Protecting business-critical data in a virtual world

Philip Bridge, President at Ontrack, talks to us about the unfortunate reality of rising cyberattacks causing data loss in virtual systems and the steps we can put in place to prevent our businesses becoming victims to these attacks.

An unfortunate reality


Data loss is fast becoming an unfortunate reality for anyone who manages virtual systems. The sad truth, according to Europol, is that the frequency of cyberattacks has never been higher. Unscrupulous criminals across Europe are abusing the unrest that has arisen over the coronavirus as an excuse to target their victims. In particular, there has been a significant rise in the number of phishing mails containing the words corona or COVID-19. One such example is a spoof email purporting to come from the National Institute for Public Health, that claims to contain important information about the virus. However, be warned. If you open the attachment, not only will your computer be infected with ransomware, but there is the potential that your backup system could also be erased.

Lately, we are seeing more and more data recovery cases emerging where backup applications have been erased by cyberattacks. These are often virtual machine (VMs) backup files. This is because organisations are increasingly running multiple VMs on one physical server, rather than using the separate servers of old. Moreover, modern hypervisors make the configuring and maintaining of physical servers far less complicated. Although sometimes the data from backup files and storage systems can be saved, it is often not clear how long the cybercriminal has had access to the system. As a result, organisations cannot rely on backups to restore their vital data. So, what can be done to circumvent the issue?

Common causes of data loss


Our own data shows that – in addition to ransomware – human error, hardware malfunction and RAID issues are the most common cause of data loss on VMs. Sad but true. Damage and data loss are often a result of simple human error. This could include patches with programming errors from under pressure developers, updates without an offline backup, poorly planned implementation of new company-wide software, accidentally overwriting or formatting a storage medium, damage to the core database of integration problems between disparate systems.

The hardware problems faced by virtual systems are almost the same as with physical systems. Think of faulty drives, faulty controllers, faulty server components and power problems. However, RAID damage is a much bigger challenge for VMs because of the very nature of virtualisation. RAID controllers are responsible for assigning all information to the many disks available. However, if a RAID configuration becomes corrupt, files cannot be simply rebuilt. Rather, when that happens, the interconnectedness of multiple systems may lead to significant data loss and long downtime.

Measures to take


With the consequences potentially causing serious data loss to business-critical data (and leading to the likely heavy fines from regulators) it is wise to take measures that can prevent such incidents. Firstly, it is important that organisations recognise that virtualisation and VMs are not flawless. The reality is that they can become defective just as quickly as other legacy storage options. Therefore, before creating a virtual environment for sensitive applications, think about which solution best fits the specific needs of your organisation.


Read More: 10 Tips to Working Remotely


Secondly, do not combine virtualisation solutions. Using multiple virtualisation solutions in the same environment can increase the risk of data loss exponentially. Adding too many layers of complexity can be very risky and makes the data recovery process time consuming for even a seasoned pro. Therefore, it is better to keep your virtualisation simple and stay with one solution within one environment.

Thirdly, always back up and take snapshots of your changes. No exceptions. Since advanced persistent threats (APTs) are showing up more and more, a good backup rotation scheme is vital. I would advise to make multiple backups. Then don’t forget to save them to another physical location (whether that be a local server, hard drive or tape) or in the Cloud. Always provide an airgap so that a hacker cannot access the network during backup. Also, think carefully about the right backup software for your virtual environment so that it can support you in your endevours. There are several backup software solutions on the market. Some can be used with both VMware and HyperV solutions. Probably the most important factor to consider when choosing your backup software is how much time it takes to recover VMs from the backup.

If, not when


Although virtualisation can undoubtably save time and eliminate complexity for users, VM files can still be lost or damaged. Data loss is a reality for anyone who manages virtual systems. It is, therefore, essential that the IT department is fully aware of the ins and outs of their systems and has a specific plan on how to respond to an incident. It should never be considered an if, but a when. In this way, they can consult a specialist within seconds who can perform adjustments or repairs at the file system level, so that the data that the business relies on can be quickly accessed again.


Philip Bridge

Philip Bridge, President of Ontrack. Ontrack understands data; it draws on its expert engineers and R&D facilities to solve customers data management challenges at different stages of the data lifecycle.

What is a User Journey

Erin Lanahan • 19th April 2024

User journey mapping is the compass guiding businesses to customer-centric success. By meticulously tracing the steps users take when interacting with products or services, businesses gain profound insights into user needs and behaviors. Understanding users’ emotions and preferences at each touchpoint enables the creation of tailored experiences that resonate deeply. Through strategic segmentation, persona-driven design,...

From Shadow IT to Shadow AI

Mark Molyneux • 16th April 2024

Mark Molyneux, EMEA CTO from Cohesity, explains the challenges this development brings with it and why, despite all the enthusiasm, companies should not repeat old mistakes from the early cloud era.

Fixing the Public Sector IT Debacle

Mark Grindey • 11th April 2024

Public sector IT services are no longer fit for purpose. Constant security breaches. Unacceptable downtime. Endemic over-spending. Delays in vital service innovation that would reduce costs and improve citizen experience.

Best of tech to meet at VivaTech in May

Viva Technology • 10th April 2024

A veritable crossroads for business and innovation, VivaTech once again promises to show why it has become an unmissable stop on the international business calendar. With its expanding global reach and emphasis on crucial themes like AI, sustainable tech, and mobility, VivaTech stands as the premier destination for decoding emerging trends and assessing their economic...

Enabling “Farm to Fork” efficiency between supermarkets & producers

Neil Baker • 03rd April 2024

Today, consumers across the UK are facing a cost of living crisis. As a result, many retailers and supermarkets are striving to keep their costs down, so that they can avoid passing these onto shoppers. Within this, one area that is increasingly under scrutiny for many organisations surrounds how to improve supply chain efficiency. This...

Addressing Regulatory Compliance in Government-Owned, Single-Use Devices

Nadav Avni • 26th March 2024

Corporate-owned single-use (COSU) devices, also known as dedicated devices, make work easier for businesses and many government agencies. They’re powerful smart devices that fulfil a single purpose. Think smart tablets used for inventory tracking, information kiosks, ATMs, or digital displays. But, in a government setting, these devices fall under strict regulatory compliance standards.

Advantages of Cloud-based CAD Solutions for Modern Designers

Marius Marcus • 22nd March 2024

Say goodbye to the days of clunky desktop software chaining us to specific desks. Instead, we’re stepping into a new era fueled by cloud CAD solutions. These game-changing tools not only offer designers unmatched flexibility but also foster collaboration and efficiency like never before!