Air gapping isn’t a new topic, and it goes by several different names, but it’s an interesting area and something it’s important to give a brief mention to.
First things first, what is air gapping?
Air gapping is physically isolating a computer, network or device from any form of connected access – internet or LAN.
How do you remotely hack a computer that’s not connected to something?
In simple terms, you don’t. Air gapping, an air gap or air wall is an extra layer of isolation between the secure network and unsecured networks.
The isolation technique has been used by critical systems around the globe for years, such as military or government networks, giant financial institutions and nuclear power plants.
Here’s the air gap process explained in a handy poster. You’re welcome to share it with colleagues and friends. Download the poster here.
When systems get smarter, so do the hackers
IT environments are continuously targeted by ransomware and malicious acts. In many scenarios, backup is your last line of defence.
To increase their chance of a pay-out, it’s becoming increasingly common for malicious actors to corrupt backups, attacking from within, before they corrupt the main system.
When a company notices they’ve been attacked, usually from a flag on the main system, their first action is to restore from back up. If these backups are corrupted – where do they turn next?
How does air gapping fit into a backup and recovery strategy?
Air gapping as part of your backup and recovery strategy means that at any given time, a copy of your data is not connected to any network (offline) and is inaccessible. These types of backups are also known as immutable backups, defined as: unchanging over time or unable to be changed. This is a backup solution that prevents data deletion or modification.
Data is critical to all organisations. Having an immutable copy of your backup data ensures there’s an untouched version of that data that is safe from any failure scenario.
How does immutable backup storage help?
Ransomware and malicious activity from outsiders actors are commonly thought of as the main threats to defend against. However there are other likely scenarios that can occur, including:
- Production data becomes corrupted or compromised
- Accidental deletion of production data
- Insider malicious activity e.g. administrators modifying backup job retention or deleting restore points.
We have no doubt that to reduce risk to your data, air gapping should be an integral part of your backup and recovery strategy.
Ready to protect your backups with air gapping?
If your backups are with us, you’re already covered and can sit back and do nothing. The mtech.cloud backups are immutable, giving extra peace of mind that your data is additionally protected against unforeseen malicious activity or accidental deletion.
If you don’t backup to our cloud we can either discuss bringing you on to it, or the alternative backup solutions available. We want to ensure your data is always recoverable and safe from any failure scenario. Get in touch today.