![]() When it comes to online backups, there is often the fear that our data on remote servers are not correctly stored or that during transfer, these can be intercepted. In the first case, the data encryption is performed on the host service, while in the second one directly on the client before sending the copy to the server that will keep it. One is based on the host and the other on the client. There are two types of options for encrypting your online backup. When we store our data on online servers, it becomes imperative to protect our data with an encrypted backup. Here is the cloud backup or on NAS comes to help on this aspect. It is, therefore, necessary to make periodic copies of our data to be stored in a secure environment, possibly different from the one in which the backup was made. ![]() We know that hard drives and all other mass storage devices can decline and become damaged. ![]() The IT techniques related to data encryption must also be followed by a rising awareness of the topic so that appropriate behavioural measures are implemented at all levels to ensure, for example, that the encryption passwords are kept secure Are online backups secure? In particular, article 32 contains the guidelines to be followed to guarantee the Security of processing. The GDPR, which entered into force in May 2018, also takes into account the data encryption. Let’s think, for example, about health data and how much this could mean if they went into the wrong hands. Why is it useful to encrypt backup data?Īs you can imagine, making a complete copy of all the data contained on a computer and keeping it in one place is an element of extreme vulnerability.ĭata theft or accidental loss could put your company or person at risk. Complex IT infrastructures need centralized systems to monitor services and resources located on Servers and Clients.Data encryption in backup operations is one of the most critical features that dedicated software must take into consideration, not only because it is a necessary measure, but also because there are laws to be respected.Įvery day, thanks to mobile devices and intensive use of several computer applications, we produce and make use of a large amount of data.Įspecially when you talk about sensitive and personal data, proper attention must be paid to protecting them.Įncrypting disks and files helps protect data in the event of incorrectly processed, stolen, lost or disrupted physical machines. This is the case, for example, of database backups. Whatever the tool to perform backups of your database farm, it is essential to check the actual execution, timing and statistics. There are many complex tools for this purpose. For example, Nagios () or Monit. Nagios is a complete monitoring system for networks and services. The operating architecture, typically Server2Server or Client2Server, consists of a Core software residing on a machine and multiple agents located on the network nodes).Ī specific case could be the monitoring of MySQL backups on Linux / Unix Server. System administrators, once configured “mysqldump” (ie the tool to export databases to text files containing all data and queries to restore the database itself), use command line software such as “Tail” and ” Grep “() to set up an efficient monitoring system. The problem arises when information must then be centralized, aggregated and analyzed. For this, software such as Nagios are used. For example MySQL commands like “mysqldump-secure” already contain the integration with the Nagios platform. It must certainly be compared against the problem of complexity. The configuration of Nagios is quite complex and requires a lot of patience, a lot of time, as well as a good deal of knowledge of both scripting and infrastructural languages.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |