3 Ways to Ensure Your Data’s Safety

Celebrating World Backup Day with some surefire data security strategies

There is always the threat that losing your company’s data will bring your business to a close. Not only is the cyber-attack landscape increasing in frequency, scale and complexity, but the cost of trying to recover from an attack is growing astronomically as well. A recent IBM Security and Ponemon Institute global study shows the average total cost of a data breach, which includes what an organization spends on the discovery of and the immediate response to one breach, is $3.62 million. And then there is the high cost of gaining back customers’ trust, which is impossible to quantify and, in some cases, to recover from.

This is why on this World Backup Day, we’re going to talk about some of the ways you can protect your data that go hand-in-hand with your data backup and recovery platform and ensure that you’ve covered all of your data protection bases. This includes geographically distributed locations, private interconnection and multicloud data encryption, key management and tokenization as a service.

  1. Is where you store and back up your data physically separate and secure?

While it’s not considered best practices, some businesses may still be keeping their primary data and data backup sites near each other/in the same vicinity.  Under these circumstances, natural disasters such as hurricanes, earthquakes and tornados could easily take out both locations within minutes. Many companies are seeing this as a crack in their data protection armor. To remedy this, they are turning to distributed colocation data center providers that enable them to replicate their data security infrastructures in geographies that are states away, rather than streets away, from their primary data centers.

Finding a colocation data center platform that has a number of geographic locations and also has critical physical protections, such as full UPS power, back-up systems, N+1 (or greater) redundancy, and a proven, industry-leading uptime record (>99.9999%), is something you need to consider as part of your data backup and recovery strategy. Many of our customers leverage our interconnection and data center platform (Platform Equinix™), which spans 190+ facilities in more than 48 global metro locations, to replicate their data in a more distributed, secure and reliable fashion.

  1. Is your ability to access and share data really private?

Companies drawn to the public internet’s easy and low-cost accessibility have been heavily relying on it to move data and make that data more accessible to its users. But that doesn’t happen without businesses incurring a huge amount of risk. According the latest Symantec Internet Security Threat Report, new digital technologies and transactions that rely on the public internet have created a whole new cyberattack entryway into many organizations. For example, in 2017, there was an 600% increase in overall Internet of Things (IoT) attacks, where hackers gained access to critical information via connected devices. Also, software supply chain attacks increased 200%—one every month in 2017 as compared to four attacks annually in years prior.

With this increasing level of frequency in digital cyberattacks over the public internet, companies need to seriously consider how they are moving their most critical and sensitive data around, and if the data exchange points they have established are really safe. A private way to exchange your valuable digital assets and ensure that no one outside of authorized users has access to them is required.

This requires direct and secure interconnection that bypasses the public internet and enables security control points and guardrails against any possible cyberattacks. A more bullet-proof data protection environment can be created by leveraging network, security, data and application blueprints that are based on an Interconnection Oriented Architecture (IOA) strategy deployed on Platform Equinix. These IOA blueprints put direct and secure interconnection first and foremost in your data and application replication and backup and recovery implementation plans.

Additionally, proximate, private connectivity to multiple cloud (e.g., AWS, Microsoft, Oracle, Google, etc.) and data backup provider (e.g., EMC, NetApp, Symantec, etc.) ecosystems at Equinix ensures high performance and low latency when performing replication, backup and recovery operations. This reduces the time it takes to do these operations and mitigates the risks involved in carrying large amounts of data over long-haul, multiple-hop networks.

  1. Is your data being protected in multiple clouds?

Though confidence in public cloud security is generally increasing, there are still vulnerabilities that businesses cannot ignore. For example, according to the Ponemon Institute, almost 40% of cloud data at rest is unprotected by encryption, identity keys or any other data protection method.

This is why leveraging data encryption and identity key management platforms for multiple clouds is so vital to an enterprise’s data protection plans. As multiclouds are increasingly being recommended and used for data replication and backup and recovery services, hardware security module (HSM) capabilities need to match the cloud’s elasticity and scalability, while still ensuring the high-performance key storage, encryption and tokenization required to only allow access to authorized users.

Equinix SmartKey™, a global SaaS-based, secure key management and cryptography service is offered on our cloud-neutral Platform Equinix. It simplifies data protection across any cloud architecture and addresses performance and the governance, risk management and compliance requirements at the digital edge, close to cloud providers, network carriers and business partners.

By including geographically distributed locations, direct and secure interconnection and multicloud HSM-as-a-Service solutions in your data backup and recovery plans, you’ll have a more comprehensive and integrated business continuity and disaster recovery solution.

Read more about Equinix SmartKey.

Print Friendly


Related Content