Interviewer<\/strong>\u00a0\u2013\u00a0John Gilroy \u2013 Host, Federal Tech Talk Podcast from the Federal News Network<\/p>\n Interviewee<\/strong>\u00a0\u2013 Chris Bayne \u2013 Infrascale, Chief Solution Architect<\/p>\n John Gilroy, host of the\u00a0Federal Tech Talk Podcast<\/a> sat down with Chris Bayne, Chief Solution Architect at Infrascale to discuss how businesses should protect their laptops and desktops using an endpoint backup and recovery solution. During the interview, Chris defines endpoints, describes endpoint backup, and discusses why endpoint backup is important for businesses and business risk managers \u2013 especially given the increase in remote work environments and the looming threat of ransomware.<\/p>\n John Gilroy<\/em>: \u00a0Hi Chris. It is a pleasure to meet you and thank you for taking the time to speak with me. With the current pandemic and the increase in work-from-home employees, there has been a lot of discussion about endpoint protection. Please help me understand.\u00a0 What is an endpoint?<\/p>\n Chris Bayne:<\/em>\u00a0Thank you, and that is a good question. Simply put, an endpoint is any device that is physically at the \u201cendpoint\u201d of a network \u2013 I.e. a device that communicates back and forth on the network to which it is connected. Laptops, desktops, mobile phones, tablets, servers, and virtual machines can all be considered endpoints.<\/p>\n With workforces becoming more mobile and users connecting to corporate networks from endpoint devices all over the world, data is everywhere. Companies need to protect this data, even when it resides outside the four walls of an office building. Due to the increase in remote work environments and the proliferation of endpoint devices, any endpoint represents a vector for cybercriminals, where attackers could execute code and exploit the vulnerability of whatever protection the endpoint may or may not have. \u00a0In addition, the data on these endpoint devices such as Android and iOS phones\/tablets, Windows and MAC desktops\/laptops, or\/and Windows servers, must adhere to more stringent corporate retention requirements.<\/p>\n John Gilroy:<\/em>\u00a0 Thank you for defining endpoints. \u00a0Now help me understand what endpoint backup is?<\/p>\n Chris Bayne:<\/em>\u00a0The\u00a0SANS Institute<\/u><\/a>, the most trusted and largest source of information security training and certification in the world, recently found that 44% of respondents admitted that one or more of their endpoints had been compromised in the past 2 years. The risk associated with the rapid rise in connected endpoint devices has highlighted the critical need to protect important endpoint data. \u00a0Forward thinking organizations are adopting solutions to address this risk, such as deploying an endpoint backup solution.<\/p>\n Endpoint backup solutions enable the transmission of data from an endpoint \u2014 whether Android and iOS phones\/tablets, Windows and MAC desktops\/laptops, or Windows servers \u2014 to the cloud for safekeeping. These solutions then provide restoration of that data to help protect businesses against lost information due to malicious or accidental deletion, solve for insufficient device data retention policies, detect, and\/or prevent cybersecurity threats including ransomware attacks.<\/p>\n John Gilroy:<\/em>\u00a0 Why is endpoint backup so important and what is driving the increased interest in endpoint backup?<\/p>\n Chris Bayne:<\/em>\u00a0\u00a0Let\u2019s start with two givens:<\/p>\n With a given of data proliferation, the ugly trend is:\u00a0 bad guys are paying attention and using new vectors of attack on endpoints and remote workers \u2013 via malware and ransomware.<\/p>\n By all indications, it appears that remote work is here to stay, and it\u2019s not a passing trend that will go away when society reopens. It is a new way of life for businesses and their employees, and it is, therefore, very important that they have a secure, easy to configure, and easy to manage endpoint protection solution in place.\u00a0 The pandemic has certainly brought that all to light.<\/p>\n The large increase in work-from-home environments and increased use of BYOD (bring-your-own-device) incorporate work has had a significant impact on IT departments. IT departments have a lot less security control over off-site devices, and the infrastructure protecting those endpoints. Unfortunately, the bad actors know this, as seen by the almost 400% growth in ransomware over the last two years. During a ransomware attack, malware encrypts a victim\u2019s files, and then payment is demanded to restore access to the victim\u2019s data. Research shows<\/a>\u00a0that every 14 seconds a business falls victim to a ransomware attack, and that 60% of SMBs close within six months of being a victim of a cybersecurity breach.<\/p>\n John Gilroy:<\/em>\u00a0 These trends are very interesting. Can you provide an example of a business that was impacted by ransomware, and how they responded?<\/p>\n Chris Bayne:<\/em>\u00a0Absolutely. One of our MSP partners provides a point-of-sale solution to their end customers. Five of their customers were impacted by ransomware attacks within a couple of months of each other. Of those five customers, three had deployed the Infrascale Cloud Backup (ICB) endpoint backup solution, and two were running a competitor\u2019s solution. From the Infrascale backups, the three ICB customers were able to restore their data very quickly from backups taken prior to infection, and their business was back to full, pre-infected productivity within hours! The customers that were\u00a0not\u00a0<\/em>running the Infrascale solution were down and unable to process credit card transactions for\u00a0several days<\/em>! This downtime resulted in significant lost revenue. Based on a recent\u00a0Infrascale survey<\/a>,\u00a0conducted\u00a0with over 500 C-level SMB executives, the average per hour downtime cost for an SMB customers is between $20,000 and $50,000.\u00a0 Thus, each ICB customer saved an estimated $320,000 to $800,000 in potential costs by deploying an effective and reliable endpoint backup solution.<\/p>\n John Gilroy:<\/em>\u00a0 Please tell me more about your Infrascale solution for endpoint backup and recovery<\/p>\n Chris Bayne:<\/em>\u00a0Infrascale Cloud Backup (ICB) is our direct-to-cloud endpoint backup solution that protects business devices including laptops and desktops \u2013 as well as servers such as Microsoft Exchange and SQL databases. ICB provides simple backup, fast restore, and protection (detection and mitigation) from ransomware for their endpoints. Optionally, it can also support Windows bare-metal systems on virtual and physical machines. There are three foundational elements that set\u2019s ICB apart as a cloud endpoint backup solution:<\/p>\n Our goal is to arm IT administrators with robust ransomware detection, monitoring, and management tools \u2014 while still providing end-customers with an easy-to-use and robust backup solution. With just a few clicks, it can be up and running on a Windows, Mac, IOS, or Android device.\u00a0 ICB protects the most critical data, including files and folders, SQL databases, Exchange data files, and QuickBooks and other accounting files. Equally as important, it makes recovery and the restoration of the critical data and business processes fast and easy \u2013 both for end-users and for administrators.<\/p>\n The ICB ransomware detection capabilities identify when an attack occurs, so you know the optimal recovery point. In addition, Infrascale Cloud Backup keeps an unlimited number of versions of the files that we are protecting. Therefore, if data corruption occurs, you will be able to quickly restore your data. The ICB management tools are designed to help administrators and IT managers. A single-pane-of-glass management interface enables customers to remotely manage, remotely restore data, build policies and deployment rules, as well as manage reporting and alerting to monitor backup operations. ICB also provides granular monitoring and automated reporting \u2013 as well as integration with Remote Monitoring and Management (RMM)\/Professional Services Automation (PSA).<\/p>\n John Gilroy:<\/em>\u00a0Chris, this interview has been great, and I really appreciate your time. How do I find out more about Infrascale Cloud Backup?<\/p>\n Chris Bayne:<\/em>\u00a0The best place to get more information about Infrascale Cloud Backup is from the\u00a0Infrascale Cloud Backup\u00a0<\/a>product page. \u00a0I also recommend watching our live-streamed video recording from\u00a0Cloud Field Day 8<\/a>\u00a0and\/or a visit our\u00a0YouTube<\/a>\u00a0channel. Lastly, the\u00a0Infrascale documentation portal<\/a>\u00a0provides a wealth of information on our endpoint backup solution \u2013 or you can\u00a0contact a Infrascale sales representative<\/a>\u00a0for more information and to schedule a demo.<\/p>\n","protected":false},"excerpt":{"rendered":" Published on August 06, 2020 | By Infrascale How to Protect Laptops and Desktops Using Endpoint Backup\u00a0 Interviewer\u00a0\u2013\u00a0John Gilroy \u2013 Host, Federal Tech Talk Podcast from the Federal News Network Interviewee\u00a0\u2013 Chris Bayne \u2013 Infrascale, Chief Solution Architect A Conversation about Endpoint Backup with Chris Bayne, from Infrascale John Gilroy, host of the\u00a0Federal Tech Talk […]<\/p>\n","protected":false},"author":6753,"featured_media":23702,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[194],"tags":[196,195],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/posts\/23699"}],"collection":[{"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/users\/6753"}],"replies":[{"embeddable":true,"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/comments?post=23699"}],"version-history":[{"count":1,"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/posts\/23699\/revisions"}],"predecessor-version":[{"id":23701,"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/posts\/23699\/revisions\/23701"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/media\/23702"}],"wp:attachment":[{"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/media?parent=23699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/categories?post=23699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/asdafrica.com\/wp-json\/wp\/v2\/tags?post=23699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}A Conversation about Endpoint Backup with Chris Bayne, from Infrascale<\/strong><\/h4>\n
What is an Endpoint?<\/strong><\/h4>\n
What is Endpoint Backup?<\/strong><\/h4>\n
Why is Endpoint Backup Important?<\/strong><\/h4>\n
\n
Endpoint Backup: A Ransomware Case Study<\/strong><\/h4>\n
What is Infrascale Cloud Backup (ICB)?<\/strong><\/h4>\n
\n
How can I find out more about Infrascale Cloud Backup?<\/strong><\/h4>\n