Intelligent CIO APAC Issue 09 | Page 83

FINAL WORD at least two different devices , with at least one of these copies being stored in the cloud .
The ‘ one ’ copy in the 3-2-1 strategy is arguably the most critical , therefore , it needs to be ultra-resilient . There are numerous forms of media where this copy of data can be stored securely , consider tape media , immutable backups in S3 or S3-compatible object storage , air-gapped and offline media , or Softwareas-a-Service for backup and Disaster Recovery .
The 3-2-1 strategy can almost always guarantee an organization ’ s data can be recovered in the case of a breach . This ensures minimal impact to Business Continuity , customer confidence and trust . It is also cost effective , as it does not require an organization to purchase any additional hardware to manage its data .
Get the entire business on board
After years of finetuning attacks , cybercriminals have conjured elaborate and creative ways to target organizations . They are aware of the weakest links within an organization and have the know-how to exploit them . While many IT departments can spot a hacker from a mile away , not all areas of a business are always educated on security best practice – making them prime targets for opportunist hackers .
So , while it is imperative that the IT department is across any threats to security , it is important that the wider organization , especially those contributing on endpoint devices , have been given
Ensuring watertight endpoint security is one of the biggest challenges facing IT teams and getting it right could be do or die for Aussie businesses .
www . intelligentcio . com INTELLIGENTCIO APAC 83