Avoid these 6 critical mistakes during disaster recovery

Disasters like fires and malware attacks can strike your business at any time. When they do, it’s crucial to have a disaster recovery (DR) plan in place to mitigate their impact on your business. Unfortunately, many businesses make critical mistakes that can significantly slow down the disaster recovery process. In this blog post, we’ll take a look at six of these blunders and how you can avoid them.

1. You don’t have a DR plan

If your business doesn’t have a DR plan, it will be difficult to recover from incidents. Your recovery teams won’t know what to do and will make last-minute assumptions, resulting in a longer and costlier recovery process.

By having a proper DR plan, you can better assess the scenarios that threaten your operations and how to combat them. Your plan provides specific recovery instructions so teams know what to do when disaster strikes. What’s more, it identifies technology solutions that facilitate the recovery process like cloud backups and provides directions on how they should be used.

2. The DR plan is outdated

Over time, the information in your DR plan may become outdated and key personnel may leave the company. You may also replace your IT systems and face newly emerged cyberthreats

For instance, if your DR plan didn’t include the threat of ransomware and such a malicious program infected your system, you may encounter issues recovering from the incident.

By regularly reviewing and updating your DR plan, you ensure that it’s always relevant and effective. Updated DR plans and briefings also guarantee your team is well versed in the latest disaster recovery procedures and know how to handle disruptive incidents.

3. You don’t test the plan

Some organizations make the mistake of creating a DR plan and then just setting it aside. By not testing the plan, no one knows if it will actually work and your team will not know what to do in the event of a disaster.

It’s vital to test your DR plan annually to determine the effectiveness of proposed procedures. One way to do this is by simulating recovery tests. For instance, you could stage a malware attack to see how well teams respond to it. You should also practice using technologies that support recovery procedures to see if they actually work as expected.

4. Your backups are stored in only one basket

Backups are a fundamental part of disaster recovery, as these ensure that you can recover your files and applications in case of data loss. However, storing all your backups in a single location is ill-advised because you can lose all your files if the backup facility becomes inaccessible or compromised.

Avoid this issue by implementing hybrid backups, which combine an on-site backup with replicated cloud backups. This way, if your on-site backup is destroyed or inaccessible, you can access another copy in another location.

5. Not getting everyone involved

It’s a big mistake to assume that only IT departments are responsible for disaster recovery. Instead, everyone on your team from senior management to rank-and-file employees should be aware of the security risks facing your business and play an active role in mitigating them.

Start by training your staff regularly in cybersecurity best practices. For example, teach them to be critical of every email or website they open and to refrain from downloading suspicious files. You can also simulate a cyberattack to test your employees’ reaction times. This will help you identify your teams’ strengths and areas for improvement to prepare your business for future cyberattacks. 

6. Not having a disaster recovery partner

Choosing the right disaster recovery partner can spell the difference between success and failure when recovering from disruptive events. Without one, your business will have to take responsibility for data restoration, systems replacement, and other critical processes that are beyond your expertise. And that’s all too much to take on alone 

Fortunately, reliable managed IT services providers like NetWize have extensive knowledge of disaster recovery. We can provide you with 24/7 technical support during disasters and help restore your operations quickly. Give us a call today

How to protect your Microsoft 365 environment

Microsoft 365 is one of the most reliable cloud platforms available for businesses today. It offers best-in-class productivity and communication tools while protecting your company’s data with multiple layers of security. Microsoft heavily fortifies its cloud platform with advanced threat protection systems, firewalls, physical security measures, and regular data backups. 

However, despite these protections, you and your staff must also take precautions to keep your valuable assets safe. Here are five best practices for securing your Microsoft 365 environment:

1. Implement multifactor authentication 

Multifactor authentication (MFA) is a security process in which users must provide more than just their passwords to prove their identity. This could be a one-time passcode generated by an authentication app, a USB security key, or a biometric scan. With MFA, you can prevent access to your company’s data even if cybercriminals somehow manage to get a hold of your passwords.

To enable MFA on Microsoft 365, you need to sign in to your company’s Azure Active Directory admin center. Then, go to Properties > Manage Security defaults, click Yes next to the enable security defaults option, and then press Save. The next time users try to log in to their accounts, they’ll be prompted to set up their secondary authentication method. For a more streamlined and secure login process, we highly recommend using the Microsoft Authenticator app to generate temporary passcodes on company-registered mobile devices. 

2. Limit access privileges

Not all employees need to have access to your entire Microsoft 365 environment. Graphic designers, for example, don’t need to see your company’s financial records and system administrator settings. In fact, giving users complete access to your Microsoft 365 environment increases your company’s risk exposure if cybercriminals manage to compromise just one account.   

To mitigate this risk, you must set access restrictions according to the user’s role in the company. With Microsoft 365 Admin center, you can appoint roles to different teams and determine what type of content they’re permitted to access. And with Microsoft Intune, you can limit access privileges based on a user’s location and device. 

You should also create dedicated admin accounts that are equipped with MFA and the highest levels of security. This ensures that only a select few IT administrators have the permission to access and configure Microsoft 365 settings. 

3. Enable email security features

Microsoft 365 comes with several email security features that prevent various types of phishing attacks. For starters, you can enable anti-phishing policies that block untrustworthy email domains, especially those impersonating a legitimate email address. Microsoft 365 Defender also features Safe Links, a feature that traces the real destination of URL links embedded in emails and documents. If you click on a suspected malicious link, Safe Links will redirect you to a harmless webpage warning you of the potential threat. 

What’s more, Microsoft 365 Defender offers Safe Attachments, which can detect and filter emails with malware-laced attachments. This security feature analyzes email attachments in isolated virtual environments to see how they behave without harming the user’s system. When Safe Attachments detects behaviors indicative of malware (e.g., unusually high traffic volume or ransomware encryption), it instantly blocks those inbound emails from reaching company inboxes. 

To enable these email security features, simply sign in as an admin to the Microsoft 365 Defender portal and go to Email & collaboration > Policies & Rules > Threat policies

4. Establish data loss prevention policies

Microsoft 365 prevents users from sharing classified information to anyone outside the organization using data loss prevention (DLP) policies. By enabling DLP policies, Microsoft 365 instantly scours your systems for sensitive content like financial records, proprietary documents, and Social Security numbers. From there, you can decide the protective action Microsoft 365 will take. For example, you can completely block outbound sharing of personal data or encrypt the data when it’s sent to the recipient. These significantly reduce the likelihood of internal leaks and data breaches in your company.    

5. Train users to develop good security habits

While technical solutions are important in safeguarding your Microsoft 365 environment, you shouldn’t overlook the human factor of cybersecurity. No matter how strong your defenses are, reckless employees can easily undermine your efforts by setting weak passwords or falling for phishing scams. This is why you need to regularly train your employees on security best practices. 

You can start by teaching employees to take precautions with every website, email, and link they see online. If an unsolicited email is urging employees to click on links, download attachments, or share sensitive information, they should immediately flag it as a phishing scam and report it to the IT department. It’s also important to teach employees the importance of setting strong and unique passwords as well as avoiding public Wi-Fi networks. Building these habits require quarterly training seminars, practical exercises, and impromptu phishing simulations to test everyone’s security awareness. 

If you need expert assistance with securing your Microsoft 365 environment, NetWize is the solution. Our consultants can help you customize your system to safeguard it from even the most prolific cybercriminals. Call us today at 801-747-3200.

© 2020 NetWize, Inc | Privacy Policy