Local Backups: Return to Safe Harbor

Local Backups: Return to Safe Harbor
Advertising

Share post

Why companies are rediscovering local backup strategies: In recent years, companies have become increasingly dependent on cloud solutions - like ships that have drifted further and further away from the safe shore. While 81 percent of companies use cloud services, a strategic turnaround is now emerging: on-premises backup strategies are rising up like a steadfast lighthouse.

They offer companies a safe haven amid the turbulent sea of ​​cybersecurity threats and cost pressures. This surprising revival of local data protection is based on a combination of robust security measures, cost efficiency and strategic control - qualities that navigate the way like a reliable beacon through the complex topography of the modern IT landscape.

Advertising
Perfect SME cybersecurity
How small and medium-sized enterprises defend against AI-led attacks with tailored security

The threat situation: Ransomware on the rise

The numbers are alarming: According to the Sophos Ransomware Report 2024, 59% of all companies and organizations were affected by ransomware attacks last year. The financial consequences are devastating - ransom demands have increased fivefold compared to the previous year. What is particularly worrying is that 93% of cyber attacks specifically target backups. (Veeam Ransomware Trends Report 2023)

The Evolution of the Backup Strategy: From 3-2-1 to 3-2-1-1-0

The tried and tested 3-2-1 backup rule has evolved into the more modern 3-2-1-1-0 strategy to better meet today's IT security challenges. This enhanced method retains the basic principles but adds important aspects.
The "3" still stands for three copies of the data in addition to the original data. The "2" means that the data should be backed up on two different types of media. The first "1" calls for keeping at least one copy of the data off-site. The second "1" is an important addition and stands for an offline backup that is physically disconnected from the network. And the "0" at the end stands for zero errors and emphasizes the need to regularly check the backups for errors and perform restore tests.
This enhanced strategy provides more comprehensive protection against modern threats such as ransomware and takes into account the importance of data integrity and availability.

Advertising

Hybrid strategies as the key to success

Hybrid solutions combine the benefits of cloud and local storage. They offer rapid on-site recovery, long-term archiving in the cloud, and flexibility and redundancy. In hybrid systems, companies can use the cloud for long-term archiving while keeping on-premises backups for rapid on-site recovery. This strategy enables an optimal balance between security, cost, and flexibility. Companies can thus benefit from the scalability of the cloud while maintaining control over sensitive data and having quick access to frequently needed information.

Advantages of local storage solutions

On-premises backup offers key advantages for companies in an increasingly digitalized world. First and foremost is full control over where data is stored, which is particularly important in times of strict data protection regulations such as the GDPR. Companies can thus see exactly where their sensitive data is stored and who has access to it. This not only makes it easier to meet compliance requirements, but also strengthens the trust of customers and partners in the responsible handling of their data.

Another key advantage is more transparent cost planning. In contrast to cloud solutions, which often have hidden fees for data transfer or additional storage space, on-premises solutions offer a clear cost structure. Companies can plan their IT budgets more precisely and avoid unexpected expenses that can arise with cloud services due to sudden price changes or increased resource requirements.

In addition, local storage solutions allow for greater flexibility and adaptability to specific business requirements. They can be seamlessly integrated into existing IT infrastructures and often offer better data recovery performance as there is no dependency on internet connections or external service providers. This is particularly important for companies that need quick access to large amounts of data or operate in industries where every minute of downtime can mean significant financial losses.

Air-Gap: The Ultimate Security Strategy

Air-gap backups create physical isolation between the network and storage systems. This technology prevents access to critical backup data even in the event of a successful cyberattack. Given that 93% of cyberattacks target backups, the importance of this strategy becomes even more apparent.

The Air-Gap feature of FAST LTA has been further optimized with the Silent Brick Pro system for even more efficient protection against ransomware attacks. This system consists of a controller and compact removable media equipped with 12 NVMe bars and offering capacities from 12 to 96 TB per module. After completing a backup job, these modules can be automatically extended by motor to achieve physical separation from the network, creating a real "air gap" between the backed up data and potential attackers.

The Cost of Doing Nothing

IT outages can have devastating financial consequences. An EMA study commissioned by BigPanda, an IT operations management company, provides alarming figures: IT outages cost an average of $14.056 per minute - an amount that can rise to up to $23.750 for large companies. A well-thought-out backup strategy is therefore not just a security measure, but an essential investment in company stability and financial security.

Current trends in data protection

The “2024 Data Protection Trends Report” underlines the growing importance of a robust and future-oriented data protection strategy. Key trends include flexibility between cloud providers, consistent security across all workloads, and increasing investments in data protection.

Modern backup solutions must offer advanced features such as continuous snapshots and object locking for S3 shares that protect long-term backups from attacks. In addition, the integration of artificial intelligence and machine learning is becoming increasingly important to detect anomalies and optimize recovery processes.

Automating backup processes is also becoming increasingly important. Automated updates and patches help protect infrastructure from new threats, while automated recovery processes after ransomware attacks enable a quick return to normal operations. Hybrid backup strategies that combine local and cloud-based solutions offer companies the flexibility to back up data both on-premises and in the cloud, enabling an optimal balance between speed, scalability and security.

Conclusion: A well thought-out backup strategy is essential

At a time when cyber attacks are becoming increasingly sophisticated, a well-thought-out backup strategy is essential. The combination of local and cloud-based solutions, coupled with the extended 3-2-1-1-0 strategy, offers the flexibility and security needed to meet the challenges of the modern IT landscape. On-premises solutions are an essential component of this strategy, as they give companies full control over their data and guarantee fast recovery.

Solutions such as the Silent Brick System from FAST LTA help companies adapt their backup strategies to individual needs while benefiting from the latest security technologies. Integrating on-premises storage into a hybrid backup strategy ensures that companies are not only prepared for data loss, but also meet legal requirements for data protection and data security.

To optimize their backup strategies, companies should take the following steps:

  • Regularly review and adapt the backup strategy to current threats and technologies.
  • Perform regular recovery tests to ensure the integrity of backups and the efficiency of the recovery process.
  • Implementation of air-gap solutions for critical data.
  • Training IT staff on the latest security practices and technologies.
  • Continuously evaluate the balance between on-premises and cloud solutions to ensure optimal security and cost efficiency.

A proactive data protection strategy is now more important than ever. The question is no longer if a company will be attacked, but when. However, with the right strategy and the right technologies, companies can be well prepared and minimize the impact of potential attacks.

More at FAST-LTA.de

 


More than FAST LTA GmbH

FAST LTA is the specialist for secure secondary and long-term storage systems. The combination of durable and low-maintenance hardware, integrated software for data backup and on-site maintenance contracts with a term of up to 10 years ensure long-term, cost-effective storage of data from archive and backup applications. In-house developments such as local erasure coding, sealing using hardware WORM and efficient energy management help medium-sized customers to protect themselves against data loss through ransomware attacks and misconfiguration and to meet regulatory and legal requirements (GDPR). The Munich provider's solutions have proven themselves in thousands of installations in healthcare, public administration, film/TV/video and industry.


 

Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more

Vishing: Criminals rely on voice phishing attacks

Using AI-generated deepfakes, cybercriminals imitate trusted voices. Vishing exploded in the second half of 2024, according to the results of a ➡ Read more