Disaster Recovery Strategies: Where does the Cloud leave us?

Disaster Recovery Strategies: Where does the Cloud leave us?

Disaster Recovery Strategies: Where does the Cloud leave us?

No Comments on Disaster Recovery Strategies: Where does the Cloud leave us?

In most Tech-related businesses of today’s world, we often use the term “Disaster Recovery” to describe the re-building of a cataclysmic system event. i.e data loss. Where this was typically used through continuous backups and RAID drives etc. there was never the complete protection from an unexpected failure such as an ESD (Electrostatic discharge) or unprotected power supplies through Surge Protection etc.

Where physical disks and tape drives were more of a singular point of failure and prone to environmental variables, the cloud does not. With more capacity than ever, the cloud is offering multiple types of services, from single desktops to whole networks. This shift from physical dependency to cloud-based storage is taking hold, with more and more emphasis on the increasing capacity of virtual networks.

What’s next?

With the likelihood of physical networks being phased out in future growth, the need for redundancy to protect against loss of data and network security has also changed. Whereas in a physical network the user would keep all of their data held on disk located somewhere within the premises. The fear of off-site data held on a remote unit somewhere thousands of miles away, without the guarantee of physical security is getting larger. The fear is that any external person or program, with access to the hosting premises may interact wit the virtual networks of the business in question and have access to them, thus compromising security.

The 3 Worst Data Security Threats

1: Data Breach

This is typically the breach at target – where “Cloud computing introduces significant new avenues of attack,” said the CSA report authors. There have been a reported 110 million incidents of data theft from the likes of credit cards and personal passwords. The total accumulation of loss is staggering, with the element of personal security becoming more and more lucrative.

2: Data Loss

The Data Breach that has been on the likes of a data drive or disk drive that has become compromised through a hardware failure or disk drive corruption. Without the adequate use of data protection or backups, the data on the drive is doomed to failure

3: Hijacking

The introduction of malware and DNS spoof attacks has largely impacted the world of cyber security, with users being redirected to malicious webpages designed to capture a users account credentials, credit card details etc etc. and use them to steal money from people’s accounts, remove their profile’s completely or use other forms of blackmail to their end needs.


Since the earliest days of data protection, when Julius Caesar used a substitution cipher to protect his private correspondence, encryption has played a key role in keeping data contents unintelligible to all but those who knew how to unlock it. Today, encryption is an essential component of any data security and management strategy. Luckily, finding a data hosting service that utilizes encryption is easy; even those who cater to the general public – such as Dropbox and Google Drive – employ encryption.

Some companies go even further by promising “100% private” cloud storage. An extra level of privacy is achieved by adopting a zero knowledge policy whereby even the folder and file names are stored as meaningless strings of obfuscated text.

Companies who want to go even further can seek out cloud services that don’t store passwords anywhere on their servers. That would essentially force a data thief to break the encryption algorithm – a herculean task that, while not impossible, could take a very long time to accomplish. The price for the added security is that if a client of the service (that’s you) ever forgets his or her login credentials, the onus to break the encryption algorithm falls on you because that’s the only way that you’ll ever retrieve your data.

See Also

Banking Malware

Information is Beautiful – Graph of Reported Data Breaches to date

Onsite and offsite Backup Solutions


Share this articleShare on Google+0Share on LinkedIn0Share on Facebook0

Leave a comment

You must be logged in to post a comment.

C-TEK IT Systems E.W.M House Regent Street Liverpool
L3 7BN

Opening Times:

Monday - Friday, 08:00 - 17:00
Saturday - Sunday, Closed

Back to Top