Book demo
11 March 2021

Podcast: Will the IBM elephant dance again?

Over the last 18 months, a lot has been going on at IBM.

It has purchased Red Hat, plans to spin out its managed services business and promoted new leadership. A generational shift is underway to position itself as the leader in open hybrid cloud.

Are these decisions too bold or are they too little too late? Sit back and listen, then let us know what YOU think.

Al and Rick begin by discussing IBM’s decision to essentially split the business in two, with its Global Technology Services arm due to be spun out in 2021, this is then followed by their thoughts on the acquisition of Red Hat as the engine to return the business to revenue growth. Finally, what does this mean for IBM’s overall culture and the technology platform it is building?

Learn more about
Predatar recovery assurance

03 December 2020

Five Cost-Effective Ways to Protect Your Business from a Ransomware Attack

We’ve already looked at recovering your data post-ransomware attack; plan, plan, plan and plan again. In this blog, we’ll explore five ways we can plan for and better protect against ransomware attacks. By planning and protecting, we can ensure that we lose the least amount of valuable data possible, without breaking the bank.

1. Understand the nature of ransomware

The chief problem with ransomware is that it is ever-evolving. This means that processes and systems need to be continuously reviewed and updated. However, as with most things like this, it can lead to perplexing problems that can make IT Teams feel they never get to place ransomware in the ‘Job Done Pile’. The temptation to stall can creep in, meaning there are holes in the system that can be exploited.

You can find out more about what ransomware is in this article from Expert Insights.

The nature of ransomware simply isn’t consistent, and so when businesses realise this, they can better understand the need for software and systems that can resist attacks and if attacked, better recover from them.

2. Invest in trustworthy and knowledgeable solutions early on

Because many businesses find these processes so difficult to navigate and their IT teams struggle to maintain effective management of these complex processes, it can be tempting for them to put the investment of software on the backburner. More so, the complex nature of ransomware means that when businesses do choose to invest in protection and reach out for help, they’re unsure if they are getting genuine, authentic advice or if they’re just being spun a clever sales play.

The best way around this is to seek out trusted advisors that are willing to not only help you with their service but will gladly share free knowledge with their customers in the form of excellent customer service. By sharing their first-hand experience, they can demystify the volume of information out there and tailor a solution to your unique business needs. Above all else, failing to invest in quality backup and recovery solutions early on, can – and probably will – end in botched disaster recoveries and a lot of wasted cash.

3. Utilise your resources

Irrespective of investing, there are also things you can do that cost nothing or very little that will help you in terms of shielding your backup systems. Without doing these things, your only option is to hope that your underfunded and under-loved backup setup will, by some miracle, come to life before you’re forced to pay the ransom. If, however, you hope that ransomware won’t target your backup setup; we’re here to break the bad news to you. It definitely will. So, here are a few things you can do to shield your backup set up as it stands*:

  • Use two different operating systems. Put the primary backup system on Windows and then copy the system on Linux (we’ll use Linux as an example here, but you can include AIX or any other). In simple terms: can the Ransomware attack navigate a Windows structure, it most certainly can. Can it navigate Linux as easily? Not necessarily.
  • If you have more than one domain, place the production backup system on a different domain to the Copy system. The strategy here is to put as many obstacles in the path of the attack.
  • Spread your data across different storage types. For example, Block is great for a primary source and S3 is good for a copy.

4. Making the most of IBM Storage Protect

By being an IBM Spectrum user, you’ve already invested in the right software, so make sure that you’re on the latest version. The latest versions of IBM Storage Protect work to make predictions on potential incoming attacks, making the update an invaluable asset to businesses. By pre-empting attacks, data loss is significantly reduced in the instance of an attack and can sometimes prevent a full-blown attack altogether. It’s always important to get the most out of the data protection software that you’re paying for. You can read more about making data backup and recovery technology sustainable for your business here.

On top of this feature, Storage Protect has within it a DRM File. In a nutshell, the system creates a backup file daily. You can then store this outside of your domain by email or any other method of your choice. Outside your domain is somewhere safe and secure! It’s a small task to undertake, but it holds the keys to unlock and recover your business quickly in the face of a disaster. Plus, there are no costs involved in emailing a copy of this to a safe location.

5. Stay alert and act quickly 

Our fifth and final piece of advice is to stay alert and act quickly. Don’t allow Ransomware to lie dormant so it can gain a stronghold on your data. By keeping a keen eye on things like the slowing of systems, inaccessible or corrupt files and CPU spikes, you may not be able to halt an infection entirely, but you will be able to align your damage control better by ensuring your backup is taken offline and stored safely before being infected. Always have a ‘Code Red’ plan in place. Who monitors these things? Who raises the alarm? Who acts on them quickly?

These five things will help you minimize and lessen the severity of ransomware attacks, but it pays to mind that they are limiting the cause, not preventing the effect. Always test your data recovery processes and ensure that you have invested in secure and, preferably, automated processes. The aim is to have maximum confidence that your data backup and recovery process will be quick, efficient and controllable.

*This is based on having a setup which has both a primary version and a copy version of the backup.  

 

Learn more about
Predatar recovery assurance

20 November 2020

Battening Down the Data Hatches for Black Friday

Ahh, Black Friday. It’s a plentiful day (now stretching to a full week), brimming with shiny bargains and special offers.

Every year, Black Friday comes and goes almost as suddenly as it appears. Like a thief in the night, it burns holes in our pockets and puts retailers and organisations back in the black. This year more than ever, Black Friday will play a fundamental role in aiding many businesses recovering from the adverse effects of COVID-19.

However, despite its merits, sorry looking bank accounts and bargains are not the only thing that Black Friday opens us up to. It also opens up organisations to data breaches. Take Amazon, for example. The Amazon sale for Black Friday 2018 saw a significant data breach. The details of thousands of customers were leaked just hours before the event took place. The leak was put down to an ‘inadvertent technical error’, suggesting it was Amazon’s IT team that took the hit for the breach.

Prophets or Profits?

So why do events like Black Friday leave our businesses more susceptible to cyber-attacks, hackers and data leaks like this one?

In the bustle of Black Friday, organisations big and small are often scrambling to ensure their servers can manage the onslaught of site traffic. They’re trying out new applications, forming new programmes, transferring ecommerce to the cloud; the list is endless. Actions like this, although well intended, can often leave minor – and sometimes major – gaps for data breaches.

For instance, a simple human error could be made in the rush to prepare things. It could cause the malfunctioning of a programme required to process customer data; ultimately leaving the data vulnerable, out-in-the-cold and easy for cyber criminals to gain access to.

On the other end of the spectrum, cyber criminals may directly attack less secure sites in the knowledge that Black Friday brings an abundance of opportunity to credential surf or RAM scrape.

Vigilance or Vigilante?

To combat potential breaches like these, organisations should take into account that Black Friday is simply not ‘business as usual’. Programmes and applications should be tried and tested with vigour. Data protection software should be up-to-date and functioning at full capacity with all-hands-on-deck. Extra layers of data protection may even be required. For optimal management, you may want to consider a SaaS data platform.

It also bodes well to remember, whilst customers do have a responsibility to protect their own data – organisations should be making this easier for them, not harder. Any external emails to customers should be well designed and clearly marketed, making it easier for customers to tell a real email from a fake phishing attempt. It should also be made clear what customer data may be shared and why.

So, don’t rush, be meticulous, test, test and test again. And, most importantly, happy bargain hunting!

 

Learn more about
Predatar recovery assurance

11 November 2020

Recovering from a Ransomware Attack: The road to recovering your data

In recent months, we have seen a rapid rise in ransomware attacks. Covid-19 has forced businesses to make fast changes, occasionally leaving holes in their IT systems for cybercriminals to creep through.

These attacks could be through the means of phishing, attachments, hidden links or in more direct formats like leaked passwords or guest passwords. Whatever the cause, these attacks have the potential to lay dormant for quite some time. Lying dormant allows the initial infection to take hold before spilling over and causing a noticeable event that alerts IT teams to its presence. Dormant and slow attacks allow a wider range of infection; singular computers may not only be at risk but put user ID’s – with access to multiple machines, operating systems and backup software – at risk.

Although dormant attacks are perhaps the more damaging, some attacks will be immediate and brutal, destroying as much data as possible in as little time as possible. The threat here is that IT teams don’t have enough time to scramble and halt the infection.

So, let’s say your organisation has been the victim of a ransomware attack. Now what? Where do you go from here? It might seem like there are endless possibilities and roads to go down, but one thing is clear:

You need a recovery plan

“But we already have one, why do we need another one?” The thing about ransomware attacks is that, like a real infection or virus, they change and adapt. Cybercriminals will often analyse the effectiveness of their attack methods and alter code. Organisations must understand this. They should be making a commitment to incrementally update and manage their backup and recovery processes to ensure the most effective protection of their data. Ransomware avoidance is simply is not enough; it will happen sooner rather than later. It must be followed by flexible backup and recovery plans that aim to prevent as much data loss as possible following a ransomware attack.

Let’s think back to 2017, when the infamous ransomware ‘WannaCry’, infected over 300,000 computers in 150 different countries, simply by spreading through a local network – no harmful links, no dodgy email attachments. It’s all very well the malware was eventually put a stop to but by then, data had already been compromised and cybercriminals were free to adapt the code and worsen the effects of the next planned attack.

Backup but not forgotten

It bodes well to remember that the aim of a sturdy backup and recovery plan is not to protect the perimeter. The aim of backup and recovery is to recover the overall environment, understand the level of infection and research the backup catalogues in order to find the earliest uninfected files. By promoting a culture where infection intelligence is ongoing, backup and recovery can be made into a flexible and compliant process.

The scanning processes of some backup vendors can detect locked files and directories alerting the user to the effects of ransom activities after the fact. Others can search backup images for infection signatures in an effort to avoid reseeding the environment by recovering infected backups. However, these measures really only signal how far the horse has bolted.

Take a step

Predatar uses a mixture of methods and approaches to help automate the backup and recovery process, taking the initial heat off of IT teams. Ultimately, rapidly recovering environments and ensuring that organisations have the best of their data back after disaster strikes.

For more on this topic why not watch this 20 minute presentation taken from our Control 2020 conference. It can be viewed from the Predatar You Tube channel here

 

Learn more about
Predatar recovery assurance

16 October 2020

How Compliant is your backup?

Over the last decade, organisations have really struggled to deal with the multitude of contradictory requirements for data compliance. How do you ensure that data is retained long enough but not too long when dealing with sector, geographic and internal requirements?

Deciding which regulation trumps another is a complex process. In fact, it’s best left to compliance and risk officers.

There are 2 key factors in compliance:

  1. The IT department should be the facilitator for compliance not the decision maker
    • Let Risk/Compliance decide what needs to be kept, in what condition and for how long
    • IT provision a solution to meet the requirements
  2. ALL compliance policies should be audited
    • Retention Policy should be documented
    • Changes to Policy should be reviewed and approved
    • Audit trail of changes should be taken as evidence of compliance

Backup is not Archive

When you’re dealing with long term retention, many organisations choose backup rather than content archival because of its lower cost. But, too often, we forget about the auditing of changes within the backup solution that could impact compliance.

Typically, backup administrators have the power to make changes to data retention and even delete existing backups. However, this process isn’t as smooth sailing as we’d like to think. A simple typo could delete the wrong data accidently.

Users of IBM Storage Protect have the ability to place a “legal hold” on retention sets so that data doesn’t suddenly expire when it may be needed for subpoena.

IBM Storage Protect not only has an audit trail of changes, it also has the concept of authorisation. When this is configured effectively, it requires any disruptive change to be authorised by a second admin.

Although this is a great place to start towards ensuring compliance, if 2 admins are in cahoots, it could still be difficult to prevent malicious intent.

So, what can you do about it?

Predatar’s platform gathers meta data from Storage Protect and stores it offsite for analysis. It can be configured to not only audit the activities, but also raise alerts based on customised thresholds.

The Predatar platform can be made visible to key stakeholders and risk officers. This means that alerts relating to data destruction can be reviewed by non-IT personnel and appropriate action taken in light of a breach of compliance. Predatar’s audit trail helps compliance and risk officers demonstrate sustained control over data. It shows effectiveness and efficiency.

3 Quick Steps to Success

We recommend that Storage Protect users with compliance requirements take the following steps:

  1. Upgrade to version 8.1.9 or higher
  2. Create at least 2 admins with “cmdapprover=yes” set
  3. Set commandapproval to on

Predatar gives you the tools and control you need to keep your backup compliant.

Learn more about
Predatar recovery assurance

16 October 2020

Podcast: The Canary in the Coal Mine

In this podcast, we speak to our new customer success officer, Andy Brown. We talk about why customer success for SaaS entities is so important and how it impacts their day-to-day deliverables.

We discuss the rapidly flowing river of data that is the IT industry and how IT customer service needs to be swiftly adaptable. Having the tools and skills to leap into action when things go wrong or change direction is crucial for Predatar as a SaaS platform.

We learn about how at Predatar, we take control of customer’s needs so that they can take control of their data.

 

Learn more about
Predatar recovery assurance

03 October 2020

What is an Agile Customer Experience?

Welcome to the second instalment of our customer service spotlight feature!

If you’re reading this article, it’s probable that you’re no stranger to the likes of Agile business and Agile methodology. If by chance you are an alien to software agility, you might want to take a look at the official Agile Manifesto.

In simple terms, Agile is an umbrella word for an array of methods that companies – namely software development, IT, project management and delivery focussed – can implement to adapt to changing conditions in any of the following areas:

  • Market change
  • Customer demands
  • Stakeholder requests
  • Its own accelerated timelines

Whilst customer demand is a fundamental aspect of development, customer experience can often fly under the radar as a result. At Predatar, we’re all about making the customer’s experience as smooth and supported as possible, this means that we need to be agile in our customer interactions and processes.

What does this mean?

In the same way that agile methodologies make way for controlled change in business processes, creating an agile customer experience means adapting to customer needs and support requirements. It holds us accountable to our customers and enhances responsive change.

Why does it matter?

Currently, many organisations approach customer experience in a similar fashion. That is, customers are unpredictable. Because of this, making the customer journey as regimented as possible is often a key focus. Typically, a single agent will take a single customer call, or will respond to a single email. If the agent can’t resolve the issue, the query is fed through the organisation until it hits someone that can solve it. When we look at this from an outsider’s perspective, we can see how this might benefit the organisation in terms of time-saving but it’s certainly not as easy to see how it might benefit the customer and passing something through so many hands can cause its own issues.

Think about how many times you’ve been in this position. You’re on the phone to a service provider only to be passed from team to team, supervisor to supervisor. Banging your head against a brick wall comes to mind, right? You’re bound to come off the phone and complain to someone. You might even complain directly to the company, and with today’s digital accessibility to organisations, you can do it publicly over social media. So, with that in mind, an agile customer experience is a remarkable thing that can prevent customer frustration and enhance a company’s reputation ten-fold.

How does it happen?

Simply put, it’s about having the right specialists in all the right areas. Rather than focusing on a regimented and controlled customer experience, organisations should look ahead to future problem-solving with a zoomed in focus on mapping out and categorising customer journeys. No one customer is the same, and so there is no benefit in allocating them all to the same process.

Onwards… Agile steed!

For more about customer service, check out our interview with Predatar’s customer success officer, Andy! (he’s a real superhero!). You can read the interview here.

 

 

 

 

Learn more about
Predatar recovery assurance

22 September 2020

At your service

This spotlight feature will delve into the ins and outs of what customer service means to us and why it’s so important to have it at the core of our platform. So, who better to start with than our shiny, brand-new customer success officer, Andy!

We interviewed Andy to get some top insights on customer service excellence, and you guessed it, to be a little bit nosy.

How long have you worked in customer service, Andy?
Oh… good question! *Long Pause* About 25 years… *Hearty chuckle*.

Wow. What made you choose Predatar this time round, with all of that experience behind you?
I thought it was a really exciting opportunity. The role is not only brand new to the company, but they have this real desire to grow and to add value to what they’re doing. Especially in terms of remaining customer-focused – I wanted to help them accelerate that plan.

It sounds like it’s a role that holds a lot of opportunity. What do you enjoy about being in a customer focused role?
I’ve always had a passion for helping people out, from early on in my career. Whatever role I’ve worked in, I’ve always been focused on supporting other people, be that customers or my colleagues. I’m able to build relationships really effectively and engage with the right people to deliver to expectations. That’s what it’s all about really, building relationships and not only reaching those expectations but exceeding them. Of course, it’s not just with customers. Building relationships internally really serves to indicate whether you’re the right fit for the companies’ culture. But then you need to understand the culture of the customer too, as much as you integrate yourself into the company culture. Like, what are their values? What are their behaviours?

Absolutely. I imagine that customer culture can vary quite a lot. In terms of the tech industry and data backup and recovery, what’s the difference there in the customer’s experience?
Well, it’s not like going into a supermarket! The experience isn’t over quickly, it covers an entire lifecycle. It’s ultimately building a relationship from scratch, building trust over an extended period and consistently, too! A customer should always feel the culture of the organisation from the first touch point. It’s important to be responsive and get those basics right, because those things can be so easily overlooked. It’s all about building partnerships and creating a space for trustworthy engagement.

Predatar is all about simplicity and control when it comes to the customer, how does your role fit into this?
Simplicity basically means that everything we do should be easy for customers to understand. A lot of what Predatar provides is a highly technical service, and although my role isn’t technical, the guys here are so good at simplifying things. As for control, it’s about creating that balance between giving the customer the control they need whilst ultimately being there to support and maintain that control.

Finally, Andy, what does being a data protection superhero mean to you?
Haha, well, the character I’ve been given is ‘Mr Fantastic’. I think this is such a clever approach in articulating how seriously we take what we do but in a really fun, streamlined way. It’s about giving the customer the absolute confidence to know that they’re in safe hands.

So, there we have it. An interview with Predatar’s very own Mr Fantastic, data protection superhero at your (customer) service!

Learn more about
Predatar recovery assurance

02 September 2020

Making Data Backup & Recovery Technology Sustainable

The COVID-19 pandemic has taught us that protecting our data needs to be an adjustable process. Now, more than ever, data protection is under the gun. Businesses are concerned that their standard data protection practices will not hold firm due to lack of resources and the move to digital at-home practices.

We know that investing in good data protection technology offers long-term payoff, but are we making the most out of what we’re paying for?

It can be all too easy for businesses to slip into the habit of neglecting data backup and recovery practices. We pay for it, we get it, it does its thing, right? Wrong! Like everything else revolving around technology, data management tools are continuously advancing and improving over time.

Typical backup systems tend to start small with various building blocks consisting of applications, hardware, software and admin. Let’s liken it to growing a garden. You decide to plant some roses; you water them and fertilise them. Once they grow, you think they might look nice with some sunflowers, so you do the same. Before you know it, you’ve got a big beautiful garden but it’s overgrowing, and you don’t have all of the tools to maintain it. The same goes for backup systems.

Backup and recovery assets multiply over time and need constant monitoring via IT administration teams. The mistake that many businesses make is investing money into more of these assets in order to fill in any gaps, rather than investing in tool kits that aid IT professionals and exercising their right to upgrade.

For many companies, data is tied to large systems that have been in place for donkey’s years! Whilst these systems still function technically well and conform to GDPR regulations, they might not be working in tandem with newer applications – which will also eventually become outdated. This means that companies can end up in a tangled web of different backup and recovery technologies.

As a result, companies spend millions on data backup and recovery assets. But, the cost pales in comparison to the value of the data that needs protecting. If something were to go wrong, and an outdated backup and recovery method failed to protect the company’s data, the company could be fined hundreds of millions. In 2019, British Airways was fined $230 million for a data breach!

Ultimately, companies are missing out on opportunities to reduce the amount of admin and to modernise their systems that protect this data. Continuously adding new assets rather than upgrading:

  1. Creates vulnerable points in your data protection defences (more products, more ways for data to be compromised and more ways for recovery to go wrong!)
  2. Is uneconomical for businesses to pay for several data and backup recovery products
  3. Doesn’t consider modern models of data storage, like the cloud

Simply upgrading your current backup systems to modernise the process can greatly reduce the likelihood of things going wrong, whilst remaining cost-effective. It can:

  • Improve security, protecting you from threats (think about adding encryption!)
  • Foster efficiency. Newer versions of software can reduce infrastructure costs
  • Need more space? An upgrade can bring into play cloud storage as an alternative to tape, which though inexpensive, can be cumbersome to manage

Many Predatar customers own IBM Spectrum software, paying an annual maintenance fee which includes the right to upgrade their software. It’s time to think about exercising that right.

The latest release of Storage Protect supports everything from Unix machines to virtual workloads and now container-based clusters. A single, secure home for all your data needs. It’s efficient, powerful and easily controlled.

And remember, if you don’t have time to modernise your Storage Protect system, our global network of Apex Partners can help, providing you with local expertise!

Learn more about
Predatar recovery assurance

22 June 2020

Forever in blue jeans

The outsourcing of back office processes has come in and out of fashion over the years. But just like your favourite pair of jeans it has never completely fallen out of favour. Like your trusty denim its popularity has sometimes been threatened, with the most recent threat being from Software as a Service (SaaS). With the SaaS promise of simplicity, scalability and automation why consider outsourcing if a modern software platform can do it all for you? There is a very simple answer. Outsourcing remains popular today because it has evolved. In fact, it has evolved so far beyond the scope of ‘traditional’ outsourcing that it has become disruptive!

 

Old versus new.

Traditional outsourcing has always had its feet planted in the cost reduction & improved efficiency camp. It has never really ventured too far outside these boundaries. It is because of this lack of movement that we are seeing traditional outsourcing models under threat and in serious decline. On the flip side those providers that are taking advantage of cloud scalability, automation and analytics (just like the SaaS providers) are quickly gaining market share and seeing massive growth.

 

By harnessing this modern technology, providers are delivering enhanced customer value that efficient outsourced processes and cost reduction alone could never achieve. The focus of these providers has moved from a simple lift and shift of traditional processes, to delivering upfront transformation of business processes through automation. Automation frees up the outsourcers to add additional value to customers and tackle the hard to fix issues that businesses never get time to fix alone. Businesses looking to outsource are starting to recognise that modern technology solutions can revolutionise the way they receive their outsourced service. No longer is outsourcing just about getting rid of a problem while saving some cash. Customers still expect this but they now expect a whole lot more.

 

Is cost saving enough?

Take the area of backup and recovery. Many businesses will outsource this as it is often the most cost-effective way for them to protect their data. Why go through the hassle and expense of hiring and training people up in complex tools and processes when businesses can simply chuck this over the fence to people who do this day in and day out?

 

Sure, they will save on money, stress and some of the responsibility but is that enough? If the outsourcer simply picks up where their teams left off, how do they know their backup success rates are as good as they can possibly be?

 

How do they know if they are making best use of their infrastructure and costly storage pools? How do they ensure their data protection spend and effort is apportioned correctly between their most and least valuable data sets?

 

How do they ensure that if they have a disaster they are 100% guaranteed to get their data back?

 

It is these sorts of challenges that a disruptive outsourcer will solve. In fact a good disruptive outsourcer will thrive on doing this and not see it as a hardship. This is that extra value that business will struggle to get from traditional outsourcing. It is possible because disruptive outsourcers know how to blend great SaaS-style technology with great people for maximum impact at a competitive price point.

 

Don’t be threatened. Innovate.

This is happening everywhere. In the Accounting, Payroll and Recruitment industries, it’s clear disruptive outsourcing is driving extraordinary change.. Businesses expect more than cost reduction from from outsourcing. They will turn to service providers who can help them innovate.

 

You could argue that SaaS has threatened Outsourcing. Or  like your best pair of jeans you could argue that the latest fashion trends drive the denim industry to continually innovate.

Learn more about
Predatar recovery assurance