cyber security – Anywhere Technologies https://anywhere.tech anywhere cloud technology Mon, 22 Nov 2021 10:57:02 +0000 en-GB hourly 1 https://wordpress.org/?v=6.2.5 https://anywhere.tech/wp-content/uploads/cropped-Read-more-arrow@2x-32x32.png cyber security – Anywhere Technologies https://anywhere.tech 32 32 What are the 6 most important aspects of cloud disaster recovery? https://anywhere.tech/learning-hub/what-is-the-most-important-aspect-of-cloud-disaster-recovery/ Tue, 16 Nov 2021 15:22:21 +0000 https://anywhere.tech/?p=1367 Hackers and IT mishaps are a continual threat to business data. Data loss can result in long-term failure of the business. According to data from the University of Texas, 94 percent of companies that suffer a massive data loss do not survive and 51 percent close within just two years. 

Therefore, it is critical to master the art of cloud disaster recovery. But what is it? And why is it so important? 

What Is Disaster Recovery? 

Cloud disaster recovery is a system that allows you to recover lost data, even if some servers are breached. Recovery entails connecting your IT network to recent versions of your data on separate servers that have not been compromised (for instance, those with still-functioning hard drives). 

Cloud-based disaster recovery systems differ from conventional ones. Instead of manually storing data on separate physical devices in the office, providers facilitate it by distributing data to several internet-connected servers (usually across multiple geographical locations). 

Important Aspects of Cloud Disaster Recovery

Cloud disaster recovery allows businesses to recover data using a remote cloud-based platform, usually under the supervision of an IT services provider. A primary data centre stores and permits access to the data a company needs right now, while a secondary (and sometimes tertiary site) takes regular snapshots of a company’s data and updates it periodically. 

Thus, cloud-based disaster recovery offers several aspects that typically aren’t available through legacy systems. These include: 

  • No requirement to maintain any equipment onsite. Companies can farm out the task of storing their data to third-party sites, managed and maintained independently by specialists. 
  • Easy ability to scale operations up or down. Subscription prices typically depend on the quantity of data storage consumed and the ongoing bandwidth being used. Prices may also rise depending on the frequency of data snapshots – more frequent being more expensive. 
  • Disaster recovery can occur within minutes – sometimes seconds – via the cloud. A third-party disaster recovery firm detects an anomaly in the primary data repository (perhaps because of hard drive corruptions) and then switches to the secondary system almost immediately. Moreover, users can initiate data recovery remotely without having to travel to a specific site or bring physical drives out of storage.
  • Firms can store their data across multiple geographies, eliminating any single point of failure. Multiple copies of company data can sit in data centres across the world. 
  • Subscription-based or pay-as-you-go pricing dramatically reduces setup costs versus conventional data backup solutions. 
  • 24/7 monitoring of servers by service providers reduces the failure rate and improves the integrity of the system. 

Cloud recovery is more valuable than many business leaders believe. It can help combat direct cyberattacks, ransomware, and other disasters, including physical flooding or fire.

Enterprises typically understand that value of having a disaster recovery plan, but they haven’t yet put it into action. Disaster recovery strategy involves leveraging the cloud to lower risk.

Call us now to start an initial discussion on how our cloud based infrastructure and data recovery systems can help protect your business.

cloud disaster recovery
What are the 6 most important aspects of cloud disaster recovery?
]]>
Does multi factor authentication (MFA) really work ? https://anywhere.tech/learning-hub/does-multi-factor-authentication-mfa-really-work/ Tue, 28 Sep 2021 13:24:22 +0000 https://anywhere.tech/?p=1322 In short, yes it does and multi factor authentication is becoming much more common as a result.

In the past, users relied on “single-factor” authentication methods, such as passwords, to verify their identity. But over time, cybercriminals became more sophisticated, finding ways to get around passwords and access user data. Examples include the creation of password databases and the development of keystroke-logging software. 

As the digital ecosystem developed, the need for a more sophisticated approach to account protection emerged. Users required more than just a simple password standing between the hackers and their accounts.

The solution is multifactor authentication. But what is it? And does it really work? 

What Is Multi factor Authentication (MFA)? 

Multifactor authentication is any security measure that uses two or more independent methods to verify a user’s identity. 

For instance, suppose your banking app uses two-factor authentication. Logging into your account might go something like this: 

  1. Enter your password into the app
  2. View a message telling you that the app has sent a unique authorisation code to your phone via SMS
  3. Open the code in your message inbox
  4. Enter the code into the app’s verification box

The first “factor” is the password the user enters. The second “factor” is the SMS code sent to their phone. Ideally, both of these factors should be independent of each other. 

Why Use Multi factor Authentication?

Logging into your account using MFA takes longer than simply typing in a password, but it is also much more secure. That’s because even if cybercriminals have your password, they probably don’t have access to your phone as well. 

There are many examples of multi factor authentication currently in use. Generally these break down into “something the user knows” (such as PINs, passwords, and answers to secret questions), “something the user has” (such as the Google Authenticator app on their phone), or “something the user is” (such as their fingerprint, palm print, retina scan, signature or DNA). 

In theory, multifactor authentication can combine any number of these verification methods. So, for instance, to access an e-Wallet from your Apple phone, a vendor could ask you to enter PIN, use the Google Authenticator app and scan your fingerprint. Using more than two methods isn’t particularly user-friendly, but it will make your account more secure. 

Is It A Foolproof System? 

Multifactor authentication tends to be dramatically more effective than passwords alone. Studies from both Microsoft and Google suggest that it blocks more than 99.9 percent of automated attacks. 

However, despite being substantially more secure than regular passwords, multi factor authentication still isn’t foolproof. For instance, if a criminal steals your phone and knows your password, they may be able to bypass a two-factor authentication system. 

There are also ways to steal your biometric data. Fingerprint spoofing (which involves lifting and copying your fingerprint) circumvents biometric fingerprint systems – and it is relatively easy to do. 

Which Multi factor Authentication System Should You Use? 

In general, the multifactor authentication system that you use should be the one you feel most comfortable with. Be sure that whatever system you settle on grants you continued access to your account. If it doesn’t, then you may find yourself locked out.

multi factor authentication
multi factor authentication

If you have cloud security concerns and would like us to audit your current cloud infrastructure, then please feel free to get in touch, we like to think we’re a straight talking and friendly team so are happy to answer questions at all levels. Please contact us via our contact form or if you prefer give us a call or drop us an email. Or if you’re on LinkedIn send us a connection request or ask the question on that platform.

]]>
Is Cloud as secure as traditional on-premises IT infrastructure? https://anywhere.tech/learning-hub/is-cloud-as-secure-as-traditional-on-premises-it-infrastructure/ Wed, 04 Aug 2021 13:07:08 +0000 https://anywhere.tech/?p=1244 Most organisations will find that their data is more secure in the cloud, particularly small to medium size businesses who do not have the resources to really tackle cyber security sufficiently to eliminate all of the threats posed by today’s hackers.

Cloud providers generally have stricter measures in place than an SME can implement themselves in order to protect their client’s data. Cloud providers will also update this protection on a regular basis.

The backup processes with a competent cloud provider will also protect your company against potential data loss.

So, although the cloud is not inherently more (or less) secure than on-premises IT systems, cloud-based IT systems are generally more secure.

]]>