Zero-Trust Environments Are an Agency’s First Defense
For better or for worse, Vega says, agencies need to look at their cybersecurity stance as being constantly under attack.
“We are moving toward a zero-trust environment. You have to assume a perpetual state of compromise,” says Vega. “You not only need to be prepared for a cyberattack, but you also need a way to validate all internal communications and transactions.”
When an agency takes this approach, it most likely employs several upfront security technologies such as firewalls and authentication tools. A data backup and restoration product is the final backstop in the attack chain, allowing an agency to quickly recover data if it’s compromised.
While these solutions are effective, in practice, Vega understands the difficulty of maintaining a zero-trust environment.
“I’ve seen it firsthand,” he says. “A lot of technology managers are overwhelmed with day-to-day tasks. They need something that works 100 percent of the time and provides very fast backup and restoration.”
EXPLORE: How cybersecurity maturity assessments can support security efficiency.
All Data Is Important and Should Be Prioritized
Enterprises and agencies alike typically rank the importance of their data so, in an emergency, they can restore the most important data first.
“For smaller agencies, ranking data isn’t that difficult,” Vega says. “But for larger agencies, there can be more risk in prioritizing some data and not others. Everyone needs to agree on what is important.”
In addition, the difference between “high priority” and “normal” data is shrinking.
IT leaders surveyed in the Veeam 2022 Data Protection Trends Report say that in the case of data loss, 55 percent of “high priority” data and 49 percent of “normal” data needed to be restored within an hour. According to the report authors, this not only means that all data matters, but also means that backups alone aren’t enough.
To prevent significant downtime, a backup solution needs to include more frequent activities such as snapshots and replication.