Warning: Undefined array key "login_id" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 36

Warning: Undefined array key "md5_hash" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 37

Warning: Undefined array key "tran_mode" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 40

Warning: Undefined array key "debug" in /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php on line 41

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723

Warning: Cannot modify header information - headers already sent by (output started at /home/asdafhkt/public_html/wp-content/plugins/woocommerce-gateway-vcs/classes/vcs.class.php:36) in /home/asdafhkt/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1723
{"id":23699,"date":"2020-08-24T16:12:31","date_gmt":"2020-08-24T14:12:31","guid":{"rendered":"https:\/\/asdafrica.com\/?p=23699"},"modified":"2020-08-25T09:27:49","modified_gmt":"2020-08-25T07:27:49","slug":"how-to-protect-laptops-and-desktops-using-endpoint-backup","status":"publish","type":"post","link":"https:\/\/asdafrica.com\/how-to-protect-laptops-and-desktops-using-endpoint-backup\/","title":{"rendered":"How to Protect Laptops and Desktops Using Endpoint Backup"},"content":{"rendered":"
Published on August 06, 2020 | By Infrascale<\/h5>\n

How to Protect Laptops and Desktops Using Endpoint Backup\u00a0<\/strong><\/h3>\n

Interviewer<\/strong>\u00a0\u2013\u00a0John Gilroy \u2013 Host, Federal Tech Talk Podcast from the Federal News Network<\/p>\n

Interviewee<\/strong>\u00a0\u2013 Chris Bayne \u2013 Infrascale, Chief Solution Architect<\/p>\n

A Conversation about Endpoint Backup with Chris Bayne, from Infrascale<\/strong><\/h4>\n

John Gilroy, host of the\u00a0Federal Tech Talk Podcast<\/a> sat down with Chris Bayne, Chief Solution Architect at Infrascale to discuss how businesses should protect their laptops and desktops using an endpoint backup and recovery solution. During the interview, Chris defines endpoints, describes endpoint backup, and discusses why endpoint backup is important for businesses and business risk managers \u2013 especially given the increase in remote work environments and the looming threat of ransomware.<\/p>\n

What is an Endpoint?<\/strong><\/h4>\n

John Gilroy<\/em>: \u00a0Hi Chris. It is a pleasure to meet you and thank you for taking the time to speak with me. With the current pandemic and the increase in work-from-home employees, there has been a lot of discussion about endpoint protection. Please help me understand.\u00a0 What is an endpoint?<\/p>\n

Chris Bayne:<\/em>\u00a0Thank you, and that is a good question. Simply put, an endpoint is any device that is physically at the \u201cendpoint\u201d of a network \u2013 I.e. a device that communicates back and forth on the network to which it is connected. Laptops, desktops, mobile phones, tablets, servers, and virtual machines can all be considered endpoints.<\/p>\n

With workforces becoming more mobile and users connecting to corporate networks from endpoint devices all over the world, data is everywhere. Companies need to protect this data, even when it resides outside the four walls of an office building. Due to the increase in remote work environments and the proliferation of endpoint devices, any endpoint represents a vector for cybercriminals, where attackers could execute code and exploit the vulnerability of whatever protection the endpoint may or may not have. \u00a0In addition, the data on these endpoint devices such as Android and iOS phones\/tablets, Windows and MAC desktops\/laptops, or\/and Windows servers, must adhere to more stringent corporate retention requirements.<\/p>\n

What is Endpoint Backup?<\/strong><\/h4>\n

John Gilroy:<\/em>\u00a0 Thank you for defining endpoints. \u00a0Now help me understand what endpoint backup is?<\/p>\n

Chris Bayne:<\/em>\u00a0The\u00a0SANS Institute<\/u><\/a>, the most trusted and largest source of information security training and certification in the world, recently found that 44% of respondents admitted that one or more of their endpoints had been compromised in the past 2 years. The risk associated with the rapid rise in connected endpoint devices has highlighted the critical need to protect important endpoint data. \u00a0Forward thinking organizations are adopting solutions to address this risk, such as deploying an endpoint backup solution.<\/p>\n

Endpoint backup solutions enable the transmission of data from an endpoint \u2014 whether Android and iOS phones\/tablets, Windows and MAC desktops\/laptops, or Windows servers \u2014 to the cloud for safekeeping. These solutions then provide restoration of that data to help protect businesses against lost information due to malicious or accidental deletion, solve for insufficient device data retention policies, detect, and\/or prevent cybersecurity threats including ransomware attacks.<\/p>\n

Why is Endpoint Backup Important?<\/strong><\/h4>\n

John Gilroy:<\/em>\u00a0 Why is endpoint backup so important and what is driving the increased interest in endpoint backup?<\/p>\n

Chris Bayne:<\/em>\u00a0\u00a0Let\u2019s start with two givens:<\/p>\n

    \n
  1. Data is Mobile, Data is Everywhere:\u00a0<\/strong>With workforces becoming more mobile and users connecting to corporate networks from endpoint devices all over the world,\u00a0data is everywhere<\/u><\/em>. Companies need to protect this data, even when it resides outside the four walls of an office building.<\/li>\n
  2. Backup is Good:\u00a0<\/strong>Why?\u00a0 Backing up data is just good sense to combat accidental or malicious deletions, hard drive crashes, lost\/stolen laptops, and retention requirements.<\/li>\n<\/ol>\n

    With a given of data proliferation, the ugly trend is:\u00a0 bad guys are paying attention and using new vectors of attack on endpoints and remote workers \u2013 via malware and ransomware.<\/p>\n

    By all indications, it appears that remote work is here to stay, and it\u2019s not a passing trend that will go away when society reopens. It is a new way of life for businesses and their employees, and it is, therefore, very important that they have a secure, easy to configure, and easy to manage endpoint protection solution in place.\u00a0 The pandemic has certainly brought that all to light.<\/p>\n

    The large increase in work-from-home environments and increased use of BYOD (bring-your-own-device) incorporate work has had a significant impact on IT departments. IT departments have a lot less security control over off-site devices, and the infrastructure protecting those endpoints. Unfortunately, the bad actors know this, as seen by the almost 400% growth in ransomware over the last two years. During a ransomware attack, malware encrypts a victim\u2019s files, and then payment is demanded to restore access to the victim\u2019s data. Research shows<\/a>\u00a0that every 14 seconds a business falls victim to a ransomware attack, and that 60% of SMBs close within six months of being a victim of a cybersecurity breach.<\/p>\n

    Endpoint Backup: A Ransomware Case Study<\/strong><\/h4>\n

    John Gilroy:<\/em>\u00a0 These trends are very interesting. Can you provide an example of a business that was impacted by ransomware, and how they responded?<\/p>\n

    Chris Bayne:<\/em>\u00a0Absolutely. One of our MSP partners provides a point-of-sale solution to their end customers. Five of their customers were impacted by ransomware attacks within a couple of months of each other. Of those five customers, three had deployed the Infrascale Cloud Backup (ICB) endpoint backup solution, and two were running a competitor\u2019s solution. From the Infrascale backups, the three ICB customers were able to restore their data very quickly from backups taken prior to infection, and their business was back to full, pre-infected productivity within hours! The customers that were\u00a0not\u00a0<\/em>running the Infrascale solution were down and unable to process credit card transactions for\u00a0several days<\/em>! This downtime resulted in significant lost revenue. Based on a recent\u00a0Infrascale survey<\/a>,\u00a0conducted\u00a0with over 500 C-level SMB executives, the average per hour downtime cost for an SMB customers is between $20,000 and $50,000.\u00a0 Thus, each ICB customer saved an estimated $320,000 to $800,000 in potential costs by deploying an effective and reliable endpoint backup solution.<\/p>\n

    What is Infrascale Cloud Backup (ICB)?<\/strong><\/h4>\n

    John Gilroy:<\/em>\u00a0 Please tell me more about your Infrascale solution for endpoint backup and recovery<\/p>\n

    Chris Bayne:<\/em>\u00a0Infrascale Cloud Backup (ICB) is our direct-to-cloud endpoint backup solution that protects business devices including laptops and desktops \u2013 as well as servers such as Microsoft Exchange and SQL databases. ICB provides simple backup, fast restore, and protection (detection and mitigation) from ransomware for their endpoints. Optionally, it can also support Windows bare-metal systems on virtual and physical machines. There are three foundational elements that set\u2019s ICB apart as a cloud endpoint backup solution:<\/p>\n