that they should not allow everyone accessing all data files.
Around 2 P.M. on a Friday afternoon the irreversible Ransom Virus was launched by a user downloading a picture (so she thought), only to install a malicious program, which accessed all their data files (.doc, .xls, .ppt, .pdf, etc.), encrypted them, and asked for a payment of $300 to some foreign entity before they could provide a key to decrypt the files. To add insult to injury, the scale of the damage was not verified until the following Monday. In the meantime, the malicious software had enough time to render all 3TB of company files unusable. Furthermore, that very night, the good copy of the files on the backup drive was overwritten by the encrypted version. Ouch!
The total amount of damages ran into $1000's and 6 months worth of data lost.
Avoid catastrophes like these in the future by investing in a thorough backup solution. ITSSI can help your company to avoid such catastrphic events by setting up the following precautionary measures:
- A solid multi-unit automated backup processes, including off-site storage.
- AntiVirus and AntiPhishing measures, both at the perimeter and on desktop level.
- Limiting access rights based on group participation.