{"id":421,"date":"2021-01-03T14:33:20","date_gmt":"2021-01-03T14:33:20","guid":{"rendered":"https:\/\/bootstrap-it.com\/blog\/?p=421"},"modified":"2021-01-03T14:33:20","modified_gmt":"2021-01-03T14:33:20","slug":"it-security-and-data-backups","status":"publish","type":"post","link":"https:\/\/bootstrap-it.com\/blog\/?p=421","title":{"rendered":"IT Security and Data\u00a0Backups"},"content":{"rendered":"<div id=\"s-share-buttons\" class=\"horizontal-w-c-circular s-share-w-c\"><a href=\"http:\/\/www.facebook.com\/sharer.php?u=https:\/\/bootstrap-it.com\/blog\/?p=421\" target=\"_blank\" title=\"Share to Facebook\" class=\"s3-facebook hint--top\"><\/a><a href=\"http:\/\/twitter.com\/intent\/tweet?text=IT Security and Data\u00a0Backups&url=https:\/\/bootstrap-it.com\/blog\/?p=421\" target=\"_blank\"  title=\"Share to Twitter\" class=\"s3-twitter hint--top\"><\/a><a href=\"http:\/\/reddit.com\/submit?url=https:\/\/bootstrap-it.com\/blog\/?p=421&title=IT Security and Data\u00a0Backups\" target=\"_blank\" title=\"Share to Reddit\" class=\"s3-reddit hint--top\"><\/a><a href=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&url=https:\/\/bootstrap-it.com\/blog\/?p=421\" target=\"_blank\" title=\"Share to LinkedIn\" class=\"s3-linkedin hint--top\"><\/a><a href=\"mailto:?Subject=IT%20Security%20and%20Data\u00a0Backups&Body=Here%20is%20the%20link%20to%20the%20article:%20https:\/\/bootstrap-it.com\/blog\/?p=421\" title=\"Email this article\" class=\"s3-email hint--top\"><\/a><\/div>\n<p>Early one recent morning my Linux workstation failed to boot. And just like that, all my work plans for the day ground to an immediate halt.<\/p>\n\n\n\n<p>This was the Linux workstation that was host to thirty years-worth of data: The original working drafts of all my books. The master versions of my course videos. My tax records, banking information, password vault, and the access keys to my cloud infrastructure.<\/p>\n\n\n\n<p>Was I surprised? Not particularly. The day before I\u2019d been struggling with a broken Python package and I knew there was a chance it wouldn\u2019t end well the next time I fired up the machine.<\/p>\n\n\n\n<p>Was I annoyed? Yup.<\/p>\n\n\n\n<p>Did I break into a cold sweat, thinking about what was lost and whether I\u2019d ever recover? Nope. That was never a concern. In fact, from the moment I decided that the original installation was no longer worth fighting for, it would only take an hour or so to get everything back up and running. (Not counting the time it took me to remember that a known hardware conflict required I disable a non-free Nvidia driver.)<\/p>\n\n\n\n<p>Let me emphasise that: I erased the corrupted drive, installed a clean copy of Ubuntu Linux, and wrote fresh, reliable copies of around 20GB of data to the new installation in less than a single hour.<\/p>\n\n\n\n<p>Besides having a fast fibre optics internet connection, what\u2019s my secret sauce? I\u2019m constantly backing up all my important data to multiple storage locations. When catastrophe hits, and I have a solid, tested recovery protocol in place. For all intents and purposes, the workstation part of that protocol involves installing my OS and then, with just two or three commands, restoring all my data to its new home. From that moment, I\u2019ll be back to work.<\/p>\n\n\n\n<p>I\u2019m sure this story has left you overcome with relief and warm, sympathetic feelings. But what\u2019s it all got to do with IT security? More than you might imagine. The fact is that there many reasons backup discussions belong here, but if you had to limit yourself to just one, this common and timely scenario (adapted from my recent \u201cLinux Security Fundamentals\u201d book from Wiley\/Sybex)[<a href=\"https:\/\/www.amazon.com\/dp\/1119781469\" rel=\"noreferrer noopener\" target=\"_blank\">https:\/\/www.amazon.com\/dp\/1119781469<\/a>] would be it:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Imagine you\u2019re responsible for the IT systems powering the municipal services for your small town. Without those computers and their data, municipal workers won\u2019t get paid next month, the local library won\u2019t know where any of their books are, the 911 emergency service communication system\u2019s phones won\u2019t ring, and the town\u2019s information website will go offline.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Now imagine that one fine morning you log into the main server and you\u2019re greeted by the cheerful news that all the data on your systems has been encrypted by a hacker from Eastern Europe and that they won\u2019t give you the decryption key to restore your access unless you pay them a couple hundred thousand dollars\u2019 worth of cryptocurrency. Don\u2019t think this is realistic? Major hospitals, utilities, and entire small cities have been brought to their knees by just such attacks.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>What are your choices?<\/p><\/blockquote>\n\n\n\n<ul class=\"wp-block-list\"><li><em>You could pay the ransom and hope the attackers keep their promise to decrypt your data. But, historically, they often haven\u2019t. Criminals aren\u2019t known for being honest.<\/em><\/li><li><em>You could try using decryption tools provided by major security companies and government agencies (like <\/em><a href=\"https:\/\/noransom.kaspersky.com\/\" rel=\"noreferrer noopener\" target=\"_blank\"><em>https:\/\/noransom.kaspersky.com\/<\/em><\/a><em> ) and hope that they\u2019ll work on your system. This is certainly a valid option, but it won\u2019t work in all cases.<\/em><\/li><li><em>You could wipe your systems clean and rebuild everything from scratch. This could be hugely expensive and take months to complete.<\/em><\/li><\/ul>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>But do you know how you can stop the attack cold and walk away virtually untouched? If you had complete, up-to-date backup copies of your systems (both the user data and the application systems themselves), then all you\u2019ll need to do is rebuild from your backups.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Worst case, you\u2019re down for an hour or two, and few people even notice. Even better, you could plan things really well by designing an always-running \u201chot\u201d backup infrastructure that\u2019s preconfigured to go live the minute the main system goes down. It\u2019s known as failover, and it\u2019s the kind of plan that can make you a big hero and earn you a big raise.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Still not sure what backups have to do with security?<\/p><\/blockquote>\n\n\n\n<p>That Linux Security Fundamentals book also describes how to properly assemble all the parts your recovery plan will need. That\u2019ll include a careful assessment of precisely how important your data is to both you and the organization you work for. Here\u2019s how my book describes RTOs and RPOs:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>How \u201cquick\u201d is quick enough and how \u201ccomplete\u201d is complete enough? That will depend on your organization\u2019s operational needs. It\u2019s common for administrators to measure their needs in terms of a recovery point objective (RPO) and recovery time objective (RTO). An RPO is the system state you need to be able to recover that will be current enough for your organization\u2019s minimum requirements. So, for instance, if your recovered system will have data that includes all but the last hour preceding the crash, you\u2019ll be able to get by. But a loss of two hours of data would be catastrophic; the financial or reputation loss you\u2019d face would be too serious. For such an organization, you\u2019d better make sure you have an RPO of one hour or less.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>An RTO, on the other hand, is a measure of how soon you need to get your system back up and running at full speed before really bad things start happening to your organization.<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>By way of example, suppose your ecommerce site was offline for 12 hours. You\u2019ll lose some business, obviously, but your business analysts tell you that anything up to 48 hours is still livable. More than 48 hours, however, and customers will assume you\u2019re down for good and head over to the competition (which, all things being equal, will be Amazon).<\/p><\/blockquote>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Therefore, when you plan your backup regimen, you\u2019ll take both the RPO and the RTO into account. You\u2019ll need to make sure a new backup is run within the RPO (say, one hour) and also make sure you can access your backup archives and successfully restore the data to the applications in less than the RTO (48 hours, in our example).<\/p><\/blockquote>\n\n\n\n<p>Sure, RTOs and RPOs are usually applied to enterprise infrastructure workloads. But, on many levels, the underlying point can also apply to our own beloved workstations and laptops.<\/p>\n\n\n\n<p>If you take some time now\u200a\u2014\u200atoday\u200a\u2014\u200ato plan, create, and test your own recovery protocol, you can be sure that one day soon, you\u2019ll thank yourself.<\/p>\n\n\n\n<p><em>You can find much more technology content by <\/em><a href=\"https:\/\/bootstrap-it.com\/davidclinton\" rel=\"noreferrer noopener\" target=\"_blank\"><em>David Clinton through is website.<\/em><\/a><em> In particular, you might enjoy his new book, <\/em><a href=\"https:\/\/www.amazon.com\/gp\/product\/B08HL9WQ1H\/\" rel=\"noreferrer noopener\" target=\"_blank\"><em>Keeping Up: Backgrounders to all the big technology trends you can\u2019t afford to ignore<\/em><\/a><em>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Early one recent morning my Linux workstation failed to boot. And just like that, all my work plans for the day ground to an immediate halt. This was the Linux workstation that was host to thirty years-worth of data: The&hellip; <a href=\"https:\/\/bootstrap-it.com\/blog\/?p=421\" class=\"more-link\">Continue Reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":422,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.2.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Security and Data\u00a0Backups - Bootstrap IT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bootstrap-it.com\/blog\/?p=421\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security and Data\u00a0Backups - Bootstrap IT\" \/>\n<meta property=\"og:description\" content=\"Early one recent morning my Linux workstation failed to boot. And just like that, all my work plans for the day ground to an immediate halt. This was the Linux workstation that was host to thirty years-worth of data: The&hellip; Continue Reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bootstrap-it.com\/blog\/?p=421\" \/>\n<meta property=\"og:site_name\" content=\"Bootstrap IT\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-03T14:33:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bootstrap-it.com\/blog\/wp-content\/uploads\/backup-recovery.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"dbclin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@davidbclinton\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dbclin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/?p=421\",\"url\":\"https:\/\/bootstrap-it.com\/blog\/?p=421\",\"name\":\"IT Security and Data\u00a0Backups - Bootstrap IT\",\"isPartOf\":{\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#website\"},\"datePublished\":\"2021-01-03T14:33:20+00:00\",\"dateModified\":\"2021-01-03T14:33:20+00:00\",\"author\":{\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec\"},\"breadcrumb\":{\"@id\":\"https:\/\/bootstrap-it.com\/blog\/?p=421#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/bootstrap-it.com\/blog\/?p=421\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/?p=421#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/bootstrap-it.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security and Data\u00a0Backups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#website\",\"url\":\"https:\/\/bootstrap-it.com\/blog\/\",\"name\":\"Bootstrap IT\",\"description\":\"Learn technology using technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/bootstrap-it.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec\",\"name\":\"dbclin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g\",\"caption\":\"dbclin\"},\"sameAs\":[\"http:\/\/bootstrap-it.com\/\",\"dbclinton\",\"https:\/\/twitter.com\/davidbclinton\"],\"url\":\"https:\/\/bootstrap-it.com\/blog\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security and Data\u00a0Backups - Bootstrap IT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bootstrap-it.com\/blog\/?p=421","og_locale":"en_US","og_type":"article","og_title":"IT Security and Data\u00a0Backups - Bootstrap IT","og_description":"Early one recent morning my Linux workstation failed to boot. And just like that, all my work plans for the day ground to an immediate halt. This was the Linux workstation that was host to thirty years-worth of data: The&hellip; Continue Reading &rarr;","og_url":"https:\/\/bootstrap-it.com\/blog\/?p=421","og_site_name":"Bootstrap IT","article_published_time":"2021-01-03T14:33:20+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/bootstrap-it.com\/blog\/wp-content\/uploads\/backup-recovery.jpg","type":"image\/jpeg"}],"author":"dbclin","twitter_card":"summary_large_image","twitter_creator":"@davidbclinton","twitter_misc":{"Written by":"dbclin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/bootstrap-it.com\/blog\/?p=421","url":"https:\/\/bootstrap-it.com\/blog\/?p=421","name":"IT Security and Data\u00a0Backups - Bootstrap IT","isPartOf":{"@id":"https:\/\/bootstrap-it.com\/blog\/#website"},"datePublished":"2021-01-03T14:33:20+00:00","dateModified":"2021-01-03T14:33:20+00:00","author":{"@id":"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec"},"breadcrumb":{"@id":"https:\/\/bootstrap-it.com\/blog\/?p=421#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bootstrap-it.com\/blog\/?p=421"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/bootstrap-it.com\/blog\/?p=421#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bootstrap-it.com\/blog"},{"@type":"ListItem","position":2,"name":"IT Security and Data\u00a0Backups"}]},{"@type":"WebSite","@id":"https:\/\/bootstrap-it.com\/blog\/#website","url":"https:\/\/bootstrap-it.com\/blog\/","name":"Bootstrap IT","description":"Learn technology using technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bootstrap-it.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/ae0fb1d5b3b01558b92b6426d77766ec","name":"dbclin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bootstrap-it.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a93785d437350478a7f1dfcbec58d26bc28e0124e405179acbe1b4325c09f90a?s=96&d=mm&r=g","caption":"dbclin"},"sameAs":["http:\/\/bootstrap-it.com\/","dbclinton","https:\/\/twitter.com\/davidbclinton"],"url":"https:\/\/bootstrap-it.com\/blog\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=421"}],"version-history":[{"count":1,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/421\/revisions"}],"predecessor-version":[{"id":423,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/421\/revisions\/423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=\/wp\/v2\/media\/422"}],"wp:attachment":[{"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bootstrap-it.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}