Keeping data protected as
businesses in the Middle East
embark on remote working journey
In order for businesses to fully prepare for digital disruption
while working remotely, Claude Schuck, Regional Manager,
Middle East at Veeam, offers some necessary steps for
ensuring data protection.
n recent months, we’ve seen
I
that many organisations in the
Middle East have arranged for
employees to work from home. Living in
the age of Digital Transformation means
that we are connected at all times.
Consequently, the workplace today has
evolved significantly to allow individuals
to communicate seamlessly and connect
digitally from anywhere. But what does
this mean for organisations and the
protection of their data?
Remote working means businesses
can expect a huge spike of personal
file storing coming in from external
sources. This is the perfect opportunity
for malicious malware to make their way
into servers, potentially corrupting a
network of data.
Here are some necessary steps
businesses should take to protect their
data and IT architecture:
Three layers in the circle
of defence
Businesses need to be aware of how
they manage data between cloud and
consider tools that will give them an
advantage. We can only expect the
backing up and replicating of applications
to increase over the next few years as
others learn the significance of data that
are easily recoverable.
Understanding the different roles that are
needed for consideration when optimising
systems for backup and replication can
be easily summed up into the three layers
of defence in data protection:
• Perimeter: Businesses must
consider the situation at hand –
remote working or working from
home. Protection must be made
available for employees to be able to
access the cloud and in turn, ensure
that this data can be backed up.
• Mid: With an increase in the number
of people working from home,
measures must be put in place so
that the systems are still able to run
smoothly and efficiently. To counter
Claude Schuck, Regional Manager, Middle
East at Veeam
this, it is highly recommended that
servers be optimised for different
groups of networks to tap into.
• Base: Having more people accessing
the servers from an external network
will also result in an increase in the
number of personal files coming in.
Businesses need to ensure that they
are able to mitigate any malware that
might make its way through.
Data backup and protection
There are many unforeseen
circumstances that businesses need to
prepare for. Therefore, it is important for
them be highly adaptable. Having data
that is easily accessible is part of the
solution to be ready for remote working.
Over the next few years, businesses
can expect to see an increase in the
number of tools that can allow them
to continuously backup their data and
perform recovery in a matter of minutes.
With these tools, they will be insured with
more than just backed up data – they
will also have access to insights that will
allow them to make informed decisions in
their Digital Transformation journey.
Prevention of cyberattacks
It is vital for organisations to educate
their employees and to remind them of
best practices, especially in times when
telecommuting is an option for everyone.
They need to understand that being
connected to a network outside of the
company’s system exposes the servers
to potential malware.
Organisations need to ensure that their
systems are ready and fully protected so
that their employees can remain efficient
and productive. u
intelligent DATA SECURITY
www.intelligentciso.com | Issue 28
57