When you look at all the ways that your data can be placed at risk, it can be pretty discouraging. As discussed in our last two blogs, data is at risk from bad actors, failed hardware, human error and external events largely beyond anyone’s control. However, there are a range of solutions, some of which can be money-saving, that can help mitigate risk. Here are four key areas on which to focus.
Aside from human error and the work of bad actors, our data faces others risks. In particular, the failure of your hardware and software to protect as designed, and the numerous external threats that exist, largely beyond anyone’s control.
With the news cycle dominated by data that has been stolen by cybercriminals, it is easier to overlook the other, sometimes benign ways your data may be placed at risk and become inaccessible to your employees and customers.
We hear a lot of talk about data security because of the constant threat of cyber attacks and hacking. News of data breaches are extremely common. As a result, we are exceptionally concerned about the branding and reputation consequences of a data breach. However, there are other events which could occur that make our data inaccessible. It is important to know you are doing the best you can to protect against cyber attacks, ransomware and other forms of data theft, but data security goes beyond that. Instead, let’s look at data from a broader perspective.
Disaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business–that includes veterinary practices–can continue to be operational no matter what negative event might occur. Business continuity planning addresses severe, catastrophic events, loss of the lead doctor, director, or other principals in the organization, severe natural disasters that incapacitate a physical location, etc. Disaster recovery planning is one piece of this broad planning. Specifically, disaster recovery plans refer to how to quickly recover from some event that compromises your IT infrastructure.
We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases the criminals behind the attack hope to get money by selling that data to other criminals. In the case of ransomware, the criminals want your money, and try to get it by holding your data hostage. Plain, old fashioned kidnapping with a hi-tech spin.
What can you do to avoid falling victim?
This cyberattack scheme isn’t new, but it has become increasingly common over the past several years. Many of the viruses lurking out there steal data to be used for nefarious purposes. The goal has long been to access important financial and personal data that can be sold off. For example: Credit card numbers that can sold and used to buy things. Social security numbers that can be sold to be used to create fake identities. In the case of many viruses, victims may never even be aware their data has been accessed. Typical malware and spyware tries to go undetected. Not ransomware. Ransomware generally does not access your data to sell off to criminals. Instead, the virus kidnaps your data until you pay ransom.
If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a type of computer virus that kidnaps your data and holds it hostage for money. It has become increasingly common attacking governments and all manner of business and non-for profit institutions.
8306 Wilshire Blvd., #301
Beverly Hills, CA 90211
P: (310) 853-8006