{"id":3730,"date":"2025-11-05T12:07:13","date_gmt":"2025-11-05T12:07:13","guid":{"rendered":"https:\/\/demoprojects.xyz\/constor\/?p=3730"},"modified":"2025-11-05T12:11:34","modified_gmt":"2025-11-05T12:11:34","slug":"how-secure-is-your-data","status":"publish","type":"post","link":"https:\/\/demoprojects.xyz\/constor\/how-secure-is-your-data\/","title":{"rendered":"How secure is your data?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3730\" class=\"elementor elementor-3730\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5748cd0 blog_cont e-flex e-con-boxed e-con e-parent\" data-id=\"5748cd0\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e52f362 elementor-widget elementor-widget-text-editor\" data-id=\"6e52f362\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c347f46 elementor-widget elementor-widget-heading\" data-id=\"c347f46\" data-element_type=\"widget\" data-widget_type=\"heading.default\"><div class=\"elementor-widget-container\"><div class=\"gdlr-core-pbf-element\"><div class=\"gdlr-core-title-item gdlr-core-item-pdb clearfix gdlr-core-left-align gdlr-core-title-item-caption-bottom gdlr-core-item-pdlr\"><p>I have been thinking for some time that I need to write a blog about how to protect data against Ransomware attacks and just like those customers who think \u201cI\u2019ll do that one day\u201d and then it\u2019s too late I\u2019ve found the time to write it. As the world is gripped with the COVID-19 crisis, hackers and criminals are using this to their advantage. They target organisations by pushing compromised software onto systems often by watching the patch releases from suppliers like Microsoft and reverse engineering the patch to expose the vulnerability.<\/p><p>It\u2019s just not customers who are being targeted these days, major vendors are being targeted as well and it can happen to anyone regardless of the size of the company. The cost of a security incident can be in the thousands, millions or scale to billions in some instances, an amount even the largest global businesses can\u2019t sustain.<\/p><p>I have heard the phrases \u201cBackup is boring\u201d, \u201cBackup is just an insurance\u201d, \u201cData is protected using snapshots\u201d, \u201cWe understand the risks of not having a backup\u201d and others numerous times. With increase in hacks, backing up and protecting data is more important than ever. The best form of defense against a security incident is a good backup, but what if your backups get encrypted and held for ransom? What is the cost of not having a reliable backup?<\/p><p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone wp-image-3732 size-full\" src=\"https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/cyber-security.jpg\" alt=\"\" width=\"900\" height=\"200\" srcset=\"https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/cyber-security.jpg 900w, https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/cyber-security-300x67.jpg 300w, https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/cyber-security-768x171.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p><p>Backups are supposed to be a last resort to get a business running again. I always stress to customers we should never consider backups an afterthought it shouldn\u2019t be nice to have incase of an accidental deletion of a file, a human error or a virtual machine\/server corruption. The ability to recover from known \u201cgood\u201d backup and successfully restoring business services will protect you against having to paying any ransom.<\/p><p>Modern-day ransomware almost always scans for and targets the local backups during the initial phases of infection. If the ransomware can encrypt the backups or delete backups before the protected servers get encrypted, the higher the chances the hacker has of collecting the ransom so you can recover the files. This makes protecting the backups ever more important, as it has become the definitive line in the sand between paying a ransom and recovering the files or losing everything.<br \/>Now the question from anyone reading this far is how do we (Constor Solutions) help our customers when it comes to protecting data.<\/p><p>We ensure that when we transform our customers infrastructure:<\/p><ul><li>They have a secure backup in place<\/li><li>Backup data is protected across sites (available in at least two locations)<\/li><li>Data is encrypted at source and inflight<\/li><li>Test restoring from a backup frequently<\/li><li>Protect the backup data in cloud as a third copy<\/li><li>Provide a fully air-gapped solutions as part of our service for the cyber protection<\/li><\/ul><p><img decoding=\"async\" class=\"alignnone wp-image-3731 size-full\" src=\"https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/sparkle-cybersecurity.jpg\" alt=\"\" width=\"900\" height=\"200\" srcset=\"https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/sparkle-cybersecurity.jpg 900w, https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/sparkle-cybersecurity-300x67.jpg 300w, https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/sparkle-cybersecurity-768x171.jpg 768w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/p><p>The best from of protection against a cyber-attack is to have an offsite air-gapped backup solution. An air-gapped backup solution is an offline copy of the backup data which will be completely isolated from your network. A segregated copy which will ensure that the data is clean and less likely to be impacted on a compromised network. This significantly increases the speed of recovery and effectively eliminates the need to pay a ransom. In addition to the air-gapped solution having a copy of the backup data in a public cloud will ensure that the services can be restored and available off-site for business continuity whilst the incident is investigated.<\/p><p>As a company ourselves we practice what we preach, having a copy of the backup data in the cloud allows us to:<\/p><ul><li>Dramatically reduce downtime in case of an incident by spinning up the services in the cloud<\/li><li>Restoring the critical services in the cloud while the remediation is done at the original site(s)<\/li><li>Our IT team can concentrate on remediation of the compromised network while the production services and users can access resources\/apps over the internet<\/li><li>Minimise the business impact while the issues are investigated<\/li><li>Data is the lifeblood of almost every company, having a secure data protection solution and policy should place as much emphasis on this as you put on your production SAN.<\/li><\/ul><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-377bac5 elementor-widget elementor-widget-elementskit-team\" data-id=\"377bac5\" data-element_type=\"widget\" data-widget_type=\"elementskit-team.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ekit-wid-con\">\t\t\t\t\t\t\t\t\n\t\t<div class=\"profile-card elementor-animation- text-left ekit-team-style-default\">\n\t\t\t\t\t\t\t<a aria-label=\"profile\" href=\"javascript:void(0)\" data-mfp-src=\"#ekit_team_modal_377bac5_3730\" class=\"ekit-team-popup\">\n\t\t\t\n\t\t\t\t<div class=\"profile-header ekit-team-img ekit-img-overlay ekit-team-img-block\"  data-toggle=\"modal\" data-target=\"ekit_team_modal_#377bac5_3730\" >\n\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/suman.png\" class=\"attachment-full size-full wp-image-3735\" alt=\"\" \/>\t\t\t\t<\/div><!-- .profile-header END -->\n\t\t\t\t\t\t\t<\/a>\n\t\t\t\n\n\t\t\t\t<div class=\"profile-body\">\n\t\t\t\t\t\n\t\t\t\t\t<h2 class=\"profile-title\">\n\t\t\t\t\t\t\t\t\t\t\t<a aria-label=\"profile\" href=\"javascript:void(0)\" data-mfp-src=\"#ekit_team_modal_377bac5_3730\" class=\"ekit-team-popup\">\n\t\t\t\t\t\tSuman Ramesh Babu\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t<p class=\"profile-designation\">Technical Director<\/p>\n\t\t\t\t\t\t\t\t\t<\/div><!-- .profile-body END -->\n\n\t\t\t\t\t\t\t\t\t<div class=\"profile-footer\">\n\t\t\t\t\t\t<ul class=\"ekit-team-social-list\">\n\t\t\t<li class=\"elementor-repeater-item-03b5cf5\">\n\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/sumanrameshbabu\/\" aria-label=\"Linkedin\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/li>\n\t<\/ul>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\n\t\t\t\t\t<div class=\"zoom-anim-dialog mfp-hide elementskit-team-popup team-popup-id-377bac5\" id=\"ekit_team_modal_377bac5_3730\" tabindex=\"-1\" role=\"dialog\" aria-hidden=\"true\">\n\t\t\t\t<div class=\"modal-dialog modal-dialog-centered\" role=\"document\">\n\t\t\t\t\t<div class=\"modal-content\">\n\t\t\t\t\t\t<button type=\"button\" class=\"ekit-team-modal-close\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-times\" viewBox=\"0 0 352 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M242.72 256l100.07-100.07c12.28-12.28 12.28-32.19 0-44.48l-22.24-22.24c-12.28-12.28-32.19-12.28-44.48 0L176 189.28 75.93 89.21c-12.28-12.28-32.19-12.28-44.48 0L9.21 111.45c-12.28 12.28-12.28 32.19 0 44.48L109.28 256 9.21 356.07c-12.28 12.28-12.28 32.19 0 44.48l22.24 22.24c12.28 12.28 32.2 12.28 44.48 0L176 322.72l100.07 100.07c12.28 12.28 32.2 12.28 44.48 0l22.24-22.24c12.28-12.28 12.28-32.19 0-44.48L242.72 256z\"><\/path><\/svg>\t\t\t\t\t\t<\/button>\n\n\t\t\t\t\t\t<div class=\"modal-body\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"ekit-team-modal-img\">\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/demoprojects.xyz\/constor\/wp-content\/uploads\/2025\/11\/suman.png\" class=\"attachment-full size-full wp-image-3735\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<div class=\"ekit-team-modal-info has-img\">\n\t\t\t\t\t\t\t\t<h2 class=\"ekit-team-modal-title\">Suman Ramesh Babu<\/h2>\n\t\t\t\t\t\t\t\t<p class=\"ekit-team-modal-position\">Technical Director<\/p>\n\n\t\t\t\t\t\t\t\t<div class=\"ekit-team-modal-content\">\n\t\t\t\t\t\t\t\t\tA small river named Duden flows by their place and supplies it with the necessary\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<ul class=\"ekit-team-modal-list\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><strong>Phone:<\/strong><a href=\"tel:+1 (859) 254-6589\">+1 (859) 254-6589<\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><strong>Email:<\/strong><a href=\"mailto:info@example.com\">info@example.com<\/a><\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\t<ul class=\"ekit-team-social-list\">\n\t\t\t<li class=\"elementor-repeater-item-03b5cf5\">\n\t\t\t<a href=\"https:\/\/www.linkedin.com\/in\/sumanrameshbabu\/\" aria-label=\"Linkedin\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fab-linkedin\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 32H31.9C14.3 32 0 46.5 0 64.3v383.4C0 465.5 14.3 480 31.9 480H416c17.6 0 32-14.5 32-32.3V64.3c0-17.8-14.4-32.3-32-32.3zM135.4 416H69V202.2h66.5V416zm-33.2-243c-21.3 0-38.5-17.3-38.5-38.5S80.9 96 102.2 96c21.2 0 38.5 17.3 38.5 38.5 0 21.3-17.2 38.5-38.5 38.5zm282.1 243h-66.4V312c0-24.8-.5-56.7-34.5-56.7-34.6 0-39.9 27-39.9 54.9V416h-66.4V202.2h63.7v29.2h.9c8.9-16.8 30.6-34.5 62.9-34.5 67.2 0 79.7 44.3 79.7 101.9V416z\"><\/path><\/svg>\t\t\t<\/a>\n\t\t<\/li>\n\t<\/ul>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>I have been thinking for some time that I need to write a blog about how to protect data against [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3733,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"disabled","ast-main-header-display":"disabled","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"disabled","site-post-title":"disabled","ast-breadcrumbs-content":"disabled","ast-featured-img":"disabled","footer-sml-layout":"disabled","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[],"class_list":["post-3730","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"_links":{"self":[{"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/posts\/3730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/comments?post=3730"}],"version-history":[{"count":4,"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/posts\/3730\/revisions"}],"predecessor-version":[{"id":3738,"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/posts\/3730\/revisions\/3738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/media\/3733"}],"wp:attachment":[{"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/media?parent=3730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/categories?post=3730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/demoprojects.xyz\/constor\/wp-json\/wp\/v2\/tags?post=3730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}