A third of all data loss is caused by problems with backups.

Losing access to your business’s data – even temporarily – is a nightmare worthy of a horror movie.

The basic function of data backup tools is to create copies of your data and store them in a safe place. If something goes wrong, recovery tools will use these copies to restore your lost files.

So, if your business already uses backup and recovery tools, you would think your data is safe… but this isn’t necessarily true.

A new report shows that some backup tools aren’t as reliable as they should be. In fact, a third of all data losses are caused by backup-related issues. When people try to recover data, they discover it’s been lost, corrupt or was never backed up in the first place.

It’s not just corrupted backups that you should be aware of.

One of the biggest threats to businesses right now is ransomware. This is a type of malicious software (or "malware") that locks you out of your files unless you pay a ransom to regain access.

The report found that half of businesses using backup tools still ended up paying ransoms to retrieve their files, because it was faster than trying to use their own recovery tools. Even worse? Only a small number of businesses that paid ransoms were able to fully recover their data.

Backup tools are supposed to keep your data safe, so why are they unreliable for so many businesses?

Often, it’s because they haven’t been set up properly. And even when they are, they still need to be verified regularly to make sure they are still backing up your files.

Also, older backup and recovery tools can’t keep up with today’s sophisticated cyber-attacks. Ransomware will target the backup files as well as the production files to make it impossible to recover them. Backup files need to be properly encrypted and separated from the production data. Setting up and maintaining a reliable backup system is straightforward if you have been doing it for 25 years. IT experts (like us) can make sure your tools are running correctly every day. Every single day our backups are verified to ensure your system can be recovered no matter the disaster situation.

We put extra safeguards in place such as continuous data protection (CDP). CDP continuously saves changes to your files, allowing you to go back in time and restore your data as it was just before an attack or loss.

But my files are in the cloud

You may think because your files are saved in Microsoft, Google, DropBox or any number of other cloud services your files are safe, and Microsoft is taking care of the backups. This is not the case, and you still need a separate encrypted and secure backup. Whether your files are all in the cloud, on-premises or a combination of the two, backup is critical.

This is something we do for businesses like yours every day. Reach out if you are concerned about your existing backup solution or if you have any questions. Contact us at (319) 535-5350 or [email protected] to setup an appointment.

They Could Be Ransomware Scams

Picture this: You’re having a busy day at work when the phone rings. On the other end of the line is someone claiming to be from Microsoft Teams support. They sound professional, helpful even. But before you follow their instructions, ask yourself: could this be a scam?

The latest trend in cybercrime involves scammers posing as “help desk” staff to trick employees into granting access to their devices. It’s part of a larger ransomware strategy designed to lock businesses out of their own data until they cough up a hefty ransom. These attacks are devastating and growing in sophistication.

The New Face of Ransomware

Recently, a notorious cybercrime group took this scam to a whole new level. Here’s how their operation works:

  1. Flood the Inbox: First, they overwhelm an employee’s inbox with spam, making it virtually unusable.
  2. The Hero Act: Then, they swoop in with a phone call, posing as IT support ready to "fix" the problem.
  3. Gaining Access: They’ll ask the employee to install remote desktop software like AnyDesk or use built-in tools such as Windows Quick Assist.
  4. Network Infiltration: Once inside, they navigate the network, collect sensitive data, and deploy ransomware.

But it doesn’t stop there. These scammers are also leveraging Microsoft Teams to gain trust. They’ll create fake Teams accounts with usernames like “Help Desk” and domains such as “securityadminhelper.onmicrosoft.com.” Then, they send one-on-one messages to employees, claiming they need access to their devices to resolve an issue.

Why Ransomware Is a Business Nightmare

Ransomware attacks are more than just an inconvenience; they’re a direct threat to your operations, reputation, and bottom line. Here’s what’s at stake:

How to Protect Your Business

Education and vigilance are your first lines of defense. Share this information with your team and encourage a healthy skepticism toward unsolicited calls or messages. Here are a few specific steps to safeguard your business:

  1. Verify Before Trusting: Teach employees to verify any requests for software installation or access with your IT department first.
  2. Secure Microsoft Teams: If your business uses Teams, make sure it’s configured securely. Restrict external chats to trusted domains and enable chat logging.
  3. Leverage Professional Help: Cybersecurity is complex, and it’s okay to ask for help. Experts can audit your setup and strengthen your defenses against these evolving threats.

Don’t Wait Until It’s Too Late

Ransomware is serious business, but it doesn’t have to become your business’s problem. By staying informed and proactive, you can protect your operations, your customers, and your reputation. If you’re unsure whether your systems are as secure as they could be, we’re here to help. Get in touch today to discuss your cybersecurity strategy and ensure your business is prepared for whatever comes next.

When someone leaves your business, you might be so wrapped up in the rush of everyday tasks, you forget to delete their login details, which can affect your security login processes.

It’s easy to overlook. You’ll get around to it later, right?

But unused login details could be a ticking time bomb for security breaches, leaving the doors wide open to cyber criminals. It can also be an unnecessary drain on your budget if you’re paying for old subscriptions you no longer need.

A recent report found that almost half of businesses had accounts that were no longer actively managed, which can undermine your security login protocols.

If you’ve forgotten about an account, you’re not monitoring it. And this leaves your business vulnerable to attacks.

These risks aren’t just hypothetical, either. Many cloud security breaches happen because unused login details and accounts have been compromised.

So, what do you need to do?

Take the time to audit all accounts and login details used by your business. Make sure you no longer have accounts open for ex-employees (and check that their access has been fully revoked, not just left inactive) to avoid security login issues.

The same goes for any software or service that you’ve stopped using in your business. You might not realize you’re still paying for a service you haven’t touched in months – or even years.

Going forward, make sure you have a clear process for when people leave, and regularly review the applications and services your business uses.

If you’re not sure where to start, let us help you perform a security review and make sure you’re not leaving your business exposed to unnecessary threats. Contact us at (319) 535-5350 or [email protected] to setup an appointment.

Copyright© 2024 WatchPoint, All Rights Reserved
319.535.5350
Cedar Rapids, Iowa