A Multi-layered Approach To Data Resilience

What is data resilience? In a nutshell, it’s a mindset that all organisations should adopt to meet their business-continuity plans and keep their operations up and running. There are many moving parts, but overall, it’s as simple as that.

The good news is that 83% of IT decision-makers are now including data resilience in their business strategies, according to a global survey by Arcserve. The bad news is that only 23% have a mature approach to data resilience.

It is not enough because a solid data resilience plan is essential as organisations move to hybrid IT environments. When performance needs arise or a catastrophic failure occurs, organisations must have a well-thought-out and battle-tested plan for recovering their data.

The reality is that data is the fuel that modern businesses run on. When companies lose access to their data, they lose the ability to go forward. Data resilience prevents this from happening. It allows every organisation to quickly recover from a data-threatening event and flourish in the digital economy.

Here are three key steps to help your business develop a robust data resilience strategy.

Create A Plan And Test It Often

The strength of any data resilience strategy depends on the regular testing and adjustment of all its parts. To be reactive is not good enough. You can’t wait for a disaster or attack to occur, then scramble to implement your strategy and find out if it’s good enough or not. Planning and testing are indispensable to success. Indeed, a well-devised and continuously tested data resilience strategy can mean the difference between having a business and having no business.

Numerous studies have shown that organisations that suffer a ransomware attack or other type of data-loss event have a lot of difficulties winning back their customers. One study showed that 88% of customers would stop using the services or products of a business they no longer trust and that 39% lose trust in a company that misuses data or suffers a data compromise. You get the idea. A data-loss event or hack of any kind can be fatal.

Get Executive Buy-in 

Data resilience should be the responsibility of top executives and business owners, not just the IT department. And yet data resilience is still not a priority in the C-suite of many organisations. It must be, especially with the introduction of new cybersecurity measures such as the NIS 2 Directive in the EU. A successful data resilience initiative starts at the top, with buy-in from C-level executives and the board of directors. When this happens, the rest of the organisation will recognise the importance of the effort, keep it top of mind and rise to the occasion when necessary.

Data resilience initiatives face slow adoption in many organisations precisely because they lack champions at the top. Like any investment, a data resilience initiative needs support from the whole company, from the corner office to the cubicles, across every department.

It also requires buy-in from external partners and service providers. For an initiative to work, all participants must know their role in everyday operations and in the time of a disruptive event. Without buy-in from all parties, there will be some who don’t perform when the chips are down.

Take A Multi-layered Approach 

The key to achieving data resilience is a “multi-layered approach” and deploying an infrastructure that supports all your data resilience requirements. One vital layer is doing frequent backups and creating copies that can be stored in a digital immutable vault. During this process, storage snapshots should be taken and secured in a vault. When a disaster or attack happens, and data is compromised, you have these snapshots available for instant recovery. 

Automation and orchestration are two other important parts of a multi-layered approach, which help streamline data recovery. These parts should include processes and automated workflows that instil consistency and minimise complexity when time is of the essence and quick thinking is required. That way, you can bring back your data fast and get back to business as usual without critical damage to your business.

Another critical element of a multi-layered approach is 3-2-1-1 data protection. It means maintaining three backup copies of your data on two different media - tape and disk, with one of the copies placed offsite to enable quick recovery. Further, you should have one immutable object storage copy.

Immutable object storage continuously protects data by taking a snapshot at 90-second intervals. Even if disaster strikes, those data snapshots enable you to return to a recent file state.

Conclusion

A good data resilience strategy does a lot for your business. It enables you to manage rapid data growth and handle various workloads, unify data recovery and quickly get back up and running after any event that compromises your data. It brings many benefits to your organisation, including enhanced performance, reduced costs, reliable and efficient business operations, minimised risk, and strong protection in every part of your company.

Florian Malecki is Executive Vice President Marketing at Arcserve

You Might Also Read: 

Why Companies Need A Next-Gen Approach To Business Continuity:

 

« Proactive Cyber Security Is A Must Have
The Challenges Of Moving To Zero Trust »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

City Security Magazine

City Security Magazine

City Security magazine helps promote best security practices and keep businesses informed on a wide variety of security-related issues.

Snyk

Snyk

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world.

Nok Nok Labs

Nok Nok Labs

Nok Nok is a market leader in next generation authentication for cloud, mobile and IoT applications.

Sapien Cyber

Sapien Cyber

Sapien Cyber is an Australian company bringing leading-edge cyber security and threat intelligence solutions.

National Cybersecurity Student Association (NCSA) - USA

National Cybersecurity Student Association (NCSA) - USA

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

GoSecure

GoSecure

GoSecure Managed Detection and Response helps all organizations reduce dwell time by preventing breaches before they happen.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

CyberHub

CyberHub

CyberHub is an educational platform that offers professional courses and knowledge sharing through articles and videos to help students discover their potential in cybersecurity.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

ABPGroup

ABPGroup

ABPGroup is Asia’s leading cybersecurity technology provider focusing on providing best-of-breed solutions that address today’s pressing challenges.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Gathid

Gathid

Gathid is a unique and versatile identity governance platform providing organizations with the ability to model, explore, audit, and track complex access-related scenarios.