Category: Data Protection

Show Your Appreciation to All SysAdmins Today and Everyday

Great work to all the System Administrators in the world! These hard working, dedicated men and women play a huge role in all our lives. From our desks to our home offices, they are the backbone of the technology that integrates into our daily routines. They jump in when needed and often necessary, will work 24-hour days and thru the weekend to troubleshoot outages, increase capacity, fight ransomware, or answer questions from us. One of their major responsibilities is to make sure they have a data protection insurance policy if data is lost, a final backstop to protect our business data, our system configurations, and our corporate histories.

We’d like to take the time now to show our appreciation to all System Administrators, from our team to yours!

For Catalogic Software, we would like to thank our IT Manager, Dawuan Myers, for continuous help on all ends of our business. Please check out Dawuan’s Q&A and learn from his experiences:

 

Dawuan Myers – Q&A

  1. What keeps you up at night?
    Not what many will say. Being part of a backup company where I know I have robust recovery processes and products allows me to sleep pretty well at night.

    These days, my nightmares often have to do with waking up to a $100k cloud bill from a runaway workload or a code change deployment. It has happened once before and hopefully never again!

  2. What do you see as the biggest emerging threat?
    People taking advantage of your weaknesses is a profession. Recent Ransomware and cybersecurity trends are maddening, and it’s hard to fathom that there is an industry built to make your life miserable. The thought of going through a major attack over a long weekend when I am looking forward to spending time with family is just sickening to me.
  3. What would be your advice to management to make a sysadmin’s job easier?
    Our management team has been great and incredibly supportive. They allow us to keep our systems up to date with patches which helps us fight any known cyber threats before reaching our network. If I had to give any advice; it would be to continue to be supportive and patch your systems.
  4. What would be your request to your users that would make your job easier?
    Be safe and continue to communicate.

    With all that is going on with malware and ransomware threats, I always advise our users to take a safe approach and communicate anything that looks suspicious. Being proactive is always better than being reactive.

  5. What would you want to do more of? Or learn more of?

    The Linux OS is something I would like to continue to learn more about. Coming into Catalogic Software 7 years ago with a Windows OS background, I needed to learn Linux OS and commands quickly. We do have a mixed environment, however a lot of what we do is based around Linux. I would like to take the next step up from being an Intermediate Linux administrator.

  6. We know you just got promoted to be an IT Manager. Congratulations! What are you most looking forward to, in your new role?
    Thanks! I look forward to continuing to improve our network and help support and manage the cloud infrastructure costs for CloudCasa, our new cloud native, Kubernetes backup-as-a-service.

Read More
07/30/2021 0 Comments

Survive and Recover from Ransomware Attacks with Data Backups

Cybercriminals love nothing more than infiltrating a network, accessing your data, and encrypting it so it can no longer be accessed until a ransom is paid. Typically, the longer the data is encrypted and unavailable, the larger the financial impact. These criminals may even sell the data outright.

Attacks are becoming more frequent and sophisticated. A ransomware attack study from Ivanti found that of 1,000 enterprises IT professionals across the globe, 58% had worked for organizations that had suffered a ransomware attack in the last year! Sadly, cybercriminals have become an almost unstoppable force.

If you are a software vendor like us, you need to ensure you have very robust security policies and procedures in place to prevent hackers from gaining access to code. Because if they do, every single customer using your software is then at risk of attack.

One of the largest global ransomware attacks to date happened to Kaseya, which provides IT management software for MSPs. Kaseya’s VSA remote monitoring and management tool was used as an attack vector to inject ransomware into over a thousand systems via thirty-plus MSPs. This is not the first time this type of supply chain attack has taken place with SolarWinds, having a similar scenario unfolded last year.

We are living in a data-driven age. Security is a process that needs to be implemented with policies in place to ensure that users, networks, and devices are as protected as possible. Part of the security process for your data should involve a reliable and tested data protection solution that will support your organization in recovering your data quickly if it is compromised.

 

 

One ‘data protection fortress’ that thousands of organizations have chosen to protect and recover their data is Catalogic DPX. DPX is part of their core data protection strategy, enabling fast backups with instant recovery, and DPX is trusted due to its leading industry reliability and comprehensive coverage.

When choosing the fortress for your data, there are five key capabilities your data protection solution and IT team needs to provide to shield, protect, survive and recover from a ransomware attack:

 

  • Ensure redundant backups
    Backup is everything and it is of the highest priority to ensure your organization’s backups can be counted on to recover lost data. The 3-2-1 backup rule is a great strategy for data protection. It calls for three (3) copies of data, on two (2) different storage media types, with one (1) of the copies offsite or in the cloud. With backups to recover from and the offsite copy that ransomware cannot reach, this strategy is good insurance against bad actors stealing data. The 3-2-1-1 rule adds at least one backup copy verified was not locked or corrupted that can be recovered. 3 copies, 2 media, 1 offsite, and 1 verified recoverable. Catalogic DPX is the perfect product to enable 3-2-1-1.

 

  • Granular recovery points
    Backup is must be completed every day. Sometimes things get in the way and a backup might be missed occasionally. But if you are only backing up once per week and ransomware strikes toward the end of the week, the company could lose many days of data. Backups and snapshots must run regularly, or point-in-time copies of data are taken as often as possible. This helps an organization recover as close as possible to the time the data was encrypted or damaged by ransomware.
    Ransomware attackers are analyzing behavior and traffic waiting for the best time to strike. Sometimes attackers are present in the network and have access after recovery, allowing them to attack again. Take this into consideration and set longer retention periods than your typical defaults of  30, 60, or 90 days.

 

  • Air-Gapped and Immutable backups
    If your backups reside on the same network or the same storage system as your production data resides, they are vulnerable to attack also. Cybercriminals have gotten more sophisticated and one of the first items they do is to search for and remove all your backups so that no data recovery is possible. Having backups air-gapped in the cloud or on tape that the ransomware attacker cannot easily reach, helps ensures that your data is recoverable. Further, if your backup data or data snapshots are immutable or locked from changes, they can be used to rapidly recover your data in case ransomware encrypts your primary data.

 

  • Application-aware backup
    Applications require additional consideration if they use a database and the data is protected only by those files themselves. When ransomware hits, it takes several steps to recover applications. Application-aware backup is important as it defends application metadata and ensures that the application servers can be recovered. Conduct application recovery verification tests on a regular basis to stay in the know and confirming that the data and applications can be restored.

 

  • Reporting can predict disaster ahead
    It is typical for incremental data backup to contain fairly small changes between full backup cycles. One big tip-off when ransomware hits (with data encrypted) is that an incremental backup suddenly becomes the size of a full backup. Modern data protection products can track anomalies and report if backup sizes are unexpectedly much larger and alert the backup/security administrator. This is very helpful in identifying an attack in progress, and also sets the point in time from which rapid data recovery can commence.

Data Protection is the last line of defense when it comes to ransomware attacks. Ensure that you have a data protection fortress-like Catalogic DPX that is ransomware recovery ready.  If you are interested in learning more about how Catalogic can assist you in implementing your data protection fortress to ensure recovery from ransomware attacks, please contact us and also watch our recent webinar Protect and Recover Your Data from Ransomware Attacks.

 

Read More
07/20/2021 0 Comments

Modern Data Protection with Heritage – Eradicating Data Loss

Every organization needs a data protection solution in place to ensure that in the event of security breaches, corruption, human error, hardware faults, or environmental disasters data can be recovered to ensure continuation of the business.

Data is a business’s lifeblood and fuels development and growth. With ever-evolving digital transformation nearly all organisations are now wholly dependent on data. If you’re not analyzing, consuming, and creating data to push your business forward, then in most industries these days you are falling behind.

Given the importance of data, a plan to ensure you can cope with data loss is required. Approximately 50% of small business will not re-open after data loss. We want to ensure data loss is a thing of the past for small businesses. If you are a small business, take a look here at our Free Hyper-V agentless backup option covering protection of up to 5TB and 25 VMs free of charge.

Hardware failure accounts for the majority of data loss, with approximately 40% of cases being caused this way.  Human error is also high on the list, with approximately 30% being caused accidentally.

Security breaches also have a huge impact—it seems you cannot go one day without hearing about another major security breach.  Each security breach now costs an average of over $3.8 million and there were over 1,120 security breaches reported in the mainstream media in 2020. That’s over 3 a day, and those are only the high-profile cases. At an average cost of $3.8 million, the cost of security breaches in 2020 was over $4.2 billion! Sadly, this figure will only continue to increase given cyber-crime is a growing industry with more and more talent being added to these criminal gangs with the lure of large pay packets.


Our Smart Data Suite has the power to put multiple data loss prevention and cyber-security protection measures in place. Take a look and ensure closure doesn’t happen to you due to data loss.

In relation to all these types of Data loss we are here to help, with Catalogic DPX we can ensure your business can enable instant recovery and continue operating.
Catalogic DPX is different to all the other vendor backup solutions in the market for 3 reasons:

 

  1. We have a heritage in the data protection industry – delivering data protection solutions for over 25 years.
    This means we have a vast array of support for all operating systems, applications and media types and offer better backwards compatibility and media integration than most of our rivals.
  2. We are a software company.
    This means we have no interest in selling you expensive hardware appliances alongside our software. Everything we do is fully software-defined and our product is a simple and flexible cost model. There are no additional licensing costs for additional modules, backup (vStor) repositories, offloading, or archive like there are with a lot of the other players in the data protection market. DPX is all inclusive.
  3. Our solutions are modern.
    With our heritage in Data Protection we understand people want simple and modern data protection solutions. That’s why DPX uses Docker and allows modules or containers to quickly be added for supporting new solutions. Our new HTML interface is being continually improved to make admins lives easy to protect and instantly recover data with Catalogic DPX.

Worried about data loss, or even worse, have you recently experienced data loss?
Are you an SMB with no defined data protection solution in place?
Fed up with your legacy data protection solution underdelivering?
Think you are paying too much for your existing data protection solution?
Want a modern data protection solution without proprietary hardware and tons of add on costs?

Then you need to talk to us about what we can do for you with Catalogic DPX and the Catalogic Smart Data Suite.

Contact us—we can quickly set up a conversation to discuss your needs, run product demonstrations, show pricing examples and enable a free proof of concept.

Read More
04/08/2021 0 Comments

Still no squeeze balls! We’re ditching swag again for NetApp Insight 2019

Sorry squeeze ball fans. Still no squeeze balls for you!

After our experience and positive community response at Pure //Accelerate 2019 when we stopped handing out trade show swag and instead made a charitable donation, we’ve decided to do it again at NetApp Insight 2019.

When you visit our booth at NetApp Insight (#316), instead of handing you a squeeze ball or other trade show swag, we’re going to make a $3 donation to Three Square, a Southern Nevada food bank. Three dollars for three squares a day! In fact, since each dollar donated to Three Square purchases three meals, just by dropping by and saying hello you’ll help deliver nine meals to needy people in Southern Nevada, including Las Vegas. That’s got to feel better than another squeeze ball!

At the same time, we hope you’ll linger a while at our booth to hear about our various solutions built on NetApp technology. And please drop into our session, 9002-2: Ransomware Protection, File-System Auditing and NAS Backup/Restore for ONTAP on Tuesday, Oct. 29 from 1:30 – 2:30 p.m.  If you’d like to schedule a meeting in advance of the show, visit our Insight page where you can schedule a meeting for any day of the show.

And while we’re no longer handing out throw-away swag like squeeze balls or novelty sunglasses, we are having drawings for SONOS One speakers. We’ll be doing one drawing a day, and a separate drawing for our session. To enter a drawing, just come by our booth and take a short online IT survey that should take you about a minute. That’s it! The other way to enter is to attend our session, as we’ll be giving away a speaker in the session.

We’re looking forward to meeting everyone at NetApp Insight 2019.

Read More
10/09/2019 0 Comments

Let us show you around