Search
  • Tim F Neary

Steps to Take to Protect YOUR Company Jewels

So, we continue to hear in the media the drama resulting from criminals taking control of data center operations by gaining access to companies’ data and subsequently encrypting the backup data - RANSOMWARE. As we all understand by now the criminals will contact the powers to be in the organization demanding some ridiculous amount of ransom in the form of crypto currency in exchange for the keys to enable the victims to regain use of their backup data to enable them to restore their systems.


There are some fundamental actions that need to be taken to protect organizations not only from themselves but criminally motivated individuals. For the life of me I just don’t understand why the priority of addressing backup and recovery continues to be as low it is. I have been working in this space for over 35 years and have come to a couple fairly simple steps to protect your backups that can be used in the event of any event rendering productions systems unavailable.


I will hit these topics in my next several blogs:

· 3-2-1 Approach

· Immutable offsite/off network copy

· Object Lock


IF YOU WOULD LIKE TO DISCUSS THIS - Talk to Tim

25 views1 comment

Recent Posts

See All

Server Refresh Considerations Part II – Acquisition

I had posted a quick blog several weeks back that was fairly well read on Server Refresh Considerations. An area that I did not dive into but alluded to was that when folks are reviewing workloads and

NAS Is SAN Backwards 😊

The reason I am blogging in the first place is I find this IT space fascinating and at the same time I believe we IT folks take ourselves entirely too seriously sometimes. So I was relaxing over the w

We Listen To The Smart Guys!!

So the other day I heard something that really resonated with me –“So if you find that you think you are the smartest guy in the room – you should go to a different room.” I really love that and I rea