Intelligent CISO Issue 28 | Page 57

Keeping data protected as businesses in the Middle East embark on remote working journey In order for businesses to fully prepare for digital disruption while working remotely, Claude Schuck, Regional Manager, Middle East at Veeam, offers some necessary steps for ensuring data protection. n recent months, we’ve seen I that many organisations in the Middle East have arranged for employees to work from home. Living in the age of Digital Transformation means that we are connected at all times. Consequently, the workplace today has evolved significantly to allow individuals to communicate seamlessly and connect digitally from anywhere. But what does this mean for organisations and the protection of their data? Remote working means businesses can expect a huge spike of personal file storing coming in from external sources. This is the perfect opportunity for malicious malware to make their way into servers, potentially corrupting a network of data. Here are some necessary steps businesses should take to protect their data and IT architecture: Three layers in the circle of defence Businesses need to be aware of how they manage data between cloud and consider tools that will give them an advantage. We can only expect the backing up and replicating of applications to increase over the next few years as others learn the significance of data that are easily recoverable. Understanding the different roles that are needed for consideration when optimising systems for backup and replication can be easily summed up into the three layers of defence in data protection: • Perimeter: Businesses must consider the situation at hand – remote working or working from home. Protection must be made available for employees to be able to access the cloud and in turn, ensure that this data can be backed up. • Mid: With an increase in the number of people working from home, measures must be put in place so that the systems are still able to run smoothly and efficiently. To counter Claude Schuck, Regional Manager, Middle East at Veeam this, it is highly recommended that servers be optimised for different groups of networks to tap into. • Base: Having more people accessing the servers from an external network will also result in an increase in the number of personal files coming in. Businesses need to ensure that they are able to mitigate any malware that might make its way through. Data backup and protection There are many unforeseen circumstances that businesses need to prepare for. Therefore, it is important for them be highly adaptable. Having data that is easily accessible is part of the solution to be ready for remote working. Over the next few years, businesses can expect to see an increase in the number of tools that can allow them to continuously backup their data and perform recovery in a matter of minutes. With these tools, they will be insured with more than just backed up data – they will also have access to insights that will allow them to make informed decisions in their Digital Transformation journey. Prevention of cyberattacks It is vital for organisations to educate their employees and to remind them of best practices, especially in times when telecommuting is an option for everyone. They need to understand that being connected to a network outside of the company’s system exposes the servers to potential malware. Organisations need to ensure that their systems are ready and fully protected so that their employees can remain efficient and productive. u intelligent DATA SECURITY www.intelligentciso.com | Issue 28 57