A Multi-layered Approach To Data Resilience

What is data resilience? In a nutshell, it’s a mindset that all organisations should adopt to meet their business-continuity plans and keep their operations up and running. There are many moving parts, but overall, it’s as simple as that.

The good news is that 83% of IT decision-makers are now including data resilience in their business strategies, according to a global survey by Arcserve. The bad news is that only 23% have a mature approach to data resilience.

It is not enough because a solid data resilience plan is essential as organisations move to hybrid IT environments. When performance needs arise or a catastrophic failure occurs, organisations must have a well-thought-out and battle-tested plan for recovering their data.

The reality is that data is the fuel that modern businesses run on. When companies lose access to their data, they lose the ability to go forward. Data resilience prevents this from happening. It allows every organisation to quickly recover from a data-threatening event and flourish in the digital economy.

Here are three key steps to help your business develop a robust data resilience strategy.

Create A Plan And Test It Often

The strength of any data resilience strategy depends on the regular testing and adjustment of all its parts. To be reactive is not good enough. You can’t wait for a disaster or attack to occur, then scramble to implement your strategy and find out if it’s good enough or not. Planning and testing are indispensable to success. Indeed, a well-devised and continuously tested data resilience strategy can mean the difference between having a business and having no business.

Numerous studies have shown that organisations that suffer a ransomware attack or other type of data-loss event have a lot of difficulties winning back their customers. One study showed that 88% of customers would stop using the services or products of a business they no longer trust and that 39% lose trust in a company that misuses data or suffers a data compromise. You get the idea. A data-loss event or hack of any kind can be fatal.

Get Executive Buy-in 

Data resilience should be the responsibility of top executives and business owners, not just the IT department. And yet data resilience is still not a priority in the C-suite of many organisations. It must be, especially with the introduction of new cybersecurity measures such as the NIS 2 Directive in the EU. A successful data resilience initiative starts at the top, with buy-in from C-level executives and the board of directors. When this happens, the rest of the organisation will recognise the importance of the effort, keep it top of mind and rise to the occasion when necessary.

Data resilience initiatives face slow adoption in many organisations precisely because they lack champions at the top. Like any investment, a data resilience initiative needs support from the whole company, from the corner office to the cubicles, across every department.

It also requires buy-in from external partners and service providers. For an initiative to work, all participants must know their role in everyday operations and in the time of a disruptive event. Without buy-in from all parties, there will be some who don’t perform when the chips are down.

Take A Multi-layered Approach 

The key to achieving data resilience is a “multi-layered approach” and deploying an infrastructure that supports all your data resilience requirements. One vital layer is doing frequent backups and creating copies that can be stored in a digital immutable vault. During this process, storage snapshots should be taken and secured in a vault. When a disaster or attack happens, and data is compromised, you have these snapshots available for instant recovery. 

Automation and orchestration are two other important parts of a multi-layered approach, which help streamline data recovery. These parts should include processes and automated workflows that instil consistency and minimise complexity when time is of the essence and quick thinking is required. That way, you can bring back your data fast and get back to business as usual without critical damage to your business.

Another critical element of a multi-layered approach is 3-2-1-1 data protection. It means maintaining three backup copies of your data on two different media - tape and disk, with one of the copies placed offsite to enable quick recovery. Further, you should have one immutable object storage copy.

Immutable object storage continuously protects data by taking a snapshot at 90-second intervals. Even if disaster strikes, those data snapshots enable you to return to a recent file state.

Conclusion

A good data resilience strategy does a lot for your business. It enables you to manage rapid data growth and handle various workloads, unify data recovery and quickly get back up and running after any event that compromises your data. It brings many benefits to your organisation, including enhanced performance, reduced costs, reliable and efficient business operations, minimised risk, and strong protection in every part of your company.

Florian Malecki is Executive Vice President Marketing at Arcserve

You Might Also Read: 

Why Companies Need A Next-Gen Approach To Business Continuity:

 

« Proactive Cyber Security Is A Must Have
The Challenges Of Moving To Zero Trust »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

eSentire

eSentire

eSentire is the authority in Managed Detection and Response Services, protecting the critical data and applications of organizations from known and unknown cyber threats.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Reposify

Reposify

Reposify’s cybersecurity solution identifies, manages and defends companies’ global digital footprints.

Mitre

Mitre

At Mitre we work across government to tackle challenges to the safety, stability, and well-being of our nation. Areas of expertise include Cybersecurity.

Hexnode MDM

Hexnode MDM

Hexnode MDM is an award winning Enterprise Mobility Management vendor which helps businesses to secure and manage BYOD, COPE, apps and content.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Active Countermeasures

Active Countermeasures

Active Countermeasures believe in giving back to the security community. We do this through free training, thought leadership, and both open source and affordable commercial tools.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

du

du

du is a telecommunications service provider providing UAE businesses with a vast range of ICT and managed services.

Infuse Technology

Infuse Technology

Infuse Technology provide the highest level of cybersecurity support, implementing practical solutions to protect against cyber-attacks, from simple phishing scams to complex data security breaches.

Vircom

Vircom

With a large majority of cyber attacks starting with email, Vircom provides protection against the worst email security threats to your business.

KingsGuard Solutions

KingsGuard Solutions

KingsGuard Solutions is a San Diego Cybersecurity company that specializes in complex and innovative security solutions for companies throughout Southern California.

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs

Wattlecorp Cybersecurity Labs are a group of IT security specialists, ethical hackers, and researchers driven to identify security flaws before cyber threat actors does.