<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Alex Tray</title>
    <description>The latest articles on DEV Community by Alex Tray (@alex_tray).</description>
    <link>https://dev.to/alex_tray</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F961133%2F5d9e8239-bbe8-4abf-8ca4-bfa41ac266e8.jpg</url>
      <title>DEV Community: Alex Tray</title>
      <link>https://dev.to/alex_tray</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/alex_tray"/>
    <language>en</language>
    <item>
      <title>CrowdStrike Software Update Leads to Significant Global Tech Outage</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Mon, 29 Jul 2024 01:58:46 +0000</pubDate>
      <link>https://dev.to/alex_tray/crowdstrike-software-update-leads-to-significant-global-tech-outage-299k</link>
      <guid>https://dev.to/alex_tray/crowdstrike-software-update-leads-to-significant-global-tech-outage-299k</guid>
      <description>&lt;p&gt;&lt;strong&gt;AUSTIN, TX – July 20, 2024&lt;/strong&gt; – CrowdStrike, a leading cybersecurity firm, has announced a major global tech outage caused by a recent update to its Falcon security software. The incident has impacted &lt;a href="https://www.theverge.com/2024/7/24/24205020/crowdstrike-test-software-bug-windows-bsod-issue" rel="noopener noreferrer"&gt;approximately 8.5 million devices worldwide&lt;/a&gt;, leading to widespread disruptions across various industries including airlines, banking, and media.&lt;/p&gt;

&lt;p&gt;CrowdStrike’s Falcon software, widely used by businesses to protect millions of Windows machines from malware and security breaches, experienced a significant issue on Friday. The company issued a content configuration update aimed at "gathering telemetry on possible novel threat techniques." While such updates are routine, this particular configuration update inadvertently caused Windows systems to crash.&lt;/p&gt;

&lt;h2&gt;
  
  
  Incident Overview
&lt;/h2&gt;

&lt;p&gt;On July 19, 2024, CrowdStrike deployed an update to its Falcon sensor configuration file, known as Channel File 291. The update contained a logic error that caused systems running Microsoft Windows operating systems to crash. The issue primarily affected Windows 10 and later versions, while Mac and Linux systems remained unaffected.&lt;/p&gt;

&lt;h2&gt;
  
  
  Global Impact
&lt;/h2&gt;

&lt;p&gt;The outage's timing led to significant disruptions across different time zones. Asia and Oceania experienced the first wave of interruptions during their business hours, followed by Europe and the Americas. Major airlines, including Qantas and Virgin Australia, reported flight cancellations and delays, while several airports experienced operational disruptions. Banking and media sectors also faced severe impacts, with many organizations struggling to maintain their services​ (&lt;a href="https://en.wikipedia.org/wiki/2024_CrowdStrike_incident" rel="noopener noreferrer"&gt;Wikipedia&lt;/a&gt;)​​ (&lt;a href="https://www.reuters.com/technology/what-is-crowdstrike-cybersecurity-firm-behind-global-tech-outage-2024-07-19/" rel="noopener noreferrer"&gt;Reuters&lt;/a&gt;)​.&lt;/p&gt;

&lt;h2&gt;
  
  
  Response and Remediation
&lt;/h2&gt;

&lt;p&gt;CrowdStrike swiftly identified the issue and collaborated with Microsoft and other partners to develop and deploy the necessary fixes. The remediation process included multiple steps, such as utilizing &lt;a href="https://www.nakivo.com/resources/download/trial-download/?utm_source=communities&amp;amp;utm_medium=social&amp;amp;utm_campaign=jay" rel="noopener noreferrer"&gt;NAKIVO&lt;/a&gt; for restoring backups, booting affected machines into safe mode, and manually deleting specific problematic files. NAKIVO played a crucial role in ensuring that data was securely backed up and could be restored efficiently during the recovery process, minimizing downtime and data loss.&lt;/p&gt;

&lt;p&gt;Despite these efforts, the manual nature of the fix meant that full restoration was expected to take several days for many organizations​ (&lt;a href="https://en.wikipedia.org/wiki/2024_CrowdStrike_incident" rel="noopener noreferrer"&gt;Wikipedia&lt;/a&gt;)​​ (&lt;a href="https://www.cisa.gov/news-events/alerts/2024/07/19/widespread-it-outage-due-crowdstrike-update" rel="noopener noreferrer"&gt;CISA&lt;/a&gt;)​.&lt;/p&gt;

&lt;p&gt;In a statement, CrowdStrike emphasized its commitment to resolving the issue and supporting its customers: "We deeply regret the impact this has had on our customers and their operations. Our teams are working around the clock to ensure that all affected systems are restored as quickly and safely as possible."&lt;/p&gt;

&lt;p&gt;Microsoft also released a recovery tool to assist affected users and provided detailed instructions on their blog. They estimated that less than one percent of all Windows devices were impacted by the outage, but the number of affected devices was still substantial​ (&lt;a href="https://www.cisa.gov/news-events/alerts/2024/07/19/widespread-it-outage-due-crowdstrike-update" rel="noopener noreferrer"&gt;CISA&lt;/a&gt;)​.&lt;/p&gt;

&lt;h2&gt;
  
  
  Financial and Legal Implications
&lt;/h2&gt;

&lt;p&gt;The financial repercussions of the outage are significant. A specialist cloud outage insurance business estimated that the top 500 US companies, excluding &lt;a href="https://nypost.com/2024/07/24/business/microsoft-to-take-hit-as-fortune-500-suffers-5-4b-in-crowdstrike-losses-study/" rel="noopener noreferrer"&gt;Microsoft, faced nearly $5.4 billion in financial losses&lt;/a&gt; due to the incident. However, only a fraction of these losses are expected to be covered by insurance​ (&lt;a href="https://en.wikipedia.org/wiki/2024_CrowdStrike_incident" rel="noopener noreferrer"&gt;Wikipedia&lt;/a&gt;)​.&lt;/p&gt;

&lt;p&gt;CrowdStrike's liability for the outage appears to be minimal, as their terms of service limit compensation to the fees paid for their software. Nonetheless, there are ongoing discussions about potential liabilities under GDPR regulations in the European Union, which could lead to further implications for the company​ (&lt;a href="https://www.reuters.com/technology/what-is-crowdstrike-cybersecurity-firm-behind-global-tech-outage-2024-07-19/" rel="noopener noreferrer"&gt;Reuters&lt;/a&gt;)​.&lt;/p&gt;

&lt;h2&gt;
  
  
  Looking Forward
&lt;/h2&gt;

&lt;p&gt;CrowdStrike has committed to a thorough root cause analysis to prevent similar incidents in the future. They have also published a Preliminary Incident Review, outlining the steps they are taking to address the issue and enhance their update processes.&lt;/p&gt;

&lt;p&gt;For more information and continuous updates, affected customers are encouraged to visit CrowdStrike's official website and follow their tech alerts.&lt;/p&gt;

&lt;h2&gt;
  
  
  About CrowdStrike
&lt;/h2&gt;

&lt;p&gt;Founded in 2011 and headquartered in Austin, Texas, CrowdStrike is a global leader in cloud-delivered endpoint protection. Their Falcon platform leverages artificial intelligence to provide advanced threat detection and response capabilities to more than 29,000 customers worldwide, including major corporations and government entities.&lt;/p&gt;

</description>
      <category>security</category>
      <category>software</category>
    </item>
    <item>
      <title>How to Back Up and Restore Azure SQL Databases</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Mon, 08 Apr 2024 07:14:04 +0000</pubDate>
      <link>https://dev.to/alex_tray/how-to-back-up-and-restore-azure-sql-databases-3k4c</link>
      <guid>https://dev.to/alex_tray/how-to-back-up-and-restore-azure-sql-databases-3k4c</guid>
      <description>&lt;p&gt;Microsoft's Azure provides many services via a single cloud, which lets them offer one solution for multiple corporate infrastructures. Development teams often use Azure because they value the opportunity to run SQL databases in the cloud and complete simple operations via the Azure portal.&lt;/p&gt;

&lt;p&gt;But you'll need to have a way to back up your data, as it's crucial to ensuring the functionality of the production site and the stability of everyday workflows. So creating Azure SQL backups can help you and your team avoid data loss emergencies and have the shortest possible downtime while maintaining control over the infrastructure.&lt;/p&gt;

&lt;p&gt;Another reason to have a current Azure database backup is Microsoft’s policy. Microsoft uses the shared responsibility model, which makes the user responsible for data integrity and recovery while Microsoft only ensures the availability of its services. Microsoft directly recommends using third-party solutions to create database backups.&lt;/p&gt;

&lt;p&gt;In case you run a local SQL Server, you'll need to prepare for the possibility of hardware failures that may result in data loss and downtime. An SQL database on Azure helps mitigate that risk, although it's still prone to human errors or cloud-specific threats like malware.&lt;/p&gt;

&lt;p&gt;These and other threats make enabling Azure SQL database backups necessary for any organization using Microsoft’s service to manage and process data.&lt;/p&gt;

&lt;p&gt;In this tutorial, you'll learn about backing up Azure databases and restoring your data on demand with native instruments provided by Microsoft, including methods like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Built-in Azure database backup functionality&lt;/li&gt;
&lt;li&gt;Cloud archiving&lt;/li&gt;
&lt;li&gt;Secondary database and table management&lt;/li&gt;
&lt;li&gt;Linked server&lt;/li&gt;
&lt;li&gt;Stretch Database&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Why Backup Your SQL Azure Database?&lt;/strong&gt;&lt;br&gt;
Although I covered this briefly in the intro, there are many reasons to back up your SQL Azure database data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Disaster Recovery&lt;/strong&gt;&lt;br&gt;
Data centers can be damaged or destroyed by planned cyberattacks, random malware infiltration (check out this article to discover more on ransomware protection), and natural disasters like floods or hurricanes, among others. Backups can be used to swiftly recover data and restore operations after various disaster cases.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Loss Prevention&lt;/strong&gt;&lt;br&gt;
Data corruption, hardware failure, and accidental or malicious deletion lead to data loss and can threaten an organization. Backup workflows set up to run regularly mean you can quickly recover the data that was lost or corrupted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compliance and Regulations&lt;/strong&gt;&lt;br&gt;
Compliance requirements and legislative regulations can be severe regardless of your organization’s industry. Mostly, laws require you to keep up with security and perform regular backups for compliance.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Testing and Development&lt;/strong&gt;&lt;br&gt;
You can use backups to create Azure database copies for development, troubleshooting, or testing. Thus, you can fix, develop, or improve your organization’s workflows without involving the production environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How to Back Up Your Azure SQL Database&lt;/strong&gt;&lt;br&gt;
Backing up your Azure SQL database can be challenging if you go through the process without preparation. So that's why I wrote this guide – to help you be prepared. Here's what we'll cover in the following sections:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Requirements for SQL Azure database backup&lt;/li&gt;
&lt;li&gt;How to configure database backups in Azure with native tools&lt;/li&gt;
&lt;li&gt;Cloud archiving&lt;/li&gt;
&lt;li&gt;Backup verification and data restoration&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;SQL Azure Database Backup Requirements&lt;/strong&gt;&lt;br&gt;
Before backing up your SQL Azure databases, you need to create and configure Azure storage. Before you do that, you'll need to go through the following steps:&lt;/p&gt;

&lt;p&gt;First, open the Azure management portal and find Create a Resource.&lt;/p&gt;

&lt;p&gt;Then, go to Storage &amp;gt; Storage account. Provide the information, including the location and names of a storage account and resource group according to your preferences. After you enter the information, hit Next.&lt;br&gt;
Storage account config&lt;/p&gt;

&lt;p&gt;Then go to the advanced section for additional settings. The optimal choice is to set "Secure transfer required" as Enabled and "Allow access" from All networks. For more resilience in case of human error, you can set "Blob soft delete" as Enabled. With that setting, you can quickly correct accidental deletions in the storage account.&lt;/p&gt;

&lt;p&gt;After that, specify the tags you need to simplify navigating through your infrastructure.&lt;/p&gt;

&lt;p&gt;Azure backup storage tags&lt;br&gt;
Check the settings once more. If everything is configured correctly, hit Create. Your new storage account is now created.&lt;/p&gt;

&lt;p&gt;Once the storage volume is created, it's time to configure a backup data storage container.&lt;/p&gt;

&lt;p&gt;Go to the storage account, find Containers, then hit the + Container tab there. After that, specify a name for the new container and switch Public access level to Private (no anonymous access).&lt;/p&gt;

&lt;p&gt;Container Azure storage account&lt;/p&gt;

&lt;p&gt;You can then use the container as a backup storage (.bak files will be stored there in that case).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure Database Backup Configuration&lt;/strong&gt;&lt;br&gt;
Now, everything is set up for you to back up your SQL Azure database. Do the following to create a database backup:&lt;/p&gt;

&lt;p&gt;First, go to SQL Management Studio, and establish a connection with the SQL server. After that, right-click the database that should be backed up. The context menu appears, so go to Tasks there. Then hit Back Up….&lt;/p&gt;

&lt;p&gt;SQL server tasks backup&lt;br&gt;
Then find the Destination tab, and set Back up to line to URL there. After that, hit New container.&lt;/p&gt;

&lt;p&gt;Next, sign in to Azure. Pick the container you created before. Provide your credentials, then hit OK.&lt;/p&gt;

&lt;p&gt;You’ll see a message asking you to sign in to Azure subscription. Then, choose the container and hit OK.&lt;/p&gt;

&lt;p&gt;Now, you'll see the configured backup destination URL listed. To start the workflow to back up your Azure data, hit OK once again.&lt;/p&gt;

&lt;p&gt;When your SQL Azure database backup is completed, the message shows up: "The backup of database ‘your database name’ completed successfully."&lt;/p&gt;

&lt;p&gt;The backup file in the target container should now be visible from the Azure portal.&lt;/p&gt;

&lt;p&gt;Keep in mind that, when uploading backups to any cloud storage, you may face issues if your network connection is not fast enough.&lt;/p&gt;

&lt;p&gt;In case that’s true for you, you can reorganize your backup workflows: send backup data to a physical storage drive first, and then send another copy to the cloud. Thus, you can prevent operational challenges that might appear due to network bandwidth deficiency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cloud Archiving for Azure Database Backups&lt;/strong&gt;&lt;br&gt;
Databases tend to grow in volume as the organization grows. This means that the storage space required to fit the data and that data's backup increases significantly. Also, the original data volume prolongs the duration of full backup workflows, posing another challenge.&lt;/p&gt;

&lt;p&gt;Of course, the first way to get more storage space is to revise your data regularly and erase records that are irrelevant, outdated, or unnecessary otherwise. Still, it's sometimes difficult to determine if data will be or become unnecessary or irrelevant, especially when dealing with issues of compliance.&lt;/p&gt;

&lt;p&gt;To keep your organization compliant in any case, data archiving can help you solve two problems at once: you can ensure data accessibility on one hand, and save storage space on the other hand.&lt;/p&gt;

&lt;p&gt;To archive your SQL database in the cloud, you should first save that database copy to an Azure blob container. Then, to move a newly created blob to the archive tier in the Azure portal, do the following:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Go to the required container where the SQL database is stored.&lt;/li&gt;
&lt;li&gt;Choose the blob that you need to move.&lt;/li&gt;
&lt;li&gt;Hit Change tier.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Azure blob container change tier&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;In the Access tier dropdown menu, choose Archive.
Azure blob change tier&lt;/li&gt;
&lt;li&gt;Hit Save.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Additionally, the Archive storage tier is the most affordable one in Azure, meaning that you can reduce your database data TCO with it.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Secondary Database and Table Management&lt;/strong&gt;&lt;br&gt;
There exist several workflows that can help you set up Azure database backup archiving for your organization. When you need the data to stay in the initial database, for instance, creating a separate table and moving that data there can be your choice. However, the filegroup of that table should stay apart from the main database and be moved to a separate disk whenever possible.&lt;/p&gt;

&lt;p&gt;Most probably, you’ll want to let users access the data you send to a separate table. To make that happen, you can create a view merging the relevant tables and redirect the requests to that view, not to the original table. Doing things that way, you can keep the data accessible while dealing with maintenance faster.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SQL Server Linking&lt;/strong&gt;&lt;br&gt;
If you can’t move the data to another database for internal reasons such as special Azure backup policies, you can consider maintaining your primary database accordingly.&lt;/p&gt;

&lt;p&gt;Here, the outcome is likely to be that of the previous case, but you need to link the SQL servers or configure apps so they can send direct requests to your second server.&lt;/p&gt;

&lt;p&gt;The downside here is that your SQL database, which was supposed to be a backup one, becomes a production database and gains appropriate importance for an organization.&lt;/p&gt;

&lt;p&gt;There are two ways to create linked servers via SQL Server Management Studio (SSMS):&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;sp_addlinkedserver (Transact-SQL) system stored procedure that creates a linked server&lt;/li&gt;
&lt;li&gt;SSMS GUI&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;After you've ensured that you have appropriate access rights on both server instances you need to link, the network is configured appropriately to access them, and SSMS is installed, you'll need to go through the following steps:&lt;/p&gt;

&lt;p&gt;First, open SSMS.&lt;br&gt;
Microsoft SSMS&lt;br&gt;
Connect to the instance where you need to establish a linked server. Then find Object Explorer &amp;gt; Server Objects, then right-click Linked Servers.&lt;/p&gt;

&lt;p&gt;Pick New Linked Server from the dropdown:&lt;br&gt;
New linked server SSMS&lt;br&gt;
Then configure the server properties, including name, server type, provider and product name:&lt;/p&gt;

&lt;p&gt;Linked server configuration SSMS&lt;br&gt;
Then you'll just need to complete the security configuration, set up the server options, and complete connection testing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Original Data Deletion&lt;/strong&gt;&lt;br&gt;
When you don’t need 24/7 data availability but need the data stored due to internal policies or compliance requirements, you can choose what's probably the simplest solution to increase storage space efficiency. Just back up the data that can stay unavailable and then delete the originals from the main database. Accessing any records you may need will still be possible via the backup.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Stretch Database&lt;/strong&gt;&lt;br&gt;
Aiming to make data management of organizations’ databases simpler, Microsoft implemented a Stretch Database feature in SQL Server 2016. With this feature, you can get an SQL backup to Azure after you send the data from the hosted database to an Azure SQL database. The method enables you to increase overall infrastructure cost-efficiency by simplifying backup workflows.&lt;/p&gt;

&lt;p&gt;To enable this workflow in your environment, develop the policy specifying the data on a hosted server to send to Azure. You don’t need to introduce any changes in applications that use the production database: SQL Server can independently get the records from the Azure SQL Database.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure Database Backups Verification and Restoration&lt;/strong&gt;&lt;br&gt;
During an SQL Azure database backup, you can choose to create such backups WITH CHECKSUMS or without them. When the workflow is complete, I recommend you use the following command: RESTORE VERIFYONLY. This command enables you to check the recoverability of backup files.  &lt;/p&gt;

&lt;p&gt;To access the data, you can restore records from a backup to a different database. With Azure Automation scripts on backups, you can accelerate the restoration process, thus minimizing downtime and increasing the overall resilience of your Azure infrastructure.&lt;/p&gt;

&lt;p&gt;You need to follow only a few steps to restore an Azure SQL database to a required recovery point from a backup. Still, keep in mind that your subscription can define the available retention period which can vary from 7 to 35 days. A native tool for backup restoration to SQL servers is Server Management Studio.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;To Conclude&lt;/strong&gt;&lt;br&gt;
The critical nature of Azure SQL database data makes Azure SQL backups obligatory for any organization that uses this Microsoft solution. In this guide, we reviewed the process of creating SQL Azure database backup using native Microsoft tools.&lt;/p&gt;

&lt;p&gt;These tools provide data backup, backup verification, and recovery functionality along with some automation.&lt;/p&gt;

&lt;p&gt;You can also implement a specialized all-in-one data protection solution, such as NAKIVO. It can help you make your data backup workflows more efficient.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>sql</category>
      <category>database</category>
      <category>backup</category>
    </item>
    <item>
      <title>Ecommerce Cybersecurity: How to Protect Customer Data and Online Transactions</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Fri, 21 Jul 2023 06:23:35 +0000</pubDate>
      <link>https://dev.to/alex_tray/ecommerce-cybersecurity-how-to-protect-customer-data-and-online-transactions-4ab2</link>
      <guid>https://dev.to/alex_tray/ecommerce-cybersecurity-how-to-protect-customer-data-and-online-transactions-4ab2</guid>
      <description>&lt;p&gt;With the COVID-19 outbreak, the ecommerce industry experienced significant growth, as the demand for online sales increased exponentially. With the decrease in live sales, multiple organizations, which ignored the online world or just hadn’t prioritized this marketing and sales channel before, understood the importance of ecommerce.&lt;/p&gt;

&lt;p&gt;Nevertheless, organizations became vulnerable right after applying ecommerce tools and practices. Ecommerce is, in many ways, about operating sensitive data including personal details and financial information. This fact poses specific and strict demands to cyber security in ecommerce: whenever a site falls victim to a global incident or clients just have the reason to doubt the protection of their data, you lose reputation and profits.&lt;/p&gt;

&lt;p&gt;In this post, we explain what ecommerce data is, which ecommerce threats are the most relevant in 2023 and how to protect customer data and online transactions from theft or loss.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Is Ecommerce Data?&lt;/strong&gt;&lt;br&gt;
As mentioned above, the activities of ecommerce websites are data-driven: to operate properly and enable online services, organizations set workflows to gather, control, store and use different types of data. Most frequently, the volume of that data is large and the operations are intense, requiring appropriate storage and performance capabilities from an organization’s IT infrastructure. Consequently, before coming up with ecommerce cybersecurity approaches, organizations should know which data is crucial to enable production. &lt;/p&gt;

&lt;p&gt;Here is the list of ecommerce data that an organization should prioritize protecting against fraud or loss:&lt;br&gt;
Product catalogs: The data about products with their prices, descriptions, photos, numbers, location, etc. falls into this category. Catalogs are essential to enable day-to-day sales and ensure customer comfort and satisfaction.&lt;br&gt;
Customer data: This category includes personal data of an organization’s clients (names, contact info, credit card data, order history, preferences and other sensitive data). A case of loss or theft of customer data results in compliance issues and reputational damage. Sometimes, a personal data loss episode can become the reason for an organization to shut down completely.&lt;br&gt;
Sales records: The data about sales empowers both internal processes of, for example, effective analytics or inventory management and external operations such as tax reports or financial audits. Sales data can include customer info, payment data and transaction history. &lt;br&gt;
Website content: This category is for all the necessary data items constructing and enabling the e-commerce website’s functioning: images, web page text content, product descriptions, links, files and other resources. Whenever the website data is compromised or lost, online operations may become interrupted or shut down, causing infrastructure downtime, customer dissatisfaction and income decrease.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ecommerce Threats: Most Common Data Protection Vulnerabilities&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;When you know the types of ecommerce data and their importance, understanding the ecommerce threats is the next step to build an efficient system of online transaction and customer data protection. &lt;/p&gt;

&lt;p&gt;The list can be common for e-commerce organizations and includes both internal and external threats. Knowing what your protection must counter can help you pick appropriate security measures and solutions. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Theme Code Editing&lt;/strong&gt;&lt;br&gt;
When adjusting the theme code with custom edits, you can make a small mistake that later results in interface errors or business interruptions. A thorough code testing algorithm is a crucial element of the protection system. Additionally, you might want to consider the data recovery system enabling the rollback to the properly working code with minimum downtime. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Third-Party Integrations&lt;/strong&gt;&lt;br&gt;
While organizations build online ecommerce platforms, they most probably integrate third-party solutions in their IT environments to enable customer interactions and transactions for sales. Every third-party app is a source of vulnerabilities, threatening sensitive data and infrastructure stability. Only a third-party app that you can test and monitor appropriately after every update should be integrated. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Human Factor&lt;/strong&gt;&lt;br&gt;
Among all data loss or theft reasons, human errors are the most common ones. An employee deleting critical data by accident or letting malicious actors inside an organization’s infrastructure due to successful social engineering schemes is the example here. Inaccurate CSV import creation and usage is another human-caused error worth mentioning. Include measures to protect your ecommerce resources from human errors when considering a comprehensive data protection strategy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Outdated Employee Accounts&lt;/strong&gt;&lt;br&gt;
When an organization has numerous employees, abandoned accounts of those who no longer occupy their positions will pop up sooner or later. Usually, such accounts remain out of the IT department’s scope, meaning that security updates don’t apply to them. Thus, accounts of former employees become weak links in the chain of ecommerce protection, threatening not only the data but also production stability.  &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyber Breach And Ransomware Attacks&lt;/strong&gt;&lt;br&gt;
Ecommerce data containing sensitive info such as customer data, credit card information or payment records is the first target for cyber breaches and ransomware attacks. As hacking tactics and ransomware strains evolve with time, regular anti-malware protection updates and active monitoring are vital to prevent breaches. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Malicious Insider&lt;/strong&gt;&lt;br&gt;
This threat is frequently overlooked despite being probably the most impactful. A malicious insider can be, for example, a financially motivated employee stealing your organization’s client database in favor of competitors. Such insiders are dangerous because they can bypass the security systems they know, and the breaches they create can remain under security radars for long. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Best Practices to Prevent Data Breach&lt;/strong&gt;&lt;br&gt;
With the knowledge about the data to protect and the threats to counter, you can take appropriate measures and pick the right software to protect data more efficiently. The best practices mentioned below aim to help you find the correct focus points when building your ecommerce cybersecurity system. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Encryption&lt;/strong&gt;&lt;br&gt;
Whenever you try to figure out how to protect online transactions and ecommerce data, encryption is the first obvious solution. Nowadays, leaving the data unencrypted means voluntarily exposing your records to a third party. Your data should be encrypted both “in flight” (during any transfer) and “at rest” (throughout the retention period). &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reputable Payment Services&lt;/strong&gt; &lt;br&gt;
A payment service integrated in your organization’s ecommerce workflows is among the key elements for generating profits online. All payment services process sensitive data by purpose and by design but those services can be different in terms of performance and safety. When setting up ecommerce systems, you might want to avoid saving funds on the payment service’s reliability because the cost of a data breach will be significantly higher for your budget and reputation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reliable Passwords&lt;/strong&gt;&lt;br&gt;
Using complicated passwords to increase the security resilience is a universal recommendation that has been relevant for decades. Passwords like “Johnny070489” or “qwertyasdf” won’t provide any protection to your corporate accounts and databases because modern hacking tools can crack such passwords with little to no effort. A reliable password consists of 8 or more characters, including capital and lowercase letters, numbers and special symbols. &lt;/p&gt;

&lt;p&gt;The example of a reliable password: “q2o54B9!SM@l9&amp;amp;”.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Multi-Factor Authentication&lt;/strong&gt;&lt;br&gt;
Even the strongest passwords can be brute forced or compromised, threatening customer information security. The solution is to add a protection layer to the login process by implementing multi factor authentication. Thus, an employee will have to provide an authentication code (received in SMS or Google Authenticator, for example) in addition to the password before receiving access to the sensitive data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Responsible Data Retention&lt;/strong&gt;&lt;br&gt;
Speaking shortly, consider storing only the data you need and only throughout the required period. Choose the data management solution that can help you automate data retention and streamline data management workflows. By doing so, you can avoid possible compliance issues and keep your security efforts focused on the relevant data. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Continuous Monitoring&lt;/strong&gt;&lt;br&gt;
For any organization involved in the ecommerce field, threat sources can be everywhere from browser links to corporate emails. To keep systems protected and timely react to cyberattacks, you need to have a 24/7 active security monitoring solution implemented in your IT environment. When you are quickly notified about attack attempts, you can either counter them entirely or significantly mitigate the consequences even if a successful breach takes place.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Thorough Testing&lt;/strong&gt;&lt;br&gt;
IT environments in general and security systems in particular are evolving along with the development of threats and hacking tactics. After implementing new solutions or updating existing workflows, you should test your data protection solution to reveal and patch vulnerabilities before hackers get the opportunity to exploit them. Prepare a testing checklist highlighting the critical security points and don’t apply updates to production until you are sure they provide the required data protection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Employee Training&lt;/strong&gt;&lt;br&gt;
As human errors are among the most common reasons for a data breach, you can significantly boost data protection by simply ensuring the awareness of your organization’s staff members about cybersecurity threats. Trained employees are less likely to click on a phishing link in an email or to become victims of a social engineering scheme, thus posing an additional challenge for malicious actors trying to bypass your ecommerce cybersecurity systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Methods to Improve Data Security: The Importance of Data Backups&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Implementing security solutions to effectively counter ecommerce threats is the priority for organizations regardless of their industry and size. However, to keep control over critical data in case of a successful cyberattack on your infrastructure, you might want to integrate automated backup workflows. A modern backup and recovery solution, including NAS backup, can help you preserve ecommerce data from loss, thus saving your budget and reputation.&lt;/p&gt;

&lt;p&gt;One effective approach for ensuring the safety of customer data and online transactions in ecommerce is to back up to Backblaze B2 using the backup and recovery solution provided by NAKIVO, which includes backup verification, ensuring the combination of a modern data protection solution and an advanced cloud storage offers a powerful and reliable safeguarding mechanism for protecting sensitive information and ensuring the resilience of online business operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
Ecommerce data such as product catalogs, customer info, sales records and website content must be protected to ensure the proper functioning of an organization, avoid compliance issues and maintain reputation among clients. To protect customer data and online transactions from threats like human errors, third-party integration vulnerabilities, malicious insiders and ransomware attacks, organizations need to set up protection systems that offer: &lt;br&gt;
Data encryption &lt;br&gt;
Trusted payment services&lt;br&gt;
Reliable passwords&lt;br&gt;
Multi Factor Authentication&lt;br&gt;
Data retention policies&lt;br&gt;
Continuous security monitoring and testing&lt;br&gt;
Employee training&lt;br&gt;
You should also implement an advanced data protection strategy that allows you to safeguard data by performing automated and regular backups. By storing backups in the cloud, you can ensure data availability and reduce downtime in case of a security breach or interruption.&lt;/p&gt;

&lt;p&gt;See the original &lt;a href="https://www.thomasnet.com/insights/ecommerce-cybersecurity/"&gt;article&lt;/a&gt; here.&lt;/p&gt;

</description>
      <category>ecommerce</category>
      <category>cybersecurity</category>
      <category>data</category>
      <category>protection</category>
    </item>
    <item>
      <title>Virtualized Security Best Practices to Protect Data and Applications</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Fri, 21 Jul 2023 05:29:19 +0000</pubDate>
      <link>https://dev.to/alex_tray/virtualized-security-best-practices-to-protect-data-and-applications-3hf9</link>
      <guid>https://dev.to/alex_tray/virtualized-security-best-practices-to-protect-data-and-applications-3hf9</guid>
      <description>&lt;p&gt;With over 80% of workloads around the world virtualized, virtualization security is a concern for organizations regardless of size, goal and industry. Proper protection systems for a particular organization's workloads and data is necessary to support production and services availability.&lt;/p&gt;

&lt;p&gt;In this post, we explain: &lt;br&gt;
Virtualization security definition&lt;br&gt;
Main virtualization security issues&lt;br&gt;
VM security best practices &lt;br&gt;
What Is Virtualized Security and How Can It Help? &lt;br&gt;
Virtualized security (aka security virtualization) refers to a set of software solutions and measures specifically created and applied to protect virtualized environments. Unlike usual, static hardware-based network security running on physical switches, firewalls and routers, virtualization security is all about virtual nodes.&lt;/p&gt;

&lt;p&gt;Organizations can significantly boost their IT infrastructure security by just using virtualized servers, networks and desktops. Virtualized servers, for example, help in isolating sensitive data with the appropriate network segmentation, turning the internal network into a labyrinth for intruders. Measures such as virtualized networks simplify traffic management and virtualized desktops streamline endpoint security and turn virtualization into an effective security tool.&lt;br&gt;
Virtualization Security Issues: Main Threats for Virtualized Environments&lt;br&gt;
Some of the most dangerous virtualization security risks remain similar to those of physical environments. However, there are virtualization-specific issues that arise when an organization uses virtual workloads to enable or support production and services availability. The list of main issues for VM security in particular and for the entire environment’s stability in general can include:&lt;br&gt;
External threats&lt;br&gt;
Insider threats&lt;br&gt;
Malware and ransomware&lt;br&gt;
VM sprawl&lt;br&gt;
VM snapshot storing&lt;br&gt;
External Threats&lt;br&gt;
An external bad actor is the standard threat that comes to mind when thinking of IT challenges. That actor can be, for instance, a lone hacker attempting to breach an organization’s protection system for fun or a paid professional group aiming for corporate espionage. These and other external attack cases are challenges that IT security specialists reasonably prioritize.&lt;br&gt;&lt;br&gt;
Insider Threats&lt;br&gt;
In this case, the risk is from within the organization and not from outside. And just like external cybercriminals are the obvious danger sources that every security expert aims to counter, malicious insiders are invisible and frequently ignored. Neglecting the threat results in the absence of security measures. Combine this with the fact that such insiders can remain undetected until they commit an attack and you receive a perfect storm for any IT infrastructure.&lt;br&gt;
Malware and Ransomware&lt;br&gt;
Viruses, adware, spyware and other malware have been around for a long time. Nowadays, malware remains among the most significant threats for individuals and organizations. However, one malware kind stands out: ransomware. &lt;/p&gt;

&lt;p&gt;Ransomware is a malware that sneakily infiltrates the IT environment, encrypts the data at reach and starts demanding a ransom for decryption keys. Throughout 2021 and 2022, over 1.1 billion ransomware attacks occurred worldwide, which means that any organization must have a well-prepared plan to counter ransomware and mitigate the successful consequences of an attack, if it occurs.&lt;br&gt;&lt;br&gt;
VM Sprawl&lt;br&gt;
This case is typical for virtual infrastructures and the easy creation of new virtual machines is the reason here. IT specialists can benefit from the flexibility of virtualized environments and create VMs, for example, to test new apps, features or tools before deploying them on production machines. Then, such test VMs are forgotten and just exist inside a virtual environment. &lt;/p&gt;

&lt;p&gt;The threat here is that each one of these “abandoned” virtual machines is not properly updated in terms of software and security. While remaining vulnerable, a VM has a higher chance to become an entry point for a cyberattack. &lt;br&gt;
VM Snapshot Storing&lt;br&gt;
Although regular VM snapshot deletion is included in VMware security best practices, organizations tend to keep those point-in-time copies of virtual machines for much longer than experts recommend. The worst thing is when you treat a snapshot as a backup. A snapshot relies on a virtual machine’s disk meaning that you won’t be able to restore a VM’s data from a snapshot if an error occurs above the VM’s level. &lt;/p&gt;

&lt;p&gt;Additionally, snapshots require significant storage space. When kept without correct control and configuration, snapshots of a single VM can fill the entire disk and cause global system failure. &lt;br&gt;
Virtualization Best Practices for Improved Security&lt;br&gt;
Threats are always there, and organizations have to react adequately and quickly. Efficient security systems built around virtualized workloads are a solution to keep your organization’s data and production resources under control. Below is a list of three methods for keeping a virtual machine secured and strengthening the overall infrastructure protection.&lt;br&gt;
Least Privilege for Users&lt;br&gt;
The principle of least privilege (aka PoLP) is a commonly known concept in the IT world. To implement the principle, administrators minimize the range of actions that users can perform and locations that they can access. The access rights are set at the minimum level required for employees to fulfill their job duties. Applying the role-based access control model can streamline implementing the principle of least privilege in your organization’s environment.&lt;br&gt;
Multi-Layer Security&lt;br&gt;
Another tip to boost security in virtualization is to avoid relying on a single protection measure or solution. Even the most advanced solutions working alone most probably won’t be enough to provide efficient security. You can and should have antivirus software installed on VMs, firewalls configured, networks segmented, active threat monitoring up and running, among other custom practices. &lt;/p&gt;

&lt;p&gt;Saving time and effort by postponing the creation of a complementary protection system can result in a global failure. Recovering from an IT disaster can cost you a lot more than investing enough resources in organizing and regularly updating your security measures. &lt;br&gt;
Backup and Disaster Recovery (DR)&lt;br&gt;
Unfortunately, no virtualization security system designed to prevent and counter threats can be perfect. Combined and thoroughly organized protection can dissuade less skilled hackers or give you more time to properly react to cyberattack. However, 100% protection is not possible. Therefore, virtualization security should be part of a comprehensive protection plan. This plan should include prevention as well as response tools to help with successful recovery following an incident.&lt;/p&gt;

&lt;p&gt;Having the right Hyper-V or VMware, Microsoft 365 backup solution at hand is the only way to keep control over your data and infrastructure when the main site is down following an attack or a disaster. Modern backup solutions can help you create and refresh VM backups automatically, schedule data protection activities and plan disaster recovery sequences for various emergency cases. &lt;br&gt;
Conclusion&lt;br&gt;
Virtualization security is a set of tools, techniques and activities aimed to protect virtual IT environments from threats such as external and internal attacks, malware, ransomware, VM sprawl and snapshot issues. To set up a reliable protection system for your organization’s environment, you can use the principle of least privilege. Also, consider establishing multi-layered security using such measures as segmented networks, configured firewalls, virtualized routers, special antivirus and active monitoring solutions. &lt;/p&gt;

&lt;p&gt;Still, the most reliable choice to protect your virtual infrastructure is to implement a backup and disaster recovery system. Advanced all-in-one solutions enable you to automate backup and disaster recovery workflows, ensuring your control over VM data even when the main site is down. Advanced DR sequences can help you minimize infrastructure downtime and support production continuity, saving your organization’s reputation, assets and resources. &lt;/p&gt;

&lt;p&gt;See the original &lt;a href="https://itchronicles.com/security/virtualized-security-best-practices-protecting-your-data-and-applications/"&gt;article here&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>security</category>
      <category>data</category>
      <category>protection</category>
      <category>virtualizedsecurity</category>
    </item>
    <item>
      <title>How to Select the Right Microsoft 365 Backup Solution</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Fri, 21 Jul 2023 03:35:35 +0000</pubDate>
      <link>https://dev.to/alex_tray/how-to-select-the-right-microsoft-365-backup-solution-1l37</link>
      <guid>https://dev.to/alex_tray/how-to-select-the-right-microsoft-365-backup-solution-1l37</guid>
      <description>&lt;p&gt;With over 345 million users in 2022, Microsoft 365 suite is a market-dominant team collaboration solution. Individuals and organizations prefer Microsoft services for the all-in-one functional suite, speed and comfort of data exchange, and advanced capabilities. However, the security of valuable data that an organization produces, transfers, and stores using Microsoft 365 cloud apps and features is still a concern for IT specialists.&lt;br&gt;
Microsoft uses the shared responsibility model, which states that the company is obliged to provide full availability and uptime for its cloud services. On the other hand, protecting data that the client stores and generates in Microsoft 365 is entirely the client’s responsibility. Furthermore, Microsoft does not provide native functions and tools for Microsoft 365 backup, thus clients don’t have other choice but to look for a third-party solution.&lt;br&gt;
In this post, we explain the Office 365 backup solution requirements that an organization should consider to fulfill their data protection needs. Read on to discover the key criteria for picking a &lt;a href="https://cybersecuritynews.com/how-to-select-the-right-microsoft-365-backup-solution/"&gt;Microsoft 365 backup solution&lt;/a&gt;. Finally, you can find the example of an efficient backup solution for Microsoft 365 data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Assessing Backup Needs&lt;/strong&gt;&lt;br&gt;
Being a multifunctional team collaboration service, Microsoft 365 assists organizations with generating, exchanging, and storing data items of different types. The service enables creating and editing of items that vary from text documents in Office and emails in Outlook to large databases and other valuable files in SharePoint, OneDrive, or Teams.&lt;br&gt;
Therefore, the first important consideration point when picking a solution to back up Microsoft 365 is the types of data you need to protect. Not all third-party solutions are capable of backing up, for example, Microsoft Teams data. You might want to check the solution’s capabilities thoroughly before starting to integrate it into your IT infrastructure.&lt;br&gt;
The second point to think over is the recovery point objective (RPO). An RPO defines how much data an organization can withstand losing in case of a disruptive event. This allows you to determine how often you need to back up your data to minimize data loss. Tighter RPOs mean more frequent backups which can cause higher loads on your network and hardware. Additionally, storing multiple recovery points to achieve flexible recovery can increase storage space consumption.&lt;br&gt;
The recovery time objective (RTO) is another consideration when figuring out backup needs for your organization. RTO refers to the maximum downtime that your organization can tolerate when a data loss incident causes operations to stop. Tighter RTO requires more hardware performance and network bandwidth enabling swift recovery.&lt;br&gt;
Next, regardless of your preferred storage type (on-premise or cloud storage backup), you need to know the volume of data to protect. Depending on the size and industry, organizations may require storage volumes varying from terabytes to petabytes for storing their backup data.&lt;br&gt;
Last but not least, you need to consider your organization’s retention policy. Data retention can have certain internal requirements as well as compliance regulations to keep up with. For example, an organization may be obliged to store sensitive data backups in encrypted storage destinations with reliable access limitation and thorough authentication control.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Evaluating Microsoft 365 Backup Solutions&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Now that you know your organization’s detailed requirements for Microsoft 365 backup, you can proceed with evaluating the solutions available on the market. The key considerations when choosing between Office 365 backup solutions can be:&lt;br&gt;
Cost of data protection&lt;br&gt;
Scalability&lt;br&gt;
Management complexity level&lt;br&gt;
Additional backup data security&lt;br&gt;
Customer support for complicated cases&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cost and Budget&lt;/strong&gt;&lt;br&gt;
Organizations tend to postpone integrating data protection solutions in their IT infrastructures due to cost concerns. However, you might want to compare the price of a solution and value of Microsoft 365 data: mostly, the data to protect has a higher value for an organization. Additionally, a modern solution for Office 365 data backup can be significantly more affordable due to the quite flexible licensing.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Scalability and Flexibility&lt;/strong&gt;&lt;br&gt;
Will the Office 365 backup tool picked today be relevant and sufficient after the organization expands? How flexible are the features and functions? Can the solution fit the existing IT environment or will it require additional expenses to reconfigure hardware, software, and workflows in production?&lt;/p&gt;

&lt;p&gt;In-depth customization, easy scalability, and flexibility are a must-have for an effective data protection solution in general and for a Microsoft 365 backup solution in particular. An adequate solution not only suits your infrastructure’s type, size, and data at a certain moment but also can be properly adjusted when your organizational needs change.&lt;/p&gt;

</description>
      <category>technology</category>
      <category>microsoft</category>
      <category>backupsolution</category>
      <category>microsoft365</category>
    </item>
    <item>
      <title>MSP Cybersecurity: What You Should Know</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Fri, 23 Jun 2023 07:16:46 +0000</pubDate>
      <link>https://dev.to/alex_tray/msp-cybersecurity-what-you-should-know-4fn5</link>
      <guid>https://dev.to/alex_tray/msp-cybersecurity-what-you-should-know-4fn5</guid>
      <description>&lt;p&gt;Many small and medium businesses today rely on managed service providers (MSPs) with support for IT services and processes due to having limited budgets and fully loaded environments. MSP solutions can be integrated with client  infrastructures to enable proper service delivery, thus bringing certain disadvantages along with functional benefits. &lt;/p&gt;

&lt;p&gt;In this post, we focus on MSP cyber security, including main challenges, threats and practices. Read on to find out:&lt;/p&gt;

&lt;p&gt;Why an MSP should care about cyber security&lt;br&gt;
Which threats you need to counter the most&lt;br&gt;
How to protect your and clients’ data and infrastructures from possible failures&lt;br&gt;
MSP Security: Why Is It Important?&lt;br&gt;
Managed service providers (MSPs) are usually connected to the environments of multiple clients. This fact alone makes an MSP a desired target for hackers. The opportunity to rapidly develop a cyberattack and spread the infections across a large number of organizations makes MSP security risks difficult to overestimate. A single vulnerability in an MSP solution can become a reason for failures in numerous infrastructures resulting in data leakage or loss. Apart from the loss of valuable assets, serious noncompliance fines can be applied to organizations that become victims of cyberattacks.&lt;/p&gt;

&lt;p&gt;An MSP that fails to build and support proper security can not only be forced to pay significant funds. The main point here is the reputational loss that you usually cannot recover. Thus, the risk is not only financial: failed cybersecurity can cost you future profits and the very existence of your organization.&lt;br&gt;
Main MSP Cyber Security Threats in 2023&lt;br&gt;
Although the types of online cybersecurity threats for MSPs are countless, some threats are more frequent than others. Below is the list of most common threats that an MSP security system should be able to identify and counter.&lt;br&gt;
Phishing&lt;br&gt;
Phishing can be considered an outdated cyberattack method, especially when you pay attention to the competences and possibilities of contemporary hackers. However, phishing is still remaining among the top data threats for individuals and organizations worldwide.&lt;/p&gt;

&lt;p&gt;Simplicity is key here: a phishing email is easy to construct and then send to thousands of potential victims, including MSPs. And even if a hacker has a more thorough approach and creates individual, targeted emails to trick organizations’ employees or clients, the phishing tactics still do not require much effort to conduct an attack.&lt;br&gt;
Ransomware&lt;br&gt;
With hundreds of millions of attacks occurring every year, ransomware has been an emerging threat for SMBs and enterprise organizations throughout at least a decade. Ransomware is malware that sneakily infiltrates an organization’s environment and then starts encrypting all the data at reach. After the significant number of files is encrypted, ransomware displays a notification about that fact along with a ransom demand. Many organizations have fallen victim to ransomware. The Colonial Pipeline incident in the US was also a ransomware case.&lt;/p&gt;

&lt;p&gt;A Managed Service Provider must pay special attention to this threat as the connection between an MSP and clients can cause rapid strain spreading and global data loss inside the entire client network.&lt;br&gt;
Denial of Service (DoS) Attacks&lt;br&gt;
Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are also “old-school” simple and effective hacking tactics used since the mid 90’s. The point of a DoS or DDoS attack is to cause an abnormal load on an organization’s infrastructure (a website, a network, a data center, etc.) resulting in a system failure. A DoS attack most probably won’t be the reason for data loss or damage, but the service downtime can become a source for operational discomfort, financial and reputational losses posing risks for the future of an organization.&lt;/p&gt;

&lt;p&gt;A DoS attack is conducted with the use of hacker-controlled devices (bot network) that send enormous data amounts to a target organization’s nodes and overload processing performance capabilities and/or bandwidth. Again, a DoS attack on an MSP can then be spread on clients’ environments and result in a system-wide failure.&lt;br&gt;
Man-in-the-Middle (MITM) Attacks&lt;br&gt;
This type of cyber threats is a bit trickier and more complicated to conduct than direct infrastructure strikes. A man-in-the-middle (MITM) attack involves a hacker intruding, for example, into a network router or a computer, aiming to intercept traffic. After successful malware intrusion, a hacker can monitor data traffic going through the compromised node and steal sensitive data, such as personal information, credentials, payment or credit card information, etc. This can also be a tactic suitable for corporate espionage and theft of business know-how’s or commercial secrets.&lt;/p&gt;

&lt;p&gt;Risky zones for becoming a victim of MITM attacks are, for example, public Wi-Fi networks. A public network rarely has an adequate level of protection, thus becoming an easy nut to crack for a hacker. The data stolen from the traffic of careless users can then be sold or used in other cyberattacks.&lt;br&gt;
Cryptojacking&lt;br&gt;
Cryptojacking is a relatively new cyberthreat type that emerged along with the crypto mining boom. Willing to increase profits from crypto mining, cybercriminals came up with malicious agents that intrude computers, and then start using CPU and/or GPU processing power to mine cryptocurrencies, which then get transferred directly to anonymous wallets. Cybercriminals can get increased profits because they don’t need to pay electricity bills for their mining equipment in this illegal case.&lt;/p&gt;

&lt;p&gt;MSP solutions are desired targets for cryptojackers. Such a solution can be a single point of access to the networks of multiple organizations with all the servers and other computing devices at their disposal. Thus, one cyberattack can bring a lot of resources for cryptojacking to a hacker.&lt;br&gt;
8 Practices Cybersecurity MSP Organizations Should Use&lt;br&gt;
Regarding the frequency and progressing level of threats, an MSP must have an up-to-date reliable cybersecurity system. The 8 MSP cyber security practices below can help you reduce the risk of protection failures.&lt;br&gt;
Credential Compromise and Targeted Attacks Prevention&lt;br&gt;
A managed service provider should know that their infrastructure will be among the priority targets for cyberattacks and build security systems appropriately. Hardening vulnerable nodes and tools for remote access (for example, virtual private networks) is the first step to prevent compromising credentials and the entire environment as a result. &lt;/p&gt;

&lt;p&gt;Scan the system for potential vulnerabilities regularly even when your daily production software and web apps are online. Additionally, consider setting standard protection measures for remote desktop (RDP) services connected to the web. That is how you can reduce the impact of phishing campaigns, password brute forcing and other targeted attacks.&lt;br&gt;
Cyber Hygiene&lt;br&gt;
Promoting cyber hygiene among staff members and clients is an efficient yet frequently underestimated way to enhance MSP cybersecurity. Although users and even admins tend to assume that relying on usual IT protection measures is enough, a Global Risks Report of World Economic Forum states that by 2022, 95% of all cyber security issues involve human error. An employee or a user that simply remains unaware of a threat is themselves the most significant threat for digital environments.&lt;/p&gt;

&lt;p&gt;Ensuring that staff and clients know which emails not to open, which links not to click and which credentials not to give out regardless of reasons is one of the most efficient cybersecurity measures for any organization, including MSPs. Staff education and promotion of a thorough approach towards cyberspace among clients requires much less investment compared to other protection measures and solutions but can alone noticeably boost an organization’s cybersecurity level. &lt;br&gt;
Anti-Malware and Anti-Ransomware Software&lt;br&gt;
The need for specialized software that can prevent malware from infiltrating the IT environment (and hunt malicious agents out of the system as well) may seem inevitable. However, organizations sometimes tend to postpone integrating such solutions in their systems. That’s not an option for an MSP. &lt;/p&gt;

&lt;p&gt;A managed service provider is the first line of defense for clients, and software for tracking malware and ransomware must be integrated and properly updated in an MSP cybersecurity circuit. The corporate license for such software can be costly but this is when the investment pays off in safe data, stable production availability and clean reputation among the worldwide IT community.&lt;br&gt;
Networks Separation&lt;br&gt;
Like any SMB or enterprise organization, an MSP should care about internal network security not less than about the external perimeter. Configuring internal firewalls and separating virtual spaces of departments can require time and effort but a protected internal network poses a serious challenge for an intruder to go through the barriers undetected. Additionally, even if internal firewalls fail to stop a hacker at once, early threat detection can give an organization more time to react and successfully counter a cyberattack.&lt;br&gt;
Thorough Offboarding Workflows &lt;br&gt;
To ensure stable production and provide appropriate performance, MSPs use third-party software solutions. Whenever a solution is no longer required due to, for example, a workflow optimization, that outdated solution should be properly excluded from an organization’s environment. To avoid leaving undetected backdoors, the offboarding process must be set up to completely wipe the solution’s elements out of the infrastructure. &lt;/p&gt;

&lt;p&gt;The same recommendation is relevant for the accounts of former employees and clients. Such an unused account can remain below the radar of an IT team, giving a hacker additional space to maneuver both when planning and conducting a cyberattack.&lt;br&gt;&lt;br&gt;
Zero Trust and Principle of Least Privilege &lt;br&gt;
Zero trust and principle of least privilege (aka PoLP) are two cybersecurity methods that an MSP should apply. Both methods are called to limit access to critical data and system elements as much as possible. &lt;/p&gt;

&lt;p&gt;PoLP prescribes granting every user inside an environment only the access that is required to do their job well. In other words, any access that can be prohibited without harming an employee’s efficiency or a client’s comfort should be prohibited. &lt;/p&gt;

&lt;p&gt;The zero trust method is in turn focused on authorization. Here, every user and machine must authenticate before getting access to known resources and actions. Additionally, zero trust can help increase network segmentation efficiency. &lt;/p&gt;

&lt;p&gt;These two methods don’t exclude or replace each other and can be used simultaneously to boost MSP cybersecurity even further.&lt;br&gt;
Multi-Factor Authentication&lt;br&gt;
Nowadays, a password that is considered reliable may still not be enough to protect accounts and data from unauthorized access. Adding a two-factor authentication to an MSP infrastructure can strengthen protection of the entire environment, as the password alone won’t be enough to log in. Two-factor authentication (2FA) requires a user to confirm a login with an SMS code or another authorization phrase before they can access their account, change data and manipulate functions. The additional code is generated randomly at the moment of login and has a limited relevance period, thus becoming challenging for a hacker to retrieve and use on time. &lt;br&gt;
Non-Stop Threat Monitoring &lt;br&gt;
Threats are evolving to become more sophisticated and to break through security layers more efficiently. Thus, 24/7 active monitoring of the environment can help you detect breaches and vulnerabilities before they cause unfixable failures. With up-to-date monitoring software you can have more control over your IT environment and more time to appropriately react to cyberattacks.&lt;br&gt;&lt;br&gt;
Backup for MSP: Your Safety Net When All Else Fails&lt;br&gt;
The non-stop intense development of cyberthreats means that sooner or later a hacker can find a key to any security system. The only solution that can help you save your organization’s data and infrastructure after a major data loss incident is backup. &lt;/p&gt;

&lt;p&gt;A backup is a copy of data that is stored independently. In case the original data at the main site is lost after a breach, a backup can be used for recovery. The amount of data to generate, process and store to ensure proper functioning of an organization makes manual and legacy backups unsuitable for the MSP reality.&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
In 2023 and beyond, managed service providers are bound to remain desired targets for cyberattacks from phishing and DoS-attack attempts to ransomware infection and cryptojacking. To ensure MSP cybersecurity, such organizations should:&lt;/p&gt;

&lt;p&gt;Create protection systems working against targeted attacks and malware, &lt;br&gt;
Promote cyber hygiene among employees and clients, &lt;br&gt;
Apply network segmentation, PoLP and non-stop monitoring to the entire environment. &lt;/p&gt;

&lt;p&gt;Additionally, MSPs might want to consider integrating multi-factor authentication and thorough offboarding workflows for solutions and employees. However, a functional MSP backup is the only solid way to maintain control over an organization’s data in case of a major data loss incident.&lt;/p&gt;

&lt;p&gt;See the original article here.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>dataprotection</category>
      <category>dataprivacy</category>
    </item>
    <item>
      <title>A Guide to Boost Your Virtual Machine Gaming Performance</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Tue, 16 May 2023 01:40:00 +0000</pubDate>
      <link>https://dev.to/alex_tray/a-guide-to-boost-your-virtual-machine-gaming-performance-4enj</link>
      <guid>https://dev.to/alex_tray/a-guide-to-boost-your-virtual-machine-gaming-performance-4enj</guid>
      <description>&lt;p&gt;In this article, we’ll explain what virtual machine gaming is all about and in what cases you can use it. You’ll also find out how to maximize performance and make gaming on a virtual machine smooth and pleasant.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Virtual Machine Gaming: Setup and Performance Boost&lt;/strong&gt;&lt;br&gt;
Virtualization creates many opportunities to optimize the use of hardware resources. That works not just for organizations that build high-performance servers to run complex environments but for regular people too.&lt;br&gt;
What if you want to use a virtual machine for gaming?&lt;br&gt;
In short: that’s possible. A gamer can use a virtual machine (VM) to run games with reasonable benefits over traditional PC gaming approaches. Virtual machines were designed to make hardware usage more convenient and flexible along with a boost in security.&lt;br&gt;
However, when you consider VM gaming, things become more complicated. The performance issue arises especially urgently when you want to run a resource-intensive game on a virtual machine.&lt;br&gt;
In this post, we explain the benefits of using a VM for gaming. Read on to learn how to increase a VM’s performance to play games more conveniently and pleasantly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Why Use a Virtual Machine for Gaming?&lt;/strong&gt;&lt;br&gt;
Let’s suppose that you have a workstation running several VMs for production purposes in your home office. Such rigs usually have powerful high-end hardware that you don’t always use at a 100% load. You need your VMs running continuously to complete projects and be available at any moment but building a different rig just to run games is not an option. In this case, creating another VM for gaming using the spare resources of your main hardware seems to be the best option.&lt;br&gt;
Along with the use of hardware resources that you already have, using VMware for games can bring you other advantages. Configuring Hyper-V for gaming is also a way to consider and the benefits can remain the same.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Choose OS for Gaming&lt;/strong&gt;&lt;br&gt;
An OS is used to manage resources besides simply enabling the utilization of hardware and software installed. Various operating systems can have their own pros and cons in terms of resource usage, which can directly affect gaming performance. Based on the game you are going to play, you can install the most suitable OS on that gaming VM and get the best performance possible.&lt;br&gt;
Another reason to use this advantage of VM gaming appears when you want to play old-school games. Titles released in the 90s or early 2000s, for example, do not always run on modern hardware or support the latest Windows versions. You can install Windows 98 on a VM and enjoy the gaming classics of the past years on a high-end rig without wasting hours setting up emulators and drivers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keep Environments Secure&lt;/strong&gt;&lt;br&gt;
VMs are independent of each other, thus creating a security layer inside the IT environment. When you set up a separate VM for gaming, you can protect your main system from threats such as ransomware or viruses. In case some kind of malware sneaks into a gaming VM after certain software experiments, that malware remains isolated. You protect the host and other virtual machines from the infection, plus the infected VM can be quickly deleted and replaced with an identical one.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Easily Back Up VMs&lt;/strong&gt;&lt;br&gt;
A VM and a VM’s virtual storage disk are files. A file can be copied and moved to a different location to enhance data safety. Thus, you can have a default copy of your gaming VM to use in case an incident renders the main virtual machine inoperable.&lt;br&gt;
However, when you use virtual machines on VMware or Hyper-V for gaming, you might want to automate regular backup workflows and have control over your gaming data, such as game configurations, settings, and saved game files. Modern backup and recovery solutions can give you that automation and control.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimize Downtime&lt;/strong&gt;&lt;br&gt;
A virtual machine is flexible and easy to move between hypervisors on various physical hardware. Whenever you need to redistribute the resources of a main workstation or reconfigure your environment, you can move your VM for gaming with all your games to a different device (a laptop, for example) and play games there while the main machine is busy or unavailable.&lt;br&gt;
Additionally, when you use a modern data protection solution to back up your gaming VM, the same solution can help you recover a fully functional virtual machine in minutes. If your virtual machine for gaming gets infected with malware, or you go the wrong way while experimenting with configs, you can quickly recover a default VM and continue gaming.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Optimizing a VM for Gaming&lt;/strong&gt;&lt;br&gt;
When considering the use of a virtual machine for gaming, what impacts the gaming experience the most is performance. For sure, virtualized workloads can demand more hardware resources than usual gaming PCs to run games properly. Still, you can spend some time optimizing your gaming VM. In this case, your gameplay can become smoother, and the experience of gaming on a virtual machine might be significantly more pleasant.&lt;br&gt;
Here is a list of hardware and software optimization tips that you can consider to optimize a VM for gaming.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Host a gaming VM on a Solid State Drive (SSD) whenever possible because SSD disks have noticeably higher read and write speeds than regular HDDs. It’s even better if you can use high-speed NVMe SSDs that are faster than SATA drives by design.&lt;/li&gt;
&lt;li&gt;Create a gaming VM with a fixed virtual hard disk (VHD).&lt;/li&gt;
&lt;li&gt;Regardless of the circumstances, don’t apply encryption or compression to drivers on a gaming VM.&lt;/li&gt;
&lt;li&gt;Have a minimum of 1 gigabyte of RAM free as a spare resource on your host.&lt;/li&gt;
&lt;li&gt;Defragment hard disks on the host. Defragmented disks exclude file scattering and boost overall performance.&lt;/li&gt;
&lt;li&gt;Check the antivirus configs and ensure they don’t conflict with the gaming VM’s workflows.&lt;/li&gt;
&lt;li&gt;When using Hyper-V for gaming, enable the Dynamic Memory feature on your gaming VM. Thus, that VM can have more RAM when necessary to run the game with more frames per second.&lt;/li&gt;
&lt;li&gt;While gaming, try to run only the necessary operations on the host. Disabling the apps which are not critical within the environment can boost a game’s performance on a gaming VM.&lt;/li&gt;
&lt;li&gt;You can redistribute host resources to increase a gaming VM’s performance and play high-end games when the main host isn’t busy with resource-intensive production tasks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
Gaming on a virtual machine is possible and can have certain benefits, such as:&lt;br&gt;
The opportunity to choose and flexibly change the OS on a VM.&lt;br&gt;
Secure the production environment from possible threats by isolating a VM.&lt;br&gt;
Back up a gaming virtual machine to preserve important data such as saved game files.&lt;br&gt;
Restore the default VM for gaming with the games and settings from a backup in minutes.&lt;br&gt;
Optimizing a virtual machine for gaming purposes can take time and effort but the performance boost is worth it. Consider hosting a VM on an SSD, using fixed virtual hard disks, defragmenting drives on the host, and configuring antivirus software properly.&lt;br&gt;
Also, don’t compress or encrypt drivers on a gaming VM and disable the unnecessary apps on the host while gaming. Don’t forget to enable Dynamic Memory if you use Hyper-V and to redistribute the host hardware resources when planning to play high-end games.&lt;/p&gt;

&lt;p&gt;See the original article &lt;a href="https://techthelead.com/a-guide-to-boost-your-virtual-machine-gaming-performance/?ref=hackernoon.com"&gt;here.&lt;/a&gt;&lt;/p&gt;

</description>
      <category>virtualmachine</category>
      <category>gaming</category>
    </item>
    <item>
      <title>Data Encryption: benefits, types, methods</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Tue, 18 Apr 2023 05:43:18 +0000</pubDate>
      <link>https://dev.to/alex_tray/data-encryption-benefits-types-methods-mc5</link>
      <guid>https://dev.to/alex_tray/data-encryption-benefits-types-methods-mc5</guid>
      <description>&lt;p&gt;Data encryption is one of the most prevalent digital safety measures since it safeguards information and reduces the impact of cyber threats. Modern organizations incorporate encryption in various daily activities such as communication and payments.&lt;br&gt;
That said, it is essential to understand how encryption works so you can leverage its capabilities and ensure optimal protection. This post explains data encryption and lists its benefits, types and the common encryption methods found in different tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Is Data Encryption?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Data encryption transforms readable text found in messages, documents and files into scrambled or unintelligible content. This prevents unauthorized users from reading and understanding information usually deemed confidential or sensitive. The text becomes comprehensible once it has been decrypted and restored to its original state.&lt;br&gt;
Large organizations, small businesses and even individual users apply encryption to at rest or in-transit data in multiple scenarios:&lt;/p&gt;

&lt;p&gt;Sending emails: In this case, encryption is used to ensure that no one but the intended recipient reads the message.&lt;br&gt;
Storing production and backup data: Cyberattacks can capture and expose data whether it is kept on-premises or in cloud storage. However, data encryption keeps data incomprehensible even if it is accessed by hackers. Using a reliable backup solution like NAKIVO is crucial for securing your backup data. It also allows you to store your backup data in a secure, offsite location, such as a remote server or cloud storage, providing an added layer of protection against cyber threats.&lt;br&gt;
Managing online payments: Payment and credit card information is considered highly sensitive, and businesses are required by law to protect this data via advanced encryption.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;How Does Encryption Work?&lt;/strong&gt;&lt;br&gt;
Encryption tools use mathematical algorithms and randomly generated passcodes, known as encryption keys, to convert plaintext into a ciphertext made up of secret combinations of letters, numbers and characters.&lt;br&gt;
Originally, the old 4-bit key generated only 16 combinations, which made it easy for hackers to guess the correct combination using brute force attacks. Modern 256-bit encryption keys provide stronger protection by producing thousands of different possibilities.&lt;br&gt;
Encrypting data is only half of the process. The recipient or intended user should have a decryption key to convert the unintelligible text back to its original readable state.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefits&lt;/strong&gt;&lt;br&gt;
The widespread reliance on data encryption is due to its numerous benefits including:&lt;br&gt;
Security: First and foremost, encryption safeguards data by hiding it even if it falls in the hands of hackers. It does not offer ransomware protection but prevents unauthorized users from viewing the information which keeps it secure in case of a breach.&lt;br&gt;
Privacy: Only the intended user or recipient who has the decryption key can read the text. This ensures that data remains private whenever you share it.&lt;br&gt;
Authentication: When users encrypt data using a public key, they prove that they also hold the associated private key which means that you can rest assured that they are the rightful owner of the data you received.&lt;br&gt;
Compliance: Regulatory and compliance standards like GDPR and HIPAA require businesses that collect and store personal information to keep their data encrypted.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Data Encryption&lt;/strong&gt;&lt;br&gt;
There are two distinct types of data encryption that primarily differ in the number of encryption keys used to encrypt and decrypt information.&lt;/p&gt;

&lt;p&gt;Symmetric encryption&lt;br&gt;
Symmetric encryption, also known as private-key cryptography, requires only one key to encrypt and decrypt data. In other words, both the sender and receiver should have the same key to successfully exchange classified information.&lt;br&gt;
While this type is faster than asymmetric encryption, it is less secure. It is recommended that you use symmetric encryption in internal activities that do not involve a third party. Moreover, it is crucial that both parties safely share and store the encryption key.&lt;/p&gt;

&lt;p&gt;Asymmetric encryption&lt;br&gt;
This method is also called public-key encryption. Asymmetric encryption uses two keys that are paired with each other: the public key is required to encrypt data and the private key is needed to decrypt it.&lt;br&gt;
Anyone can view the public key but the corresponding private key should remain with the intended users only so they can use it to decrypt the ciphertext. &lt;br&gt;
Asymmetric encryption provides more security than symmetric encryption. However, it is a slower process that might impact business activities that should be done quickly like online transactions.&lt;br&gt;
Note: Hashing is sometimes considered an encryption technique since it creates a unique signature of a specific length for a text. Nevertheless, data encrypted using hashing does not rely on encryption keys and cannot be decrypted. Its only purpose is to verify that the information hasn’t been modified and to ensure data integrity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Common Methods&lt;/strong&gt;&lt;br&gt;
There are numerous forms of encryption algorithms available and they vary in key length, key type and size of encrypted data blocks. The most common ones are listed below.&lt;br&gt;
Advanced Encryption Standard (AES)- AES is one of the most trusted encryption algorithms and is used by large corporations and governments to safeguard information. It can encrypt data at rest or in transit while keeping it secured from almost any type of attack except for some types of brute force. Advanced Encryption Standard is a symmetric encryption algorithm that encodes content in fixed blocks of data over several rounds. Each round includes mixing, transposition and substitution of plaintext. The AES keys used to decrypt texts are generally 128-bit long but you can also find 192- and 256-bit long keys. &lt;br&gt;
Triple DES (Data Encryption Standard) - Triple DES is also symmetric encryption and it is the advanced version of the original DES algorithm. When encrypting information, Triple DES uses a 56-bit key and applies the algorithm three times to each data block. This encryption method is generally used when encrypting ATM PINs.&lt;br&gt;
Blowfish - Blowfish is a symmetric algorithm known for its speed and reliability which is why it is found in e-commerce websites and online payments. This method divides the m message into 64-bit blocks and encrypts them individually. Blowfish is also publicly available and free to use.&lt;br&gt;
Twofish - This is the successor of Blowfish and it is also free to use. Twofish offers advanced capabilities by breaking data blocks into 128 bits. It is the fastest symmetric algorithm and can be used for software and hardware environments.&lt;br&gt;
Rivest-Shamir-Adleman (RSA) - RSA is a robust asymmetric encryption algorithm that is commonly used when transmitting information online. It encrypts data based on the factorization of the product of two large prime numbers. The recipients can only decipher the message if they know these numbers.&lt;/p&gt;

&lt;p&gt;Check the original article here&lt;/p&gt;

</description>
      <category>data</category>
      <category>encryption</category>
      <category>cybersecurity</category>
      <category>backup</category>
    </item>
    <item>
      <title>5 NAS Backup Strategies: Pros and Cons Explained</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Wed, 05 Apr 2023 02:14:40 +0000</pubDate>
      <link>https://dev.to/alex_tray/5-nas-backup-strategies-pros-and-cons-explained-46i5</link>
      <guid>https://dev.to/alex_tray/5-nas-backup-strategies-pros-and-cons-explained-46i5</guid>
      <description>&lt;p&gt;A modern data-driven world makes organizations of different scale and size use NAS devices as their data storage extensively. The nature and use of that data may vary, but in most cases, organizations cannot afford losing their NAS data assets under any circumstances. To keep control over data even after major disasters, an organization should implement a thorough NAS backup strategy.&lt;/p&gt;

&lt;p&gt;In this article, we explain the NAS backup definition, reasons to have a data protection strategy, and five main strategies to back up NAS devices. You’ll be able to evaluate the pros and cons of every strategy yourself and pick the most suitable one for your infrastructure. &lt;br&gt;
What is NAS Backup?&lt;br&gt;
The word “backup” in IT means a copy of data, which is stored independently and can be used for recovery purposes even when the original infrastructure is unavailable. Thus, NAS backup is a spare copy of NAS data, which has another storage destination and can help you recover the original data in the event of an incident.&lt;br&gt;
Why You Need a NAS Backup Strategy&lt;br&gt;
The key use case for NAS devices in organizations is data storage provision. Usually, a corporate NAS device runs disks where sensitive data is recorded. That data requires special measures taken to protect the storage and the data itself from loss or unauthorized third party access.&lt;/p&gt;

&lt;p&gt;Common threats causing data loss or breakage include:&lt;/p&gt;

&lt;p&gt;Human error: a user’s mistake or carelessness can lead to accidental file deletion, drive overwrite, improper device usage, password compromising, active protection disabling etc. Improper hardware or software maintenance also falls into this threat category.&lt;br&gt;&lt;br&gt;
Mechanical failure: you can configure RAID for NAS disks to overcome a failure of one disk. Still, even after one disk failure, NAS can be rendered inoperable because of overload resulting in storage bottleneck.&lt;br&gt;
Malware threats: ransomware or any other malware can reach your NAS storage and either cause data loss or grant unauthorized third-party access to the data. A bad actor can then alter, delete or steal an organization's sensitive data. &lt;br&gt;
Overheating: drives or other parts in your NAS device may fail after a cooling system malfunction that causes hardware overheat.&lt;br&gt;
Power outage: power supply in your office or data center is another factor that you can’t control. Once the power is off, your NAS can lose data that had been being recorded at that moment. Then, on supply restoration, RAID settings may apply wrongly, blocking access or corrupting the remaining data as a result.&lt;br&gt;
Natural disasters: a fire, a flood, an earthquake or any other natural disaster is always a risk for your office or datacenter, as well as for the hardware running your organization’s production.&lt;/p&gt;

&lt;p&gt;Regarding the complexity and variety of the data that an organization may need to store and use in production, the implementation of a reliable backup and recovery approach requires a carefully designed plan.&lt;br&gt;
5 NAS Backup Strategies Overview&lt;br&gt;
Again, carefully organized regular backup is the only way to keep control over your NAS data after data loss incidents. Therefore, a thorough strategy can ensure the efficiency of NAS backups and recovery workflows. Check the five main NAS backup strategies and consider their pros and cons to pick the strategy most suitable for your organization.&lt;br&gt;
Direct Backup to a USB Disk&lt;br&gt;
Particular NAS devices have USB or eSATA ports enabling you to connect external disks to those devices and transfer data. Therefore, the simplest way to backup NAS data is to connect an external HDD or SSD to your NAS appliance and copy the necessary data manually. &lt;/p&gt;

&lt;p&gt;Pros: Simple implementation, relatively low costs. Usually, NAS appliance vendors pack their solutions with default web interfaces for file management. Additionally, buying an external hard drive does not require huge investments.&lt;/p&gt;

&lt;p&gt;Cons: The main downside of data backup to USB drives is manual implementation. You need to manually attach the disk with a cable, start copying the required data, and then ensure that the backup was successful. Any failure or interruption during the workflow makes data in the backup copy inconsistent and potentially unrecoverable. You also cannot copy the data that is used in writing operations at the moment when you start the workflow. Lastly, the capacity of a single external hard drive can be insufficient to fit all the data you might need to back up from NAS.&lt;br&gt;
Backup to Another NAS&lt;br&gt;
Copying the data from the main NAS device to a NAS backup appliance is another strategy you can consider. To implement that, you can, for instance, share a folder between a remote and a local NAS appliance.&lt;/p&gt;

&lt;p&gt;Pros: Mounting a remote shared folder on a NAS appliance is a simple native way to enable direct data copying between two devices. Particular NAS models have the data operation scheduling function built in, meaning that you can configure backup automation with native software. Additionally, when you copy the data directly between NAS appliances, the backup server overhead is not the case.&lt;/p&gt;

&lt;p&gt;Cons: The most significant downside here is the backup inconsistency in case when apps run files during the data copying workflow. &lt;br&gt;
NDMP Backup&lt;br&gt;
Created and designed purposely to manage backup workflows of NAS devices, NDMP (Network Data Management Protocol) simplifies the process of sending data via the network. With NDMP, you can directly send data copies to backup servers or tape devices. No additional processes from the backup clients are required.&lt;/p&gt;

&lt;p&gt;The protocol enables direct communication between a NAS device and a backup server. NAS backup solutions from mainstream vendors (such as IBM and Commvault) usually have NDMP support built-in with different integration and functionality levels. &lt;/p&gt;

&lt;p&gt;Pros: Backing up file data via NDMP is convenient. Additionally, NDMP is fully supported by Oracle Secure Backup.&lt;/p&gt;

&lt;p&gt;Cons: The lack of full NDMP backup integration in the majority of other database apps, such as Microsoft Exchange or SQL. Ensuring data consistency in those apps requires application awareness support. Although you might think about customizing app awareness with specially created scripts, such a solution makes you shut down the app’s process to enable the backup workflow. Thus, your production environment loses stability and continuity. Additionally, script maintenance can take a lot of effort from your IT department.&lt;br&gt;&lt;br&gt;
NAS Storage Backup to Cloud&lt;br&gt;
If your organization has accounts in such cloud services as Amazon, Microsoft OneDrive/Azure or Backblaze, you can consider sending backups from NAS to the cloud. Still, keep in mind that your policy and the nature of the data should suit the use of public cloud storage. &lt;/p&gt;

&lt;p&gt;Pros: Sending backup data to the cloud helps keep control over sensitive data in case your office or data center suffers from disasters. You can enable cloud backup without investing in a backup server as well. Additionally, NAS solutions from particular vendors can enable synchronizing data between the cloud and your NAS. &lt;/p&gt;

&lt;p&gt;Cons: Cloud backup workflows can pose serious network bandwidth requirements if you need to regularly send large amounts of data over the internet without losing connection quality for production. Also, you need to have that connection stable while performing the backup workflow, and when recovering the data from cloud storage. Lastly, there is always a risk of losing your backups due to an emergency at the cloud storage vendor’s side.&lt;br&gt;
Block-Level Replication of NAS Devices&lt;br&gt;
NAS device replication is another way to protect an organization’s data. Vendors can offer specific software to replicate disk arrays and implement array-based replication as a NAS backup solution. With such a replication approach implemented, the system replicates the data from the primary NAS (source), which is in production, to a disaster recovery (DR) site. &lt;/p&gt;

&lt;p&gt;Pros: Direct connection between source and DR NAS appliances enables redistributing compute load from a server to storage devices. Additionally, replication can ensure NAS backup data relevance and minimal storage downtime in case of emergency. &lt;/p&gt;

&lt;p&gt;Cons: Software performing array-based replication on the block level is not app-aware and can copy only blocks that changed since the previous replication job (for asynchronous replication). Therefore, you risk damaging the data in case replication and introduction of changes to that data are simultaneous. Additionally, you’ll need to place similar or nearly similar NAS devices on both sides of the process, increasing the overall cost of the entire backup infrastructure.&lt;br&gt;
Third-Party NAS Backup Software: Versatile Solution for Efficient Custom Strategies&lt;br&gt;
As you might already understand, coming up with an efficient NAS backup strategy is challenging and depends on the needs and capabilities of a particular organization. Customization is key to backup NAS systems reliably in such cases. &lt;/p&gt;

&lt;p&gt;With the modern NAS backup software, such as NAKIVO Backup &amp;amp; Replication, organizations can create and manage automated data protection workflows according to the requirements and limitations of their infrastructures. Such software solutions can enable app-aware backup, fast recovery and near-instant replication running on schedule or on demand. &lt;/p&gt;

&lt;p&gt;You can store backup copies of your NAS data on site, send them off site, to the cloud or tape to keep up with the 3-2-1 rule and avoid a single point of failure. Then, you can recover entire volumes or separate files to the original or custom location. The additional advantage of versatile backup software solutions is the variety of security and performance optimization features that increase the efficiency of your NAS backups even further. &lt;br&gt;
Conclusion &lt;br&gt;
Efficient NAS backup is impossible without a thoroughly configured and maintained strategy. You can back up NAS data manually to external drives, use another NAS, Network Data Management Protocol (NDMP), cloud, or replication as core elements of your backup strategy. However, each of these five strategies has particular downsides that may be critical, such as the lack of app awareness and high hardware costs. A deeply customized NAS backup strategy with the use of a third-party software solution can help you combine different approaches to utilize their advantages and eliminate disadvantages at the same time.&lt;br&gt;
Check the original article here.&lt;/p&gt;

</description>
      <category>nas</category>
      <category>backup</category>
      <category>iaas</category>
      <category>networkattachedstorage</category>
    </item>
    <item>
      <title>The ultimate guide to Hyper-V backups for VMware administrators</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Tue, 04 Apr 2023 06:59:50 +0000</pubDate>
      <link>https://dev.to/alex_tray/the-ultimate-guide-to-hyper-v-backups-for-vmware-administrators-51gc</link>
      <guid>https://dev.to/alex_tray/the-ultimate-guide-to-hyper-v-backups-for-vmware-administrators-51gc</guid>
      <description>&lt;p&gt;With Microsoft Hyper-V gaining more market share and coming of age, VMware administrators must administer Hyper-V alongside vSphere in their environments. There are certainly similarities in administering the various hypervisors, including VMware and Hyper-V, but there are also subtle differences as well. Often, out of habit, we apply what we know to things that we do not know or that are new to us.&lt;br&gt;
While certain methodologies or best practices extend past the boundaries of VMware vSphere and apply to Hyper-V as well, there are differences in the administration and management of Hyper-V that VMware administrators will want to note and understand. These differences also can affect backup processes in the administration. &lt;br&gt;
Let’s take a look at some of the key differences between Hyper-V and VMware and how these can affect your backup methodologies. &lt;br&gt;
VMware vCenter Server vs. System Center Virtual Machine Manager (SCVMM)&lt;br&gt;&lt;br&gt;
VMware administrators are familiar with the well-known VMware vCenter Server – a centralized management and administration tool for creating, configuring, and interacting with all aspects of the vSphere environment. From vCenter, administrators can configure and control ESXi hosts, datacenters, clusters, traditional storage, software-defined storage, traditional networking, software-defined networking, and all other aspects of the vSphere architecture. In fact, vCenter Server is a necessary component to unlock most of the enterprise-level features and functionality of VMware vSphere. &lt;br&gt;
As a VMware administrator, you will typically connect your data protection solution to VMware vCenter Server as the central management pane to back up virtual machines residing on managed ESXi hosts. This provides a central login for managing and controlling the resources backed up by vSphere data protection solutions. Moreover, you can use the HTML 5-based vSphere Web Client to manage vSphere functions from any browser. &lt;br&gt;
In Microsoft Hyper-V, the equivalent solution for managing hosts and clusters is the System Center Virtual Machine Manager, or SCVMM. &lt;br&gt;
However, with Hyper-V, you can perform many of the “enterprise” level tasks, such as managing a Hyper-V cluster, setting up high availability, and performing live migration without using SCVMM. You can use the Failover Cluster Management console to manage your cluster resources, including setting up and configuring Clustered Shared Volumes (or CSVs). Also, without SCVMM licensing, you can use the Manager console to manage each host, etc. More info about Hyper-V Managment tools.&lt;br&gt;
Understanding the management interface and the differences between VMware vSphere and Microsoft Hyper-V is key to understanding the point of administration that is used to interface with data protection solutions, like . Typically, in either the VMware vSphere or Microsoft Hyper-V environment, you want to back up resources at the “host” level, which means you are backing up virtual machines centrally rather than from within the guest operating system. Knowing the respective management interfaces ensures effective and efficient VMware vSphere and Hyper-V backup. &lt;br&gt;
vSphere Cluster vs. Hyper-V Cluster &lt;br&gt;
With vCenter Server in place, creating a VMware vSphere ESXi cluster is a very quick and simple process: you simply add the hosts into the cluster. VMware “clustering” is purely for virtualization purposes. &lt;br&gt;
Clustering is built on top of the Windows Failover Cluster technology. Windows Failover Clustering is applied in a number of different use cases, including file servers and SQL clusters, as well as Hyper-V. Due to the more general nature of the underlying clustering technology for Hyper-V, it brings more complexity to configuring a Hyper-V virtualization cluster. However, the task can be accomplished relatively quickly if you use either PowerShell or the cluster creation wizard – Failover Cluster Manager. &lt;br&gt;
There are many data protection solutions available today that are able to easily interact with vSphere vCenter and the clusters managed therein. However, there are fewer data protection solutions that are able to integrate just as seamlessly with a cluster configuration. &lt;br&gt;
Understanding VMware VMFS and Hyper-V cluster shared volumes &lt;br&gt;
VMware vSphere utilizes the Virtual Machine File System (VMFS) – VMware’s clustered file system that was purpose-built from the ground up as a virtualization file system. With each release of vSphere, VMFS has been tweaked, and its functionality and capabilities have been extended. With vSphere 6.5, VMware introduced VMFS 6.0, featuring support for 4K Native Devices in 512e mode and automatic “unmapping” functionality to reclaim unused blocks. &lt;br&gt;
Administrators need to understand the capabilities of each type of virtualization file system. Not all data protection solutions support Microsoft Hyper-V Cluster Shared Volumes, so it is important to understand the requirements for today’s Hyper-V environments and the compatibility requirements of CSVs. &lt;br&gt;
VMware uses Snapshots and Hyper-V uses checkpoints &lt;br&gt;
Both have mechanisms that enable them to quickly save the state and data of a virtual machine at a given point in time. The term “snapshot” is by far the popularized word for this functionality and was coined by VMware. A snapshot operation in VMware creates the following files for the saved state and data: &lt;br&gt;
.vmdk – The flat.vmdk file contains the raw data in the base disk. &lt;br&gt;
-delta.vmdk – The delta disk is represented in the format of .00000x.vmdk. This is the differencing disk; it contains the difference between the current data of the virtual machine disk and the data at the time of the previous snapshot. &lt;br&gt;
.vmsd – This database file contains all the pertinent snapshot information. &lt;br&gt;
.vmsn – This contains the memory information of the virtual machine and its current state at the point in time of the snapshot. &lt;/p&gt;

&lt;p&gt;It uses “checkpoints” as their terminology to define the means to save a “point in time” state of a virtual machine. Let’s look at the architecture of the checkpoint. &lt;br&gt;
A Snapshots folder is created that may contain the following files: &lt;br&gt;
VMCX – This is the new binary format for the configuration file introduced in Windows Server 2016. It replaces the XML file found in 2012 R2 and earlier. &lt;br&gt;
VMRS – This is the state file, which contains information about the state of the virtual machine. &lt;br&gt;
AVHDX – This is the differencing disk that is created. It records the delta changes made after the snapshot creation. &lt;/p&gt;

&lt;p&gt;As a VMware administrator, you should be advised that Microsoft has introduced “production” checkpoints with Windows Server 2016. These interact with VSS (Volume Shadow Copy) to perform checkpoints that the guest operating system is aware of. These types of checkpoints function much like backup operations performed by data protection solutions.&lt;br&gt;
Importantly, Microsoft allows these “production” checkpoints to be run in production environments. This is significant because before Windows Server 2016, this technology was not supported, and it is still not supported with VMware snapshots. &lt;br&gt;
VMware changed block tracking vs. Hyper-V resilient change tracking &lt;br&gt;
With the release of ESX 4.0 back in 2009, VMware introduced a feature called Changed Block Tracking (CBT) that dramatically increases backup efficiency. Using this technology, data protection solutions are able to copy only the blocks that have changed since the last backup iteration. This method works for every backup iteration following an initial full backup of the virtual machine. You can now efficiently back up only the changes, at the block level, instead of taking full backups of a virtual machine every time, which is what generally happens with traditional legacy backup solutions.&lt;br&gt;&lt;br&gt;
If you are a VMware administrator shifting to administrating Microsoft Hyper-V, you should know that Microsoft’s equivalent offering, called Resilient Change Tracking (RCT), was only introduced with Windows Server 2016.&lt;br&gt;&lt;br&gt;
When you back up with Hyper-V’s Resilient Change Tracking, the following files will be created: &lt;br&gt;
The Resilient Change Tracking (.RCT) file – a detailed representation of changed blocks on the disk (less detailed than mapping in memory). It is written in write-back or cached mode, which means that it is used during normal virtual machine operations such as migrations, startups, shutdowns, etc. &lt;br&gt;
The Modified Region Table (.MRT) file – is a less detailed file than the (.RCT) file; however, it records all the changes on the disk. In the event of an unexpected power-off, crash, or another failure, the MRT file will be used to reconstruct the changed blocks. &lt;/p&gt;

&lt;p&gt;Make sure your chosen data protection solution can take advantage of the latest advancements in Hyper-V’s implementation of change tracking technology known as Resilient Change Tracking. This will ensure the quickest and most efficient Hyper-V backup iterations. &lt;br&gt;
VMware uses VMware tools vs Hyper-V uses integration services &lt;br&gt;
Both VMware and Hyper-V make use of components installed in the guest operating system to ensure more powerful integration between the hypervisor and the guest operating system. In VMware vSphere, this is handled with VMware Tools.&lt;br&gt;
VMware Tools is a suite of utilities that can be installed for better virtual machine performance, including driver-supported 3D graphics and mouse and keyboard enhancements, as well as time synchronization, scripting, and other automation features. Importantly, it also enables you to perform “application-aware” backups, which ensures that database applications are backed up in a transactionally consistent state. &lt;br&gt;
Concluding thoughts&lt;br&gt;
In today’s world of hybrid infrastructures and multi-hypervisor environments, at some point, you will most likely be asked to act as an administrator of both VMware vSphere and Microsoft Hyper-V environments for production workloads.&lt;br&gt;
Understanding the differences in management, administration, and underlying architecture is important for the successful administration of both VMware vSphere and Microsoft Hyper-V. All of these differences affect data protection solutions and their interaction with the hypervisors. &lt;br&gt;
Check original article here.&lt;/p&gt;

</description>
      <category>hyperv</category>
      <category>vmware</category>
      <category>administrators</category>
      <category>virtualization</category>
    </item>
    <item>
      <title>5 Ways to Secure a Virtual Machine in Cloud Computing</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Mon, 06 Mar 2023 09:03:51 +0000</pubDate>
      <link>https://dev.to/alex_tray/5-ways-to-secure-a-virtual-machine-in-cloud-computing-1mm0</link>
      <guid>https://dev.to/alex_tray/5-ways-to-secure-a-virtual-machine-in-cloud-computing-1mm0</guid>
      <description>&lt;p&gt;How to Secure a Virtual Machine in a Cloud Computing Environment: 5 Critical Recommendations&lt;br&gt;
Organizations worldwide store 60% of their data in the cloud. The popularity of cloud computing is undisputed in 2023 and predicted to grow in future years. The main benefits of using cloud storage and computing services to run corporate VMs include data availability and the cost-efficiency of such infrastructures. &lt;/p&gt;

&lt;p&gt;However, focusing on cloud computing as your organization’s main data storage has downsides. The main concern here is data and cloud VM security: the nature of cloud infrastructures make providing the appropriate level of protection to data challenging. In this post, we explain:&lt;/p&gt;

&lt;p&gt;what challenges to expect on the way to reliable cloud data protection, and &lt;br&gt;
how to secure your cloud virtual machine.&lt;br&gt;
Virtual Cloud Computing: Main Security Challenges&lt;br&gt;
Using a virtual machine in cloud computing requires taking proper measures to make security efficient. Before we proceed with explaining the particular recommendations, let’s review the main issues that organizations running cloud infrastructures can face: &lt;/p&gt;

&lt;p&gt;Data loss&lt;br&gt;
Distributed denial-of-service (DDoS) attacks&lt;br&gt;
Data breaches&lt;br&gt;
Access control difficulties&lt;br&gt;
Alerts and notifications&lt;br&gt;
How to Secure a Cloud Virtual Machine: Five Virtualized Security Tips&lt;br&gt;
Like with any IT protection systems, most critical recommendations regarding the security of cloud VMs are basic ones. Ignoring these simple guidelines increases the risk of security failure, compromised credentials, and further improper use of data or systems by bad actors. Check these five tips on boosting the efficiency of cloud virtual machine security in your infrastructure.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Secure and Separate Connections
The use of virtual networks enables you to maintain flexibility in connections to different nodes of your infrastructure. That means a virtual network is modified frequently, and establishing of an unwanted connection between machines, services or data repositories is possible. This can result in unplanned data circulation through a VM and a leakig threat, which can remain hidden until the very last moment. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;To avoid worst-case scenarios, double-check your virtual networks and keep them secure and separate. Conduct regular revisions of network routes and additionally check the changes before and after establishing new connections to a VM. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use Separate Management APIs
Isolating infrastructure management from the service itself is another important step in strengthening virtual machine security. Management APIs are there to set up and regulate functionalities, service behavior and features, meaning that every API of that kind creates numerous risks. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;All management APIs must be protected, but you should pay special attention to those controlling parts of your infrastructure. Ensure only authorized and qualified staff have access to such APIs.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Verify VM Components
Before the implementation of new features, components and functions to a VM, you should check if those elements correlate with the security requirements, including internal policies and compliance requirements. An outsider threat is a typical case that security measures aim to counter, but finsider attacks are frequently overlooked while being devastating when they happen.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Once you install an app, configure a feature or function on a VM, any element can have a security vulnerability remaining unnoticed on release. When you add an unverified component, the entire VM becomes a weak spot in the infrastructure security, providing attack opportunities to other elements of the environment. Develop a template for advanced verification and lifecycle management for VMs that has clearly stated audit points. Then use that template every time you introduce changes to a machine.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Isolate Hosted Elements
Another critical point of cloud virtual machine security is the isolation of every new element you host. For instance, if you have services or features in the cloud that are accessible to users within the network in any way, any feature or service can be a cyberattack target. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Isolating your hosting and feature connections inside a private subnetwork is a solution here. That’s the way to improve your cloud VMs’ and their applications’ resilience. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Regularly Back Up Cloud VMs
No matter how advanced and thorough your security measures are, a hacker intending to break through them is one step ahead and can come up with malware sophisticated enough to bypass that protection. The only reliable way to protect your VMs with their settings and data is to regularly and correctly back up those workloads. &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;A modern VM backup solution can help you to automatically back up cloud VMs to different destinations. Those VMs can then be recovered to original or custom locations with minimal downtime. Consider integrating one of such all-in-one data protection solutions into your organization’s infrastructure to ensure data availability and business continuity.&lt;br&gt;
Additional Recommendations to Prevent Virtualization Security Issues&lt;br&gt;
Five points above are crucial to maintain the safety of cloud VMs. However, applying other common security practices can lead to further enhancement of data protection in your organization. Below you can check three more security tips that work for any infrastructure, including virtualized environments. &lt;br&gt;
Reliable Passwords&lt;br&gt;
No matter how serious and advanced your data protection measures are, the passwords providing access to your VMs, cloud service accounts, control panels and dashboards must be strong. Otherwise, it’s like you’d invest a lot in thick walls and armored windows while not caring about inserting a lock in a front door.&lt;/p&gt;

&lt;p&gt;A strong password includes at least eight symbols: uppercase and lowercase letters, numbers and special characters. Another important feature of a reliable password is that it should be meaningless: a good password is one that does not have any logic or meaning, which a hacker could guess when attempting to break through the security. Here are the two examples: &lt;/p&gt;

&lt;p&gt;Reliable password: 2&amp;amp;4fkOzQ*0@8&lt;br&gt;
Unreliable password: Johnny07231976hey!&lt;/p&gt;

&lt;p&gt;Note: the more symbols are in your password, the more challenging it becomes for a hacker to break through that password.&lt;br&gt;
Encryption of Everything&lt;br&gt;
Encrypting data in flight (during transmission) and at rest (on disks) can prevent unauthorized third parties from stealing or modifying critical data. Therefore, try to encrypt every piece of data that your organization sends outside the internal network and infrastructure at least. Encryption of internal traffic can boost data protection even further but in that case you need to provide additional resources to keep performance at the same level.&lt;br&gt;
Two-Factor Authentication and Role-Based Access&lt;br&gt;
Two-factor authentication is a must for every user that has access to cloud infrastructure, and especially to critical elements. Such a measure adds one more layer of security: to log in, you’ll have to provide a password and an additional authentication key from Google Authenticator, for example. Thus, you can prevent a hacker that has compromised your password from retrieving access to your cloud VMs and react in time to close that breach.&lt;/p&gt;

&lt;p&gt;Role-based access control (RBAC) is another strongly recommended approach to strengthen any infrastructure’s security. RBAC enables you to grant particular rights per user, based on that user’s role in the organization. Hence, a hacker that gets access to an employee’s account can reach, steal and modify only a limited amount of data.&lt;br&gt;
Use Kubernetes to Streamline Security Management for Cloud Workloads &lt;br&gt;
Originally an open-source orchestration platform for containers, Kubernetes can become a convenient security management solution for cloud workloads, including VMs. When added to your cloud infrastructure, Kubernetes enables you to utilize the controls’ flexibility and automation features for the purpose of protection boost. &lt;/p&gt;

&lt;p&gt;For example, you can deploy a cloud VM, then set Kubernetes to automatically manage the resources available to that VM based on the current load and security policies applied. Kubernetes can provide the required level of data protection by controlling access to workloads, setting appropriate confidentiality for the secrets you store, and also checking if the newly added workloads have proper configurations. &lt;/p&gt;

&lt;p&gt;What’s also important is that Kubernetes can give you extra or alternative security capabilities compared to your cloud provider’s native features. You can combine the policies applied to a cloud workload, as Kubernetes sets an additional abstraction layer between the provider’s security services and your policy goals.&lt;br&gt;
Conclusion&lt;br&gt;
Securing a virtual machine in cloud computing requires a thorough understanding of threats and challenges that are relevant to cloud infrastructures these days. Setting up a cloud VM that is resilient is possible when you:&lt;/p&gt;

&lt;p&gt;Establish secure and separated connections between VMs to avoid unwanted data flows&lt;br&gt;
Use separate management APIs to avoid granting too much access to one user&lt;br&gt;
Regularly check VM components for new vulnerabilities&lt;br&gt;
Isolate elements elements in a private network &lt;br&gt;
Set a regular backup workflow for cloud VMs to keep control of your data&lt;/p&gt;

&lt;p&gt;Additionally, use common security approaches, such as generating reliable passwords, encrypting the data, two-factor authentication and role-based access control. They can enhance protection of any IT infrastructure, including cloud virtual machines and entire environments. To simplify security management, you can also consider integrating Kubernetes in your infrastructure.&lt;/p&gt;

&lt;p&gt;Check the original article &lt;a href="https://securityboulevard.com/2023/03/how-to-secure-a-vm-in-a-cloud-computing-environment/"&gt;here&lt;/a&gt;&lt;/p&gt;

</description>
      <category>virtual</category>
      <category>machine</category>
      <category>cloud</category>
      <category>computing</category>
    </item>
    <item>
      <title>Protecting User Data in Microsoft 365: A Step-by-Step Guide</title>
      <dc:creator>Alex Tray</dc:creator>
      <pubDate>Tue, 07 Feb 2023 04:50:38 +0000</pubDate>
      <link>https://dev.to/alex_tray/protecting-user-data-in-microsoft-365-a-step-by-step-guide-5be5</link>
      <guid>https://dev.to/alex_tray/protecting-user-data-in-microsoft-365-a-step-by-step-guide-5be5</guid>
      <description>&lt;p&gt;Introduction:&lt;br&gt;
Microsoft 365 is a popular productivity suite used by organizations of all sizes. While it offers a wealth of features and benefits, it also poses security challenges, especially in terms of protecting user data. With cyber threats on the rise, it's more important than ever to ensure that your Microsoft 365 user accounts and data are secure. In this article, we'll provide a step-by-step guide to help you safeguard your Microsoft 365 environment against data loss. We'll cover the threat landscape, Microsoft 365 security features, best practices for securing user accounts, and data backup solutions for Microsoft 365. With the information and recommendations provided in this guide, you'll be well-equipped to protect your organization's valuable data and ensure business continuity.&lt;br&gt;
Understanding the Threat Landscape&lt;br&gt;
Data security is a critical issue for all organizations that use Microsoft 365. With the increasing sophistication of cyber threats, it's essential to be aware of the potential risks to your user accounts and data. The following are some of the common types of data loss that organizations face in a Microsoft 365 environment:&lt;br&gt;
Ransomware attacks: Ransomware is a type of malware that encrypts files and demands payment in exchange for the decryption key. This type of attack can be devastating, as it can lead to the permanent loss of data.&lt;br&gt;
Phishing attacks: Phishing attacks are designed to trick users into disclosing their login credentials or personal information. These attacks can be delivered through email, instant messaging, or malicious websites, and can result in unauthorized access to user accounts and data.&lt;br&gt;
Insider threats: Insider threats can occur when a current or former employee with access to sensitive data deliberately or accidentally misuses that data.&lt;br&gt;
Data breaches: Data breaches can occur when unauthorized individuals gain access to sensitive data. This can be due to a lack of security measures or a security breach at a third-party provider.&lt;br&gt;
It's important to be aware of these threats and take proactive measures to protect your Microsoft 365 environment against data loss. In the next section, we'll discuss the security features that are available in Microsoft 365 to help you protect your data.&lt;br&gt;
Microsoft 365 Security Features&lt;br&gt;
Microsoft 365 offers a variety of security features to help protect user accounts and data. These features include:&lt;br&gt;
Multi-Factor Authentication (MFA): MFA is a security process that requires users to provide two or more authentication factors when accessing their accounts. This can include a password and a security code sent to their phone, for example. Enabling MFA helps to prevent unauthorized access to user accounts.&lt;br&gt;
Data Encryption: Microsoft 365 uses encryption to protect data both in transit and at rest. Data in transit is encrypted as it travels between users and Microsoft 365, while data at rest is encrypted on Microsoft's servers.&lt;br&gt;
Threat Protection: Microsoft 365 includes threat protection features, such as Advanced Threat Protection (ATP), that help to prevent malware and other threats from entering your environment. ATP uses artificial intelligence and machine learning to identify and block threats before they can cause damage.&lt;br&gt;
Compliance and Auditing: Microsoft 365 provides compliance and auditing features that help organizations meet regulatory requirements and monitor user activity. These features include audit logs, retention policies, and eDiscovery capabilities.&lt;br&gt;
By taking advantage of these security features, organizations can significantly reduce the risk of data loss in their Microsoft 365 environment. However, it's important to note that these features alone are not enough to fully protect user accounts and data. In the next section, we'll discuss best practices for securing user accounts in Microsoft 365.&lt;br&gt;
Best Practices for Securing User Accounts&lt;br&gt;
In addition to using the security features provided by Microsoft 365, there are several best practices that organizations can follow to help secure their user accounts and data:&lt;br&gt;
Use strong passwords: Encourage users to create strong, unique passwords and to avoid using the same password for multiple accounts. Consider implementing password policies that enforce the use of strong passwords.&lt;br&gt;
Enable multi-factor authentication: Require all users to enable MFA on their accounts to help prevent unauthorized access.&lt;br&gt;
Restrict access to sensitive data: Use role-based access controls and other security measures to restrict access to sensitive data to only those users who need it.&lt;br&gt;
Keep software up to date: Regularly update all software, including Microsoft 365, to ensure that security vulnerabilities are patched.&lt;br&gt;
Educate users: Provide regular training to users on how to identify and avoid phishing attacks, as well as how to secure their accounts and devices.&lt;br&gt;
By following these best practices, organizations can help to minimize the risk of data loss in their Microsoft 365 environment. However, it's also important to have a backup plan in place in case of an unexpected disaster. In the next section, we'll discuss data backup solutions for Microsoft 365.&lt;br&gt;
Data Backup Solutions for Microsoft 365&lt;br&gt;
Having a backup plan in place is an essential part of protecting against data loss in Microsoft 365. There are several data backup solutions available for Microsoft 365, including:&lt;br&gt;
Microsoft 365 Backup: Microsoft 365 Backup is a built-in backup solution for Microsoft 365 that provides backup and recovery for Exchange Online, SharePoint Online, and OneDrive for Business. This solution can be managed from the Microsoft 365 admin center and provides options for backing up data on a schedule, as well as for recovering data in the event of an accidental deletion or data loss.&lt;br&gt;
Third-party backup solutions: There are also several third-party backup solutions available for Microsoft 365. These solutions offer advanced backup and recovery features, such as the ability to recover individual items, complete site collections, or entire SharePoint sites.&lt;br&gt;
Regardless of the solution you choose, it's important to regularly test your backup and recovery processes to ensure that you can quickly recover data in the event of a disaster.&lt;br&gt;
In conclusion, securing user accounts and data in Microsoft 365 requires a combination of security features, best practices, and backup solutions. By following the recommendations outlined in this article, organizations can significantly reduce the risk of data loss in their Microsoft 365 environment and ensure business continuity.&lt;br&gt;
Conclusion:&lt;br&gt;
In today's digital world, securing user accounts and data is more important than ever. Microsoft 365 offers a range of security features, such as multi-factor authentication, data encryption, threat protection, and compliance and auditing, to help organizations protect their data. Additionally, following best practices such as using strong passwords, restricting access to sensitive data, and educating users can further enhance security.&lt;br&gt;
However, even with the best security measures in place, disasters can still occur. That's why it's important to have a backup plan in place. Microsoft 365 Backup and third-party backup solutions can help organizations recover data in the event of a disaster and ensure business continuity.&lt;br&gt;
In conclusion, protecting user accounts and data in Microsoft 365 requires a multi-layered approach that includes security features, best practices, and a backup plan. By following these recommendations, organizations can help to minimize the risk of data loss and ensure the protection of their critical data and user accounts.&lt;/p&gt;

&lt;p&gt;Check the original article here.&lt;/p&gt;

</description>
      <category>devto</category>
      <category>announcement</category>
      <category>support</category>
    </item>
  </channel>
</rss>
