The Year of the Hack (Data Breach)

The Year of the Hack (Data Breach)

 

My blog at the end of the year is usually about products and services and trends over the past year and the future of computing.  This is the year of the hackers from Crypto Locker to the usual menace of spyware and malware.  Big companies like Target, Sony, JP Morgan the list goes on and on and the only constant I hear is that it could have been prevented.  A good friend of mine Todd Ruback, Data Breach Analyst, writes about this in his December Dispatch report: http://marketing.evidon.com/acton/rif/4197/s-026f-1412/-/l-375a:15a4/l-375a/showPreparedMessage?sid=kyoeRwBoC

That sums up the State, the US and European countries are in but my quest as a Cloud Integrator is how can I protect my clients and what they can do to help in this cops and robbers battle.

For one thing, I always tell my clients that it’s best to pay the extra $$ for encrypted tunnels and for their data at rest (where it lives) this will not stop a crypto locker type attack but the whole point is a layered approach as encryption will stop many others. For things like Malware and spyware and Trojan viruses there are other layers that must be applied for instance never use your main email account for shopping online, get a Gmail or Outlook.com or apple me.com account and keep your personal spending separate from your corporate world.  Change your password on a regular basis not once a year but every 30-45 days.  Have multiple passwords and yes I know it gets hard to remember them so I use an app like www.Keepersecurity.com  or www.onelogin.com   to name a few.  The best approach is always a proactive approach and make it hard for the hackers by using multiple layers of security from content filtering to antivirus, malware detection and yes firewalls even for your home network.  OK so enough about doom and gloom what’s hot these days…

We closed on the Acquisition of Cloud nation http://www.prweb.com/releases/2014/10/prweb12267677.htm  to be able to provide a better level of service in the cloud that’s faster more scalable and much more robust then we were able to provide previously.  I get asked all the time is the cloud less safe than a local server and the reality is that a local server in someone’s office is rarely locked up, it is under a sprinkler system, not always backed up and the data is rarely encrypted.  In the cloud you have redundant data centers, encrypted data during transit and at rest options and it is not physically reachable so a disgruntled employee can’t go in the server closet and destroy your most valuable asset in the company.

2015 will be year of the BYOD “Bring your own device” and run on the cloud and not just for companies but individuals are embracing the cloud to free themselves up from Brick and Mortar and work where ever, whenever on any device.  The world is getting smaller and smaller every day and the cloud is enabling people, communities and corporations to work in better environments and under less stress.  I have found that employees that I let work from home will login earlier, stay online longer and are more productive.  This may vary depending on your team but it is easier to concentrate in a quite environment and with collaboration tools such as www.smartsheet.com or www.confluence.com to name a few and the likes of www.skype.com the world is your office if you so choose.

Advertisements

About steveferman

I am the creator and owner of eTegrity systems International, a cloud based Backup and Recovery provider for Msp's and Vars. I am also the President of Compunite Computers, inc. a 22 year old MSP and named top 100 MSp's 3 years running. I am known as the busiest man in backup and also do a lot of speaking for industry publications like IT world and Msp Alliance. I hope I can share some good insights and knowledge from my over 30 years in the industry.
This entry was posted in Just some thoughts. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s