ransomware

What is BaaS and Why is it Important?

As we’ve discussed on our blog, it’s important to take proactive, preventative action against the threat of ransomware, outages, and hacks. But there’s another piece that’s equally (if not more) important: the restorative aspect of disaster recovery, and protection against data loss. This is where BaaS comes in.

What is BaaS?

BaaS, or Backup as a Service, is focused specifically on the retention of data in the event of an outage or breach. BaaS protects data from loss, which leads to a more complete recovery and minimizes impacts to customers.

Why is BaaS Important?

First and foremost, Backup as a Service protects data. It tends to take a bit longer to retrieve and recover data, but this extended timeline allows for more time for QA. In addition, it saves costs, which is especially important when dealing with the fallout from a ransomware attack, outage or hack.

Aligning BaaS and DRaaS for Maximum Benefit

According to Beta News, the best strategy is to enlist and align BaaS with DRaaS (Disaster Recovery as a Service). While DRaaS focuses on minimizing downtime and recovering all IT infrastructure as quickly as possible, BaaS focuses on retaining data and minimizing data loss.

Utilizing both allows companies to tailor their recovery plan to the unique needs of their industry, dataset and IT infrastructure. Not only will this optimize disaster recovery, but can also lead to significant cost savings.

Do you need help creating a DRaaS or BaaS plan? Contact Vaultas today!

Vaultas is a technology ecosystem provider that facilitates direct access to any network or service provider. Our services include colocation, cloud, hybrid IT solutionsconnectivity, communication and collaboration including UCaaS and CCaaS, disaster recovery and business continuity, hosting, consulting, energy conservation and much more.

Our primary ecosystem access points are located in the Twin Cities of Minneapolis and St. Paul, as well as Alexandria and St. Cloud, MN, and Milwaukee, WI, with remote access from anywhere in the world. Contact us to get started. 

How to Include Disaster Recovery in 2022 Budget Planning

Over the last few years, ransomware and cyberattacks have become increasingly more common. Organizations of every size and in every industry have been targeted, which shows that disaster recovery and business continuity are no longer an option. As your company or organization works on its 2022 budget, here are a few things to consider when planning for an outage, storm, attack or other disaster.

Incorporating Disaster Recovery into the 2022 Budget Process

According to the Disaster Recovery Journal, there are three questions to ask during the budgeting process. These will help identify risks and ensure that your business has the right resources in place for the 2022 budget year.

1. What risks does the company face?

Don’t think about risk only in terms of revenue. Consider the potential loss of reputation, of employee engagement, of systems and data, and more. How much risk is your company willing to accept?

2. What is the likelihood that the company will experience an event?

Remove the word ‘disaster’ from the conversation, and discuss the more likely potential causes of an outage or data loss. These range from simple human error or hardware failure, to power outages, storms and major meteorological events. Thinking along these lines will help you make more informed decisions.

3. What are the benefits of an increased investment in disaster recovery?

There are many benefits to investing more in disaster recovery and business continuity. Put simply, the faster your company can recover from disaster, the less impact on systems, customers, and revenue.

If you need help with IT budgeting or making a disaster recovery plan, give Vaultas a call! Leverage the power of the Vaultas Ecosystem to create a plan that meets your company’s unique needs. Contact us today to get started!

Vaultas is a technology ecosystem provider that facilitates direct access to any network or service provider. Our services include colocation, cloud, hybrid IT solutionsconnectivity, communication and collaboration including UCaaS and CCaaS, disaster recovery and business continuity, hosting, consulting, energy conservation and much more.

Our primary ecosystem access points are located in the Twin Cities of Minneapolis and St. Paul, as well as Alexandria and St. Cloud, MN, and Milwaukee, WI, with remote access from anywhere in the world. Contact us to get started. 

Is Your Cybersecurity in Compliance?

If you work in a heavily regulated industry like healthcare, banking or government, you’re most likely familiar with compliance requirements for your company and industry. But did you know that you must also meet compliance requirements for your cybersecurity program?

The reasons for this are two-fold. First, these companies store valuable and sensitive data related to health, finances and identity. Second, the value of that data makes cybercriminals more likely to target organizations in these heavily regulated industries.

The purpose of cybersecurity compliance requirements is to ensure that companies and organizations take all necessary and appropriate steps to protect this valuable data against hacks and cyberattacks.

Cybersecurity Compliance is the Baseline

It’s important to understand that compliance regulations should be considered the foundation of your cybersecurity program. If you don’t meet the regulations, your company could be subject to fines or penalties. But stronger action may be needed to ensure that your data and programs are fully protected from cyberattack.

In addition, if you do business in more than one state or country, it’s important to understand the compliance requirements for each municipality. All states have their own laws protecting consumer privacy, and the GDPR regulates data protection for all entities that store or process personal data of EU citizens.

Compliance Varies by Industry

To learn more about the regulations for your specific industry, download this comprehensive guide from our partners at Arctic Wolf. If you have more questions or need help getting your cybersecurity program in compliance, contact Vaultas today!

Vaultas is a technology ecosystem provider that facilitates direct access to any network or service provider. Our services include colocation, cloud, hybrid IT solutionsconnectivity, communication and collaboration including UCaaS and CCaaS, disaster recovery and business continuity, hosting, consulting, energy conservation and much more.

Our primary ecosystem access points are located in the Twin Cities of Minneapolis and St. Paul, as well as Alexandria and St. Cloud, MN, and Milwaukee, WI, with remote access from anywhere in the world. Contact us to get started. 

How to Make Remote Work More Secure

Despite all the news stories and warnings from the IT industry (like this, this or this), many executives and employees still don’t fully grasp the importance of data security. This spring, as millions began working from home, data became even more vulnerable to breaches and hacks. Now, with the pandemic continuing to spread, remote work will be the reality for many months to come. Data security must be a priority.

Luckily, there are a few simple steps companies and employees can take to protect data, as recently discussed by Forbes. We’ll summarize them here.

Make Passwords Strong and Unique

Yes, keeping track of passwords is tedious. But today’s computer operating systems make it easy, by suggesting strong passwords and keeping them stored. Some newer models even utilize biometric sensors to grant access. If you have trouble remembering passwords, consider using a reputable password manager, like Dashlane, LastPass or 1Password.

Set Up a VPN

A VPN, or virtual private network, allows employees to create a private connection over a public network. Essentially, this creates a secure tunnel between a home network and an office network. Some IT networks have established VPNs on company-issued machines, so ask your IT department.

Consider the Router

The router is often overlooked, but it can play a huge role in protecting data. Newer models have security functionality that is embedded and continuously updated. This will protect not just work data and functionalities, but also other devices such as tablets, mobile phones, and smart devices.

Is your company preparing for long-term remote work? Do you need help ensuring that employees have the tools they need to safely and successfully work from home? The Vaultas ecosystem is here to help. Contact us to get started.

Vaultas is a technology ecosystem provider enabling direct access to any network or service provider. Our services include hybrid IT solutionsdata storage and backup, disaster recovery and business continuity services, hosting, colocation, cloud storage, data center consulting, hosted PBX and VOIP solutions, and more. 

Our primary ecosystem access points are located in the Twin Cities of Minneapolis and St. Paul, as well as Alexandria and St. Cloud, MN, and Milwaukee, WI, with remote access from anywhere in the world. Contact us to get started. 

How to Fight Back Against a Ransomware Attack

The number of organizations affected by ransomware has gone down by more than 40 percent in recent years. Good news, right? Not completely: the total amount demanded in ransomware attacks has gone up by nearly 90 percent. So while the total number of attacks has gone down, experts believe that hackers are growing more sophisticated, targeting higher-value systems such as cities and school districts. It’s no coincidence that these governmental organizations tend to be less prepared against a ransomware attack, either.

So what should your company do to prevent a ransomware attack – or at least mitigate the fallout? Forbes recently shared a few good tips.

Establish a Business Continuity Strategy

If your company’s data is securely backed up and you have a business continuity plan in place, you’re much less vulnerable to a ransomware attack. This may be the least expensive and most accessible option – and Vaultas can help you get started.

Strengthen Login Credentials

A recent study found that 80 percent of data breaches are at least partially caused by weak or stolen login credentials. Essentially, hackers are no longer hacking, but simply logging in using compromised credentials. Make sure all members of your organization are using secure logins, and establish multi-factor authentication.

Minimize Access Points

Hackers often get into a company’s network through shared accounts that are no longer in use. Be vigilant about the tools and accounts employees use, and close them down when they’re no longer operational. In addition, consider creating access zones, with specific users and multi-factor authentication.

Is your company protected against ransomware attacks, hacks or breaches? Are your data, applications and networks protected against disaster? If not, give Vaultas a call.

Vaultas is a premier provider of IT solutions, providing data storage and backup, disaster recovery and business continuity services, hosting, colocation, cloud storage and more. Our data centers are located in Minneapolis/St. Paul, Alexandria and St. Cloud, MN, and Milwaukee, WI. Contact us to get started.

How to Minimize the Impact of a Cybersecurity Breach

It’s true that some businesses are more likely to be targeted by cyber criminals, based primarily on their industry. For example, hackers often go after health care or financial institutions, because they house sensitive and significant personal data. But businesses of all sizes and in all industries are susceptible to hacks, ransomware, and other attacks. This is why cybersecurity and disaster recovery need to be a top priority for all companies.

Today, we’re discussing a few important actions businesses can take to minimize the negative impact of a cybersecurity breach, as discussed by the Disaster Recovery Journal.

Keep Software Up to Date

It’s important to install software updates as soon as they become available. This is because updates usually include patches for security holes and vulnerabilities. Using outdated software leaves businesses open and exposed to breaches.

Encrypt Sensitive Data

Even if your company is breached, you can minimize the harm by keeping your most sensitive data – customer financial information, for example – protected. Use encryption for that vital data.

Back Up to Avoid Paying Ransom

It’s important to maintain a full backup of your IT environment. If you’re hit with ransomware, this will allow you to restore your network from the backup, and avoid paying a costly ransom. However, if backups are also infected by malware, this strategy won’t offer much help. That’s why it’s important to ensure that backups are also secure against hacks and breaches.

Filter Viruses at the Perimeter

The best way to minimize the impact of a cybersecurity breach is to prevent the breach from ever getting into your network. Use a perimeter anti-virus software that blocks viruses at the network edge.

Is your company protected against ransomware, hacks, or any other cybersecurity breach? Is your sensitive data protected against disaster? If not, give Vaultas a call.

Vaultas is a premier provider of IT solutions, providing data storage and backup, disaster recovery and business continuity services, hosting, colocation, cloud storage and more. Our data centers are located in Minneapolis/St. Paul, Alexandria and St. Cloud, MN, and Milwaukee, WI. Contact us to get started.

New Threats, Lower Costs Drive Disaster Recovery Planning

With the summer storm season upon us, disaster recovery (DR) is top of mind for many IT professionals. But new data shows that severe weather is no longer the primary reason that companies are undergoing the disaster recovery planning process. Newer threats, such as cyberattacks, ransomware, and climate change have become the main drivers behind the rise in DR adoption.

In addition, as detailed by Tech Target, disaster recovery planning has become more affordable, thanks in large part to new  and edge DR tools. In the past, disaster recovery was only possible through data backups and the use of a secondary data center. Without those physical requirements, DR planning is now cheaper and easier, especially as replication has become more available and affordable.

Benefits Outweigh the Costs

Of course, there are still some costs associated with creating and maintaining a DR plan. But more and more business owners and IT professionals are aware that the costs of not investing in disaster recovery far outweigh its expenses. In addition, today’s cyberattacks are more targeted and, often, more damaging, making DR even more worth the cost.

In today’s business climate, even minor interruptions can have catastrophic effects. When you consider all that can be lost to disaster or cyberattack, the cost of a disaster recovery solution is miniscule in comparison.

DR is Necessary in All Geographies

Previously, business owners in certain parts of the country believed that, because they weren’t in the path of hurricanes or heat waves, DR wasn’t as important. That could certainly be said of many Minnesota and Wisconsin businesses! But no location is safe from cyberattacks, and the changing climate has led to more extreme weather conditions in all parts of the country, making DR essential no matter where a business is headquartered.

Small Businesses Lag in DR Adoption

Many small- and medium-sized businesses lack the resources to undergo disaster recovery planning. But because a data loss or time offline can be catastrophic for a small business, it’s even more important that the time and money is spent to plan in advance.

In today’s business climate, even minor interruptions can have catastrophic effects. When you consider all that can be lost to disaster or cyberattack, the cost of a disaster recovery solution is miniscule in comparison. Vaultas offers custom IT services to meet your company’s unique needs. Contact us for more information on how we can help with disaster recovery, business continuity, backups or replication.

Vaultas is a premier provider of IT solutions, providing data storage and backup, disaster recovery and business continuity services, hosting, colocation, cloud storage and more. Contact us to get started.

12 Steps to Better Business Continuity for Data Centers

No matter the reason, IT downtime can be costly for businesses of any size, in any industry – but it’s especially damaging for data centers. That’s why it’s important to establish a business continuity plan in the event of ransomware, severe weather, or any other unexpected outage.

Today, we’re going to discuss 12 important steps that data centers must take when establishing a business continuity plan, as detailed in Mission Critical Magazine.

1. Get the Conversation Started

Discuss business continuity with the companies and IT professionals that rely on your data center, asking what systems are the most critical to maintain during an outage.

2. Conduct a Hardware Risk Analysis

Create a specific list of the hardware that needs to be protected in the event of an outage, including the original cost and current replacement cost. Rank the importance of each piece of equipment based on how important it would be to keep it up and running during an outage.

3. Diagram the Network Structure

Here, you’re trying to determine how to replicate the network by identifying network switches, cables, routers and other components. Make a list of backups as well.

4. Divide Assets into Two Performance Cycles

By splitting assets into “business critical” and “temporary downtime” categories, you’ll be able to focus on the most important aspects of continuity and recovery.

5. Discuss Disaster Recovery Time Limits

Create a list of potential disaster types and assign approximate response times for each step of recovery, based on the specifics of that disaster.

6. Create a Contact List

When disaster strikes, it’s essential to have all necessary contact information available immediately.

7. Back Up Everything

Back up the server, back up applications, back up data. Back up everything.

8. Make a Plan for Temporary Offsite Networks

If main places of business need to be restored, have a plan for working out of temporary, offsite facilities, both in and out of state. Don’t forget to plan for transportation of both personnel and hardware.

9. Redirect Telecommunication

Because it may take time to get those temporary locations set up, create a system to divert calls to a different location. A third-party provider may be a good option here.

10. Virtualize

Add extra agility and resiliency by virtualizing the IT environment. This allows for complete automation at the virtual machine level.

11. Invest in Power Management Software

Power management software can be a powerful tool – it moves data to safer locations without any interruption to users, and can even trigger a recovery platform.

12. Use a Network Monitoring Tool

By monitoring networks and watching for the first signs of an outage or threat, you can significantly minimize downtime and negative effects.

If you need to create a business continuity plan and you’re not sure where to start, get in touch with the hybrid IT experts at Vaultas today. We create custom disaster recovery and business continuity plans, ensuring that your business is prepared for any outage that may occur.

Ransomware Reinforces Importance of Disaster Recovery

We’ve written multiple blog posts about the importance of having disaster recovery and business continuity plans. Outages – whether caused by severe weather, a power outage, or some other unforeseen event – are common, and a disaster recovery plan is essential to ensure that business operations continue as usual and data is not lost. In the last few years, ransomware has become more common, and is causing more disruption than ever before. So how can companies guard their business systems?

Ransomware is a software that uses encryption in an effort to lock up a computer or company’s database and upload files into the hard drive. A ransom note will be sent, demanding money (usually in the form of Bitcoins) in exchange for the private decryption key.

Below, we’ll share a few tips for protecting your business from ransomware. Above all, it’s important to have a solid disaster recovery plan in place. Contact Vaultas to learn how we can help.

Be aware

Because ransomware can attack an IT system from a seemingly-innocent email, link or file, it’s important to educate all employees on possible sources and origins. It is, of course, important to invest in data protection technology, but it’s also necessary to create and enforce policies around prevention.

Know how to spot ransomware

Ransomware is sinister because, at first glance, it looks relatively normal. It is generally transmitted in .png or .txt files buried in an email or link. It will work fast, encrypting and locking up files within a few minutes. Know and educate employees on what ransomware looks like and what to do if they suspect they have clicked on a corrupt file.

Make a contingency plan

Even with the best protection plans in place, ransomware can easily still strike. If and when that happens, make sure your company has a detailed disaster recovery plan.

With the current increase in events occurring in Minnesota and across the country, industry experts predict that ransomware is no longer an “if” situation, but a “when.” When ransomware attacks, will your business be ready with a disaster recovery plan? The cost of most disaster recovery solutions is far less than the cost of a single attack, so it’s in your company’s best financial interest to invest in DR today.

If you want to learn more about creating an IT disaster recovery plan for your business, get in touch today. Vaultas’ business continuity service streamlines disaster recovery, keeping your business operating through any disaster or disruption.

Crypto Viruses are on the Rise. Is Your Data Secure?

The largest data threat of 2016 is ransomware, or crypto viruses. Companies need to ensure that they protect themselves and educate their employees about this threat. The Milwaukee BizTimes published an article this week saying, “At the end of March 2016, 93 percent of all phishing emails contained encryption ransomware, up from 56 percent in December and less than 10 percent every other month in 2015.”

Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid. These attacks can be against individuals, but typically they are targeted at companies because the payoff can be higher. In their article, “Incidents of Ransomware on the Rise,” the FBI says that “Ransomware attacks are … becoming more sophisticated. Several years ago, ransomware was normally delivered through spam e-mails, but because e-mail systems got better at filtering out spam, cyber criminals turned to spear phishing e-mails targeting specific individuals.”

The phishing emails from cyber criminals can spoof law enforcement agencies, service providers, delivery companies, government agencies or they can even look like they’re from your operating system claiming that you need an update. The BizTimes recommends that employees get trained on best practices to avoid crypto viruses. Make sure that they only open attachments from known sources, be wary of .exe files, if their computer suddenly gets an increase in pop-up ads or seems overly sluggish then they should report it to their IT departments as soon as possible.

IBM says that internal attacks from either malicious insiders or inadvertent actors accounts for up to 60% of the corporate infections that they see. They also claim that in 2015, the top marketplaces to fall victim to ransomware attacks are:

  1. Healthcare
  2. Manufacturing
  3. Financial Services
  4. Government
  5. Transportation

If your company does get infected, the FBI should be informed immediately. Report it to your local FBI field office and report the incident to the Internet Crime Complaint Center. They do not recommend paying the ransom because paying it doesn’t guarantee that you will receive your data back. In some cases, you may get some but not all of it.

Keeping your data safe and having offsite backups is the most important security measure. The FBI recommends that you “Secure your backups. Make sure they aren’t connected to the computers and networks they are backing up.” Working with a secure data center that uses the latest in Internet security and malware scanning is a must. Vaultas can help guide you through this process, and keep your data safe. For more information on how they can help, contact Vaultas today.

photo credit: Hacker – Hacking – Lupe von Nullen und Einsen – Virus gefunden- Blau via photopin (license)