A hacker cannot corrupt or steal what they cannot access. The air-gap solution is created when a tape cartridge is secured in offline storage as this is a medium that is not connected to the internet or network in any way. The air-gap backup topic has brought tape-based technology back into focus as a solid solution to protect against cybercrime. IBM is the leading tape storage vendor in the industry and has over 2x the market capture of any vendor. slower time to restore, high capex and it being an older technology). Conversely, there are some drawbacks to magnetic tape as a backup medium (i.e. Other reasons are scalability, cost effectiveness and longevity. Studies have shown that magnetic tape can last for up to 30 years where hard drives on the average are roughly five years. This strategy simply means having three copies of the data, two copies that are local but on different storage mediums (IE: DASD, VTS or magnetic tape) and one copy that is offsite and disconnected from the network and internet.Īs old school as magnetic tape might be, it’s really one of the preferred methods as far as one of the copies for the 3-2-1 strategy because it’s reliable. With immutability, the data cannot be altered in any way. The key is multiple copies, in some causes up to a ridiculous 500 copies, and immutability. As part of this solution, backup and recovery software is employed to back up multiple copies. When the methodology of air gap is added to this backup strategy, a copy of that data is not remotely accessible thus creating the concept of air gapping. This has been around for a long time and is a very effective approach. Today, many corporations and organizations employ a backup and recovery strategy known as 3-2-1. Thus, if the data has no connectivity with the internet or a LAN, it prevents the data from being attacked and this avoids corruption from hacking. An air-gap backup and recovery strategy is all about ensuring, at any point in time, that at least one copy of an organization’s data is disconnected, offline and unavailable for access. ![]() One of the ways to provide this protection is by implementing an air-gap backup environment. Much of corporate data today needs to be protected via data compliancy regulations and standards. ![]() Data is the life blood of any organization cybercriminals seek to exploit data from human as well as security vulnerabilities inherent to the software or hardware structures. It’s changing the way business is conducted to maintain data integrity and protection from theft. Cybercrime is a prevalent topic in today’s news.
0 Comments
Leave a Reply. |