<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Backup and Disaster Recovery Archives - CIC Networks</title>
	<atom:link href="https://cicnetworks.com/category/backup/feed/" rel="self" type="application/rss+xml" />
	<link>https://cicnetworks.com/category/backup/</link>
	<description></description>
	<lastBuildDate>Wed, 06 May 2020 19:49:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">163102273</site>	<item>
		<title>Loss of Data: Causes and Prevention</title>
		<link>https://cicnetworks.com/loss-of-data-causes-and-prevention/</link>
		
		<dc:creator><![CDATA[cicnetworks]]></dc:creator>
		<pubDate>Fri, 06 Mar 2020 22:13:00 +0000</pubDate>
				<category><![CDATA[Backup and Disaster Recovery]]></category>
		<guid isPermaLink="false">https://cicnetworks.com/?p=273</guid>

					<description><![CDATA[<p>The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due. We enjoy seeing loved ones face-to-face on our computer screens. We can access and print our extremely sensitive records from government and financial websites [&#8230;]</p>
<p>The post <a href="https://cicnetworks.com/loss-of-data-causes-and-prevention/">Loss of Data: Causes and Prevention</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper thrv_text_element"><p style="text-align: justify;">The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due. We enjoy seeing loved ones face-to-face on our computer screens. We can access and print our extremely sensitive records from government and financial websites in a matter of minutes instead of waiting for the mail for days. The time and resources that technology saves are invaluable, but this convenience has a very ugly side. This convenience brings costs, which could include irreparable financial, professional, and social damage. The technology that is designed to make life easier can also wreak havoc when criminals use it to breach secured, personal information. So how do we tame this beast called ‘breach of data security’?</p></div><div class="thrv_wrapper thrv_text_element"><p style="text-align: justify;"><strong>Background:</strong> To look for a solution, we first need to understand how serious this problem could be. Breaches in data security and loss of data could spell imminent demise for many small companies. According to the National Archives &amp; Records Administration in Washington, 93% of companies that have experienced data loss resulting in ten or more days of downtime have filed for bankruptcy within a year. 50% wasted no time and filed for bankruptcy immediately and 43% that have no data recovery and business continuity plan go out of business following a major data loss. In the past, small- to medium-businesses (SMBs) thought that data security problems were reserved for large corporations, but cyber criminals are finding out that SMBs are more complacent in securing their data thus making themselves easier targets. More importantly, the lightly guarded SMBs can provide backdoor access to the large entities hackers really want to hit. Fewer than half of the SMBs surveyed said they back up their data every week. Only 23% have a plan for data backup and business continuity. That is why the number of cyber attacks on SMBs has doubled in the recent past.</p><p style="text-align: justify;"><strong>Causes of lost data:</strong> Loss of data can be attributed to two factors.</p><ul class=""><li style="text-align: justify;"><strong>Breach of data security:</strong> As we discussed above, theft is the main reason for loss of data. Hackers can get into networks by installing their own software hidden inside emails and other Web content. They take over PCs and networks and then access files containing personal information. They can then use that information to empty people’s bank accounts and exploit data for other purposes.</li><li style="text-align: justify;"><strong>Human error and employee negligence:</strong> Humans still have to instruct technology to perform as desired. Examples of negligence include unattended computer systems, weak passwords, opening email attachments or clicking the hyperlinks in spam and visiting restricted websites. Fortunately, this type of loss of data is easily preventable, but it is just as detrimental and can bring your business to a halt. Downtimes can be very harmful to your business continuity and revenue.</li></ul><p><strong>Five ways to minimize data loss:</strong></p><ol class=""><li style="text-align: justify;"><strong>Enforce data security:</strong> More than technology, this is the management of human behavior. SMB management must communicate data protection policy to the entire staff and see to it that the policy is adhered to. Rules and policy must be enforced very strictly regarding the use of personal devices. Tell employees to create passwords that are hard to crack and change them frequently.</li><li style="text-align: justify;"><strong>Stress the consequences:</strong> Rules are only good if there are consequences for not following them. Define what those consequences mean for the both the individual and the organization.</li><li style="text-align: justify;"><strong>Mobile device management:</strong> Mobile devices may be the weakest link in data security. “Mobile device management” refers to processes that are designed for the control of mobile devices used within the company. Devices tapping into company systems are identified and monitored 24/7. They are proactively secured via specified password policies, encryption settings, etc. Lost or stolen devices can be located and either locked or stripped of all data.</li><li style="text-align: justify;"><strong>Snapshots:</strong> Fully backing up large amounts of data can be a lengthy process. The data being backed up is also vulnerable to file corruption from read errors. This means sizeable chunks of data may not be stored in the backup and be unavailable in the event of a full restoration. This can be avoided by backing up critical data as snapshots.</li><li style="text-align: justify;"><strong>Cloud replication and disaster recovery services</strong>: For SMBs who consider data backup to be too costly, time consuming and complex there is an answer. The Cloud provides a cost-effective, automated off-site data replication process that provides continuous availability to business-critical data and applications. Cloud replication can often get systems back online in under an hour following a data loss.</li></ol><p>To conclude our conversation, it is very important to understand the causes and consequences of data loss. Be proactive and minimize the likelihood of a data breach and data loss, so you can stay in business without interruption. Make sure you have a solid data recovery and business continuity plan so you don’t become another statistic about small firms who didn’t make it.</p></div><div class="tcb_flag" style="display: none"></div>
<p>The post <a href="https://cicnetworks.com/loss-of-data-causes-and-prevention/">Loss of Data: Causes and Prevention</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">273</post-id>	</item>
		<item>
		<title>Be Proactive: How to Avoid Potential Network Failures</title>
		<link>https://cicnetworks.com/be-proactive-how-to-avoid-potential-network-failures-2/</link>
		
		<dc:creator><![CDATA[cicnetworks]]></dc:creator>
		<pubDate>Thu, 21 Nov 2019 14:43:00 +0000</pubDate>
				<category><![CDATA[Backup and Disaster Recovery]]></category>
		<guid isPermaLink="false">https://cicnetworks.com/?p=300</guid>

					<description><![CDATA[<p>For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don&#8217;t have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the least damage if failure occurs. [message type=&#8221;info&#8221; class=&#8221;&#8221;] SMBs [&#8230;]</p>
<p>The post <a href="https://cicnetworks.com/be-proactive-how-to-avoid-potential-network-failures-2/">Be Proactive: How to Avoid Potential Network Failures</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="thrv_wrapper tve_wp_shortcode">
<div class="tve_shortcode_raw" style="display: none"></div>
<div class="tve_shortcode_rendered">
<p style="text-align: left;">For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don&#8217;t have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the least damage if failure occurs.</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">[message type=&#8221;info&#8221; class=&#8221;&#8221;] SMBs must be proactive in recognizing the eventuality of a cyber-attack or human error that can cause data loss and disrupt business continuity. [/message]</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">This is what needs to be done to help prevent a potential failure.</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;"><strong>Be prepared:</strong> Being proactive is an essential step for preparation against a disaster. There are two ways to determine how to best prepare to prevent potential failure of your infrastructure. First, you need to identify the weaknesses throughout your systems, and second, determine how you are going to eliminate those weaknesses and protect your network.</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;"><strong>Identify the weaknesses:</strong> Determine how and why your system could fail. Examine all aspects of your hardware and software. Assess all the internal and external factors that could contribute to failure of your networks. Here are some questions you need to know the answers to:</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p>Does customer access and/or employee productivity often stall because of downed systems? In these situations, how quickly is your IT support able to minimize the damage?</p>
<p>Can you say with certainty that your business will be back on line and be able to access lost data with minimal disruption in case of failure?</p>
<p>Your critical data should be backed up frequently. The data on personal laptops, iPads and other mobile devices should also be backed up. Are all these steps being taken, and how often?</p>
<p>Are all backups stored in a location off-site and are they quickly accessible in the event of corruption, fire or flood?</p>
<p>Are you using any custom-made software? Can it be reinstalled and updated when needed?</p>
<p>Are your systems truly protected from hackers and viruses? Do you change passwords when employees leave the company?</p>
<p>How often do you test your backup processes?</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;">The answers to all these questions should give you a clear picture of your network&#8217;s ability to survive in case of a catastrophe.</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;"><strong>Here are five steps that you can take to protect your networks</strong></p>
<p style="text-align: left;">
<p style="text-align: left;">
<p><strong>Backup files every day:</strong> There are many businesses that never backup data. Only 23% of SMBs are backing up their data daily, and only 50% are doing it weekly. Several issues can result in loss of data. You should backup data every day.</p>
<p><strong>Check backup procedures regularly:</strong> Don&#8217;t find out accidentally that your backup system is not working properly. By then it could be too late. It may seem like your data is being backed up normally but check frequently if it is backing up the way it should be. In this age of BYOD make sure all employees are also following procedures to backup data on their laptops, iPads , etc.</p>
<p><strong>Make sure virus protection and firewalls are always enabled:</strong> Many companies either don&#8217;t have virus protection installed or it is disabled. That renders their networks vulnerable to virus attacks from emails, spam and data downloads. Corrupted files will not only bring your systems down, but they can spread to your customers and email contacts. That will spell disaster for your reputation. Hackers are always looking for unprotected and open ports online that they can attack with malicious code or files. That can cause permanent data loss.</p>
<p><strong>Monitor server drives:</strong> Dangerously full server drives can cause many problems, ranging from program crashes to sluggish email delivery. Servers should be monitored and maintained regularly to avoid these problems.</p>
<p><strong>Check built-in logs:</strong> Frequent reviews of built-in logs can reveal small issues. You will have a chance to prevent them from becoming bigger, harder-to- manage problems that can bring your systems down.</p>
<p style="text-align: left;">
<p style="text-align: left;">
<p style="text-align: left;"><strong>Summary:</strong> We now know IT system failures have very serious consequences for SMBs. We also know that they can avoid such failures by being proactive. Many SMBs are now turning to cloud-based services and virtualized backup solutions to mitigate downtime and network failures. Virtualization and cloud computing have enabled cost-efficient business continuity by allowing entire servers to be grouped into one software bundle or virtual server &#8211; this includes all data, operating systems, applications, and patches. This simplifies the backup process and allows for quick data restoration when needed.</p>
</p>
</div>
</div>
<div class="tcb_flag" style="display: none"></div>
<p>The post <a href="https://cicnetworks.com/be-proactive-how-to-avoid-potential-network-failures-2/">Be Proactive: How to Avoid Potential Network Failures</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">300</post-id>	</item>
		<item>
		<title>Everyday Human Error Can Affect Data Protection</title>
		<link>https://cicnetworks.com/everyday-human-error-can-affect-data-protection/</link>
		
		<dc:creator><![CDATA[cicnetworks]]></dc:creator>
		<pubDate>Sun, 21 Apr 2019 21:49:51 +0000</pubDate>
				<category><![CDATA[Backup and Disaster Recovery]]></category>
		<guid isPermaLink="false">https://cicnetworks.com/?p=288</guid>

					<description><![CDATA[<p>Are you under the impression that data protection is all about putting up firewalls to protect against evil cyber attacks? Some of the biggest sources of data loss include sloppiness, human error, and just plain forgetfulness. What we do every day that leave us vulnerable? Passwords. Old or easy passwords are a good first example. [&#8230;]</p>
<p>The post <a href="https://cicnetworks.com/everyday-human-error-can-affect-data-protection/">Everyday Human Error Can Affect Data Protection</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="aligncenter" src="http://cmap.amp.vg/img/bkfdab7r9ct8z/thumb-everyday-human-error-can-affect-data-protection.jpg" alt="Everyday Human Error Can Affect Data Protection" width="595" height="371" /></p>
<p>Are you under the impression that data protection is all about putting up firewalls to protect against evil cyber attacks? Some of the biggest sources of data loss include sloppiness, human error, and just plain forgetfulness.</p>
<h3>What we do every day that leave us vulnerable?</h3>
<p><strong>Passwords. </strong>Old or easy passwords are a good first example. Employees set up simple passwords that are easy to crack. More importantly, employees may share passwords, and many often fail to create new ones on a frequent basis. Both of these represent critical breakdowns of good data protection practices.</p>
<p><strong>Emails. </strong>Another significant problem caused by bad judgement is the tendency of people to open phishing scams. Most everyone now knows about the Nigerian who wants to send money to your bank account, but many new scams come along everyday and people fall for them. This is such a serious source of virus infection that some companies now deliberately send out their own phishing email to teach workers not to open anything from an unknown source. (The employee who opens one of these gets a pop up screen that tells them they&#8217;ve been tricked and then offers guidelines for identifying bad emails.)</p>
<p><strong>Browsing the Web. </strong>Bad websites. Yes, everyone has policies about internet use at work, but that doesn&#8217;t mean people pay attention and don&#8217;t visit places they shouldn&#8217;t. Most significantly, a lot of those &#8220;sites they shouldn&#8217;t visit&#8221; are far more likely to be infected than CNN, Ebay or Amazon!</p>
<p><strong>Employee training. </strong> Your employees remain the first line of defense against cyber criminals. Teaching them proper data hygiene is important. Every firm should have ongoing training that identifies possible risks that employees face.</p>
<p><strong data-rich-text-format-boundary="true"> Losing Your Belongings</strong>. And finally there is just old-fashioned forgetfulness. Phones left on a bar stool. Or the bus. Sigh. Therefore, backups or <a href="https://cicnetworks.com/business-continuity/">business continuity</a> are a necessity.</p>
<p>The post <a href="https://cicnetworks.com/everyday-human-error-can-affect-data-protection/">Everyday Human Error Can Affect Data Protection</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">288</post-id>	</item>
		<item>
		<title>Disaster Recovery Plans: Do You Have One?</title>
		<link>https://cicnetworks.com/disaster-recovery-plans-do-you-have-one/</link>
		
		<dc:creator><![CDATA[cicnetworks]]></dc:creator>
		<pubDate>Wed, 10 Apr 2019 21:44:07 +0000</pubDate>
				<category><![CDATA[Backup and Disaster Recovery]]></category>
		<guid isPermaLink="false">https://cicnetworks.com/?p=286</guid>

					<description><![CDATA[<p>Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven&#8217;t the resources to address such &#8220;unthinkable.&#8221; Data Loss Can Cause You Shut Down If your business was down for 1-2 days or more, what costs would you incur? Lost revenues and lost [&#8230;]</p>
<p>The post <a href="https://cicnetworks.com/disaster-recovery-plans-do-you-have-one/">Disaster Recovery Plans: Do You Have One?</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="mainContainer" style="position: relative; top: 0px; left: 0px; margin: auto; border: 0px none #CCCCCC; width: 578px; height: 1184px; background-color: #ffffff; ; overflow: hidden; -moz-box-sizing: border-box; box-sizing: border-box;">
<div id="Object_preview_mmED_11" class="clstextobject infly-text-object-default-style theme-object theme-" style="width: 578px; height: 1184px; top: 0px; left: 0px; z-index: 102; display: block; position: absolute; ; overflow: hidden; -moz-box-sizing: border-box; line-height: normal; box-sizing: border-box; border: 1px none #CCCCCC;">
<div class="" style="overflow: hidden; top: 0px; left: 0px;">
<div class="txtObjContent" style="width: 100%;">
<div style="width: 578px !important; margin: 0 auto !important; background: #FFF !important; padding-bottom: 30px !important;">
<div style="width: 536px !important; margin: 0 auto !important;">
<p style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important; padding-top: 20px !important;">Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven&#8217;t the resources to address such &#8220;unthinkable.&#8221;</p>
<h3>Data Loss Can Cause You Shut Down</h3>
<p style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important; padding-top: 20px !important;">If your business was down for 1-2 days or more, what costs would you incur?</p>
<ol>
<li style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important;">Lost revenues and lost productivity. These are obvious. You won&#8217;t make the money that you would have if you remained open. This is especially true if you provide a service. Services are inherently tied to time, and time cannot be re-created. Sure, you can work extra hours next week, but it won&#8217;t be a service provided at the time it was expected. However, even if you provide a product that can be purchased next week instead of today, a customer didn&#8217;t get it when they most wanted or needed it.
<p style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important; padding-top: 20px !important;">There are other far more serious consequences of business downtime than just unsold goods and services. There are the intangibles that can&#8217;t be so easily measured but have long-term consequences.</p>
</li>
<li style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important; padding-top: 20px !important;">Helping the competition – You give your competition a real edge. Present clients and potential ones may go to a competitor while you are down. Not all will return. Your competitors now have ammunition against you to use in sales pitches.</li>
<li style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important; padding-top: 20px !important;">Employee frustration – Employees will carry the burden of the extra hours and stress of helping get things back together. That can lead to a lot of frustration, which if things don&#8217;t get back to normal quickly, can damage long-term productivity. Most importantly, it can damage the respect they have for management (that means you). In general, they will recognize that you didn&#8217;t have the foresight and wisdom to anticipate the need to create disaster recovery and continuity plans. How can that not damage their trust and support for the company and you?</li>
<li style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important; padding-top: 20px !important;">Negative brand reputation –Your customers will also wonder how you couldn&#8217;t have cared enough to make plans to handle trouble. Think of the negative way a customer sees it. The event suggests a company that doesn&#8217;t think ahead. A client is not &#8220;off base&#8221; to feel angry that you didnt care enough to make plans to support him if a disaster hit. Also, if you can&#8217;t handle disasters well, what else aren&#8217;t you handling properly?
<p style="font-family: Arial, Helvetica, sans-serif !important; font-size: 12px !important; color: #000000 !important; line-height: 20px !important; padding-top: 20px !important;"><strong>These are just a few of the reasons everyone needs to consider <a href="https://cicnetworks.com/business-continuity/">disaster recovery</a>. To learn more, <a href="https://cicnetworks.com/contact/">contact us</a> and see our e-guide &#8220;<a href="http://cmap.amp.vg/auto2/bkskmt9dmr7px/d5w0x70e593ti/cp9e9bzsbcqxz" target="_blank" rel="noopener noreferrer">Staying Alive: The Definitive Guide to Business Continuity and Disaster Recovery for Small Businesses</a>&#8220;.</strong></p>
</li>
</ol>
</div>
</div>
</div>
<div id="graphics11" style="font-size: 0px;"></div>
</div>
<div id="objectCustomProperties"></div>
</div>
</div>
<p>The post <a href="https://cicnetworks.com/disaster-recovery-plans-do-you-have-one/">Disaster Recovery Plans: Do You Have One?</a> appeared first on <a href="https://cicnetworks.com">CIC Networks</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">286</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Page Caching using Disk: Enhanced 

Served from: cicnetworks.com @ 2026-05-05 10:45:19 by W3 Total Cache
-->