Data Loss Scenarios and their Recovery Solutions.

 

TL;DR? Just call Sales Team 6 at 775-329-5139 🙂

 

A quick review of the most likely scenarios where you will experience data loss, corruption or theft and some solutions to prevent or recover, will help you check and plan for your vulnerabilities. Ask yourself if these scenarios could happen to you and then ask yourself if you have solutions like the ones listed to solve it.  As you apply your situation to the worksheet table below rate yourself.  Select your Exposure level 1 to 5 (5 worst) and your Risk level 1 to 5 (5 worst) for each row, and the total will be calculated at the bottom. Compare your total with the results table at the end to determine your overall need improvement an consider your weaknesses you rated yourself on.

Scenario Category Solutions Pitfalls Solution Type Exposure X Risk = Priority
Primary storage physical failure. Loss
  • RAID 1,5,6,10, etc.
  • Enough redundancy? High-Rely offers multi-level redundant storage systems.
  • Short enough rebuild window? High-Rely has features designed to mitigate the importance of rebuild time like DeltaSync and SpeedSeed.
  • Available replacement parts? High-Rely uses many commonly available IT parts like standard desktop SATA hard drives and ATX power supplies.
Prevention Exp:

Risk:

Priority:

Primary storage server failure. Loss
  • On premise backup server.
  • Off-site backup server or VM.
  • BackUp current? High-Rely systems have monitoring mechanisms like NetSwap Dashboard which can be used to warn of missing or out of date backups.
  • Viable performance?  High-Rely systems use performant components, SATA connected drives and available RAID enhancements allowing for viable performance for most situations.
Recovery Exp:

Risk:

Priority:

Server hacked. Corruption
  • Fix hack.
  • Restore from local backup.
  • Restore from cloud backup.
  • Did fixing, fix everything? High-Rely’s Highly-Removable Drive systems are invulnerable to remote attacks when they removed. Chances are your off-site backup is clean if the hack was caught soon enough.
  • Recent enough backup? Most High-Rely systems are performant enough to keep frequent incremental updates.
  • Restoration time too long? Most Highly-Removable Drives are interchangeable with other chassis for Network or Direct attached.  Direct attached can be much faster than Network attached or Cloud. SpeedSeed is also an option.
  • Is it a complete image? High-Rely systems can warn when disk space is low or other issues that may cause an incomplete image.  But best practice is to perform test restores to confirm everything is working.
  • Archive not deep enough to cut back before the hack? The depth of archives stored on Highly-Removable Drives is only limited by the number of Highly-Removable Drives you chose to have.
  • Paper trail insufficient to fill the data gap between the restore point and current state?
Recovery Exp:

Risk:

Priority:

CryptoWall, Cryptolocker or other data perverting virus attack. Corruption
  • Restore from archive before the infection.
  • Restoration time too long? *Discussed above.
  • Archive not deep enough to restore before the attack? *Discussed above.
  • Paper trail insufficient to fill the data gap between the restore point and current state?
  • Is the virus still present?
  • Is the way the virus got on the system still capable of reinfecting? High-Rely’s NetSwap Backup NAS systems can be managed from a master Dashboard allowing you to quickly remotely reconfigure security parameters on all your NetSwaps.
Recovery Exp:

Risk:

Priority:

Location lost – fire, flood, other. Loss
  • Bring up synced VM.
  • Restore off-site backup to new hardware.
  • Offsite backup data available?
  • Probably the paper trail is gone too, is the backup data current enough?
  • Will the new host workstation/server operate with your restored data (is it compatible)?
  • Is the retarget process going to be fast enough?
  • Will your users/customers have access?High-Rely’s NetSwap Backup NAS systems can be managed from a master Dashboard allowing you to quickly remotely reconfigure security and connection parameters on all your NetSwaps.
Recovery Exp:

Risk:

Priority:

A high-level, full-access, disgruntled IT employee deletes or destroys everything including backups. Loss
  • Restore from off-site copies.
  • Search recycle bins.
  • Check for file system roll-back features or programs
  • Check your IT provider for backups.
  • Restore from your BLACK backup copy.*
  • Threaten or offer ransom to vindictive employee – he possibly has a copy.
  • Buy a close competitor.
  • File your business loss insurance claim, bankruptcy, start all over.
  • How smart is he? High-level, full access employee may have every angle covered including off-sites. Highly-Removable Drives in conjunction with our AMT and DeltaSync functions enable you to remove a complete copy of live data in under 10 seconds.  This allows for the easy creation of Black copies.*
  • Does your file system have recycle bin or roll-backs enabled?
  • Was your disk space too low and thus hasn’t preserved enough rollback or recycle bin data?
  • *Did anyone else know about your *Black copy? A Black copy is a copy in which the knowledge of must compartmentalized so that only the top key person or owner has access to it.
  • Is your Black copy too far out of date? There should be a plan for regular updates.
  • Black copy incomplete or unreadable? The black copy should be verified regularly.
  • Insurance doesn’t cover your situation. Make sure your insurance policy is up to date with value of your data and system.
  • Insurance coverage amount insufficient to rebuild business.
  • Do you have a backup IT provider?
Recovery Exp:

Risk:

Priority:

Total Priority

Analysis Results:

Priority Exposure Notes
125 to 150
You’re completely exposed.
You basically have no backup system.
100 to 124
You’re greatly at risk.
Possibly you’re only prepared for hardware failure and not other possibilities.
75 to 99
You’re unprotected in too many ways and places.
Consider tightening up a little more.
50 to 74
You’re moderately protected.
Better than most businesses but still have too many points exposed.
25 to 49
You’re very well protected.
Staying here requires vigilance and you still have some things you could improve.
6 to 24
You’re in a great place, keep working hard to stay here.
You’re probability of total loss is very low.

Most of the vulnerabilities listed above can be mitigated or eliminated by using cloud + Highly-Removable Drive(s) hybrid NAS like the ones made by us.

Click here to find out more about Highly-Removable Drives with Cloud and High-Rely’s NAS Advantages or click the “request more information” button for a human response.

TL;DR? Just call Sales Team 6 at 775-329-5139 🙂