Enterprise resilience: Backup and management tips for iOS, Mac

Enterprise resilience: Backup and management tips for iOS, Mac

Mobile-Technology
Image credit: source

Apple’s solutions are seeing increasing use across the enterprise, but do you have a business resilience strategy in place in case things go wrong?

If you’re one of the estimated 73% of SMBs that have not yet made such preparation, now might be a good time to start.

Your data is your business

It’s challenging enough when a consumer user suffers data loss as precious memories and valuable information go up in the digital smoke.

Natural disaster, technology and infrastructure problems or human-made problems such as burglary, cyberattacks or civil unrest can all impact the sanctity of your systems, whatever platform you use. It matters because in today’s connected world, your data is your business.

One way to approach business resilience improvement is to adopt a mind-set in which you think about what happens if every piece of hardware your business uses fails at once.

While this may seem extreme, fire, flood or successful cyberattacks all threaten damage to your systems, and while the iPhones in your fleet may be left untouched, your internally hosted servers and on-site Macs and other equipment could suffer.

How do you protect yourself?

One part of the response is to put together and follow a data backup policy, but even if you do so (and many do not), how robust is your protection? Do you have first line, second line, online and offline backups? Do you have a remote backup system in place? Do you use a password management system and if you do are all the relevant master passwords held securely off-site?

[Also read: Enterprise resilience: iOS, Mac tools for remote collaboration]

It’s also important to develop a backup and recovery policy both you and your employees can easily maintain, including use of cloud-based services.

It’s imperative that data stored in the normal course of business by your company be cohesively stored as you do not want to have to explore every employees private Dropbox, Box, OneDrive or iCloud Drive account as you attempt to forensically pull all your information back together after a disaster strikes.

It is also quite important to think about how your data flows.

While less of an inherent problem for Apple systems, what happens if malware gets into your deployment? To what extent are your primary data backups sequestered from your day-to-day business, and what security verification policy do you have in place in order to ensure the integrity of the information you store in your primary backups?

The reason this matters so is that in the event malware gets into your backup systems (perhaps hidden in something as seemingly innocuous as a PDF document) then once you put all your enterprise kit back together the problem could reoccur.

The three-part approach

Reading around this topic and in previous discussions with people in this field, I’ve learned that those businesses that do put good systems in place generally adopt a three-part strategy:

  • Local backups: To shared local servers or locally attached hard drives.
  • Online backups (offsite): For the very smallest SMEs, iCloud may be fine, but larger concerns will need shared online services, such as those from iDrive, Egnyte or BackBlaze.)
  • Redundant backups: If local backups fail or online systems become compromised, a redundant backup system will have all assets regularly stored to a system held securely offsite. A consumer user may store their information on a drive at a trusted friend’s house, perhaps using two drives and swapping them out every few weeks. An enterprise may use the same rotating dual backup strategy to keep offsite backups regularly updated in a safe place. If you are based in an earthquake zone you might even choose to keep these in a completely different state.

It is important to note that whatever backup system is used is robustly protected with highly secure password systems.

It is also important to ensure clear role responsibilities such that someone is responsible for ensuring backups are successful. 

The hierarchy of needs

While full backups are essential, in truth not every piece of data is as valuable as everything else. This is why organizations should prioritize their data in terms of its importance. Typically, the order goes:

  • Databases
  • Accounts/Finances
  • Business operations/HR.
  • CRM information.
  • Documents and email.
  • Everything else.

In most cases it makes sense to run daily backups of the most important information. Automated systems (and it’s best to automate the process as much as possible) can be set to run these.

The role of MDM

If you use a Mobile Device Management system to handle your fleet, you should find it a little easier to deploy and equip replacement systems in the event of disaster, so long as you maintain backups offsite for access by your device management provision system.

Combined with regular backup policy, such as arranging weekly or monthly device backups from iOS devices locally to Macs using the Finder, and subsequent Mac backups using Apple’s Time Machine system, it’s possible to ensure that data integrity is near complete.

(Independently stored information should be thoroughly security vetted before being introduced to core backup systems to avoid malware infection).

A good MDM system equipped with robust security and management tools should help with the process.

Prevention is the core defense

The first line defense is prevention and while you can’t prevent every imaginable crisis you can prevent some.

That means preemptive risk management and fostering situational and security awareness across your teams.  Your employees may be the first to notice any anomalies that may signal threat, and you need to work with them to provide a supportive culture in which they feel empowered to come forward with any concerns.

This is also why it’s important to develop a friction-free approach to your backup resilience strategy, ensuring whatever protections you do put in place are actually used. Consumer level backup services may form part of your preparedness strategy, but only if this is strategically managed, through enterprise storage systems or emerging solutions that can work with consumer options, such as Challo.

Finally, it is extremely important to put together a plan for how to reconstruct your systems after a crisis. In an ideal world, if crisis strikes your organization then your people should already know their roles and be aware of what steps they should immediately take as you prepare to rebuild your organization.

Even the most die-hard Mac user knows that putting things together after data loss can be a lengthy and frustrating task if you are unprepared. (Though iCloud Drive helps a great deal with this).

Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

Copyright © 2020 IDG Communications, Inc.

(Excerpt) Read more Here | 2020-03-06 19:30:00

Leave a Reply

Your email address will not be published. Required fields are marked *