Posts

Box.com Cloud Storage Solution

Introducing Our Box.com Backup Video

Box.com Cloud Storage SolutionBox.com is a cloud storage solution that allows you to get access to your files anywhere, on any device. It’s an amazing tool that enables you to share your content and work together with anyone in your work and life. No matter where you are or what you’re doing, Box.com makes it easy to access and share your files and photos for seamless communication and collaboration in your personal life and business.

There’s just one challenge, with endless collaboration opportunities, you open yourself up to potentially problematic situations. For example, what if one of you delete a document and empty the recycle bin, by mistake? That’s where a cloud backup and restore solution is key to your business’ success.  Box.com data can be accidentally or maliciously deleted or corrupted, and is vulnerable to ransom-ware attacks.

You can’t afford to lose file and documents that are vital to your entire organization without a way to recover it. The good news is that, in just a few minutes, you can set up CloudAlly box.com backup to protect your data with automated daily backups, and the ability to restore your files.

CloudAlly’s box.com backup solution is compatible with all business plans. No matter how many employees are in your organization or how much data you create and modify on a daily basis, CloudAlly can protect your company data with a backup solution hosted in secure Amazon S3 storage. And as an added benefit, CloudAlly gives you the ability to keep track of all your Box.com backup activity. So, you can see exactly what’s going on.

About Our Box.com Backup Video Demo 

In our newest demo video, we show you how easy it is to start protecting Box.com data for your company. Activating your CloudAlly backup is simple, safe, and can be completed in just a few easy-to-follow steps. You’ll notice how user-friendly our software is as well as how many options you have for customizing your backup solution.

Let our two-minute activation video take you through the step-by-step process of backing up your Box.com cloud storage solution, so you can sit back and relax knowing that your data is safe and that you can restore like an expert.

And if you’re still concerned about using CloudAlly’s OneDrive backup solution, don’t forget, we have a risk free 15-day trial available! We want to show you how easy it is to protect your data from all threats no matter the problem.

Don’t choose software to protect your data that you haven’t seen in action. Choose CloudAlly as your Box.com backup and restore solution, and rest easy knowing that you’ve already seen how it works and don’t have to worry about hidden processes or errors.

When you’re ready to know more, contact CloudAlly by calling +1.917.338.0385 or filling out our Contact Form. We can’t wait to work with you to keep your Box.com data safe and sound.

What Is Your Business Email Backup Policy?

What is Your Business Email Backup Policy?

Without an email backup policy, businesses are exposed to significant liabilities. As a primary means of enterprise communication, email plays a vital role in any business, and the security challenges that go along with maintaining these communications channels are important to an overall security plan.

To be fully effective, however, an email backup policy needs to be “vibrant.” It needs to consist of a set of universal protocols, taking into account the specific needs of the business and the structure of the enterprise network.

Quick and Easy Data Access

One of the major principles that a business runs on is access to information. However, the quality and extent of access is ultimately important. Having real-time access to data is more valuable than having delayed access – and having a good email backup policy promotes the enhanced access that serves so many business processes.

One reason to have an email backup policy, and backup and restore services, is that the default settings of any major email provider may not allow for certain important kinds of automated retrieval. Limitations on inherent access may consist of a “days supported” disclaimer, or have to do with the speed of retrieval. A robust email backup policy goes beyond these generic limitations to offer a business more functionality and more agility.

Email Platform Limitations

Looking critically at some of these platform limitation provides an illustration of how email providers handle backups. For example, consider the 30-day period in which Microsoft maintains deleted data in Outlook, or daily backup data limits in Gmail, which is another popular way to set up business email accounts. These caveats can be important in an overall plan to serve business communications, and a sticking point if something goes wrong.

External data backup services will take any of those limitations and extend the protection of email data beyond them — securing all of the data, for any time frame that’s required.

Preparing for Outlier Scenarios

One of the biggest advantages of having an external email backup policy has to do with contingency planning. Employee turnover introduces an element of chaos to a business model. At the same time, companies need to “circle the wagons” against all manner of hackers and black hat malicious actors who seek to inject harmful malware into a system.

In these types of situations, having full backup and restore capability is vital. Any kind of limitation or gap can really hurt a business when it comes to getting over critical difficulties and maintaining operations in an emergency.

Cloudally’s backup services help businesses to use Microsoft or Google, or any type of enterprise tools, in safe ways — allowing executives to have confidence that everything that they put into business communications is secure in a comprehensive backup platform. Take a look at our subscription pricing and what we offer our clients in terms of comprehensive backups for Office 365, G Suite, Salesforce information, SharePoint and OneDrive data, and much more.

Microsoft Email Backup Rentantion Policy Video:

Follow These Tips to Prevent Data Loss on O365

Does Your Company Use Office 365?

Make Sure You Follow These Tips to Prevent Data Loss

There’s a lot of buzz surrounding the use of the cloud in recent years. Cloud computing increases a business’ efficiency, it helps reduce overhead costs, enables companies to be more flexible and it supports collaboration as well as communication. But what about data loss in the cloud?

With a reliable cloud-based solution in place, it means employees don’t necessarily have to be physically present in the office to be productive. Teams can be scattered all over the world and still be able to work as efficiently as they would if they were in the same brick-and-mortar office.

With all this functionality, it’s almost surprising to find out that there’s one aspect of enterprise cloud solutions that remains especially vulnerable–data loss.

Take the popular Software as a Service (SaaS) platform, Office 365, as an example. Being one of the more prominent cloud collaboration tools, you would assume that any data that gets deleted on it–for whatever reason–can be easily retrieved. But you’d be wrong. Unfortunately, Office 365 doesn’t protect users against data loss due to malicious attacks or user error. This is particularly worrying given that a study conducted by Aberdeen Group clearly illustrates the rise of cloud adoption among businesses. According to their research, 80 percent of respondents say that some form of SaaS application is now being used in their companies. And 32 percent say that they have experienced SaaS data loss in their own organization in some form. In fact,  CSO from IDG notes that data breaches and accidental deletion are among the top 12 cloud security threats for 2017.

With these in mind, implementing actionable measures to reduce your vulnerability is essential. Because the reality is, the convenience comes at the expense of your data. Protecting your data–whether from malicious attacks or admin carelessness–is in your hands. And it starts by knowing what actionable steps you can take–


With that in mind, here are 5 ways you can avoid data loss in Office 365.

1. Ensure all mobile devices that access the platform are secure

It’s likely that your company uses both company-issued and personal devices to access work email, contacts, calendar, and other important data. In fact, MarketsandMarkets surveyed bring-your-own-device (BYOD) trends for 2017 and notes a 36 percent rise at the start of 2017.  This number is even expected to jump to 50 percent at the start of 2018.

Given this, make sure that your team is able to implement and follow the company’s security policies carefully. Adding a feature that allows you to remotely protect proprietary information from malicious deletion or attacks is critical given how often data breaches happen today.

2. Implement multi-factor authentication for users

Malicious attacks today are getting more and more sophisticated. A single password—even one that uses a mix of upper and lower case letter, punctuation marks, and numbers—won’t be enough to keep data stored in Office 365 safe. It’s always better to be safe than sorry, so it’s best to enable multi-factor authentication to make it more difficult for hackers to access your account.

3. Avoid anonymous calendar sharing

One of the most useful features of Office 365 is its ability to share calendar information easily.

While it may seem like an innocuous feature unrelated to data breaches or loss, publicly sharing data can expose critical information about your business that would leave your company vulnerable to attacks. Hackers can use your schedules to determine how your company operates and identify which users are most vulnerable.

4. Establish role-based controls

Accessibility is one of the key advantages of Office 365. Be sure however to limit access to critical data. Carefully determine which users should and shouldn’t have access to specific files and features in your company. Talk to each department and coordinate with them to determine who should have access to what to minimize potential data leaks or loss.

5. Automate backups for your system

Office 365 unfortunately still only relies on the trash bin for data recovery. If someone hacks into your data, accidentally empties the bin, or maliciously destroys data, all your important data is gone forever. Implementing online data backups and disaster recovery will ensure that you have an archive of all your data, which you can recover if the need arises.

Office 365 has proven to be an essential tool for businesses today. But being responsible for the security of your company’s data means you have to be aware of the security risks you face while using it. To make sure that you protect your data from potential data loss, so get started with your free trial.

How to Protect from Malware Attacks

How to: Protect from Malware Attacks

Protect from malware attacksProtecting your company data is the most critical task your IT department has. This team of specialists works tirelessly to keep out intruders only to have their coworkers inadvertently let them differently. While your business may have many safeguards in place to catch and clean up these mistakes, there are ways to prevent malware attacks before they happen. Protect from malware attacks ? How?

Additional Layers of Security

You may think your employees are the most vigilant in the world, and they may very well be. However, without a layered security system in place, cyberattacks can still break through. Your business needs an extensive security suite of antivirus, firewalls, and antimalware software to help keep out unwanted visitors.

Using Updates and Plugins

One of the easiest ways for a hacker to attack your infrastructure is through holes in your company’s software. Whether it is the operating system, internet browsers, or mobile devices, keeping titles up to date is one of the most important things you can do to protect corporate data.

Browsers, operating systems, and plugins often receive regular security patches from their manufacturers. It is easy for you to push them off and let them wait until a more convenient time for your employees. However, by doing so, you are cracking a door for intruders to exploit. Once the updates roll out, act immediately to ensure the best coverage. Immediate action is doubly true for mobile devices which often get up off due to low storage or battery power.

On web browsers, ensure all employees enable the click-to-play plugin. Many attackers use the ads to install their viruses on to unsuspecting computers. These ads autoplay and often found on well-known sites. The click-to-play plugin stops Java or Flash ads from running, unless the user clicks on them, helping to reduce the chance of accidental infection.

Safe Browsing

Companies often restrict their employees online browsing abilities. However, even sites that your business has deemed okay for workers to visit need to be used with caution. Employees should do the following every time they go on the internet.

  • Log out of websites when finished: It does not matter if it is a social media site you regularly use to update information for the company or a banking site you use to check your balance during lunch, always log out. Hackers with the right skills can use your browser’s cookies to gain access to places you remained logged into.
  • Use Secure Connections: Sites with padlocks to the left of the URL provide a secure connection between your system and the website server. This added encryption helps to protect against intrusions in the data stream.
  • Strong Passwords: Don’t use passwords that are easy to guess such as birthdates, pets’ names, or anniversaries. Passwords should contain upper and lower cases letters as well as numbers and special characters. For optimal protection, you need a different password for each site you log into.

Other Important Tips

Most employees defer to their local IT department in the event of a computer malfunction. It is the best practice because you know that the gurus of IT are going to clean the system without infecting it further. However, for employees who work from home, having access to the local IT department might not be a feasible option. These workers are more likely to be taken in by fake tech support numbers that may appear on the screen when their system gets infected. Corporations can help by making sure all employees, home-based and onsite, have access to the correct contact for software and hardware support.

Also, educate your workers on phishing and spoofing scams that may appear in their inboxes. It is essential that you remind them never to call the institution the message is from to verify authenticity before using links. Learning how to spot phony messages can protect both your company and individual workers from data loss.

Malware attacks can happen to any business, big or small. Taking steps to protect your infrastructure and training your employees on safe practices can curtail any malicious intrusions. Even the most secure systems can still be successfully attacked, so in addition to education and layered security, you should also backup your data. CloudAlly offers complete backup and recovery solutions for Office 365, G Suite and Salesforce, allowing you to quickly recover data in the event of a malware attack.

Microsoft Video: Malware Attacks

GDPR – Do you need to worry about it?

GDPR – General Data Protection Regulation EU’s New Standard for Consumer Privacy

In April 2016, the EU decided it was time to update their current Data Protection Directive which became the standard in 1995. The outdated policy did not offer residents the level of protection so desperately needed in a world where information is available at the click of a button. The new General Data Protection Regulation (GDPR) sets a stricter guideline and stiffer penalties for those in non-compliance.

New Requirements

GDPR’s requirements change significantly from the outdated directive of the 1990’s. The new rules focus on getting companies to follow stricter handling practices for customer data collected, specifically the following areas.

  • Removal: In the past, customers did not have the right to require companies to remove and delete their information. GDPR requires businesses to remove any consumer records upon their request. Corporations must wipe all personal information from their systems.
  • Portability: In addition to being able to request a removal from company databases, consumers have the right to ask their personal data be transferred from one company to another. Corporations must comply with the request.
  • Accessibility: EU residents have a legal right to request access to the information collected by companies with which they do business. Corporations must provide copies of all data collected upon request.
  • Transparency: Gone are the complicated end user releases used by companies. GDPR requires that businesses make their language easy to understand and detail exactly how they use personal consumer data.

In addition to these areas, companies must adopt stricter breach notification policies. In the event of a data breach, corporations must notify their customers within 72 hours of the intrusion.

Increased Fines – GDPR

Under the new GDPR system, companies found in non-compliance with the regulations face stiff fines. While the penalties are tiered, it still costs a significant amount for those affected. Companies who do not keep their paperwork in order may see a penalty 2% of their annual global turnover. However, if a company experiences a security breach, they see fines of up to 4% of their annual worldwide turnover or €20 Million, whichever is greater.

Fining companies experiencing security breaches is not unheard of under old EU policy. However, a loophole protected businesses that process data to another firm. New regulations do away with this protection. According to Article 32 of the GDPR, data processors are just as liable for security as controllers. Corporations that process data receive a smaller penalty, under the new regulation with fines of 2% of the annual global turnover of €10 Million, whichever is greater.

Data Recovery and Security

All EU companies must employ a disaster recovery plan. GDPR not only requires a plan in place, but companies must also test it at regular intervals. Under these new protocols, the data recovery plans must give companies the ability to restore any information lost due to technological or physical issues.

Companies must instill policies which restrict access suppliers and staff have to consumer information. Policies are just the beginning, management technology such as multi-factor authentication, granular passwords, and role-based privileges need to be in place.

While Windows is one of the most popular operating systems, as a North American based company, EU corporations cannot rely on built-in securities to bring their business into compliance. Instead, using third-party intrusion detection systems and virtual private networks can help bring EU corporations into line with the new rules.

In the event of a breach, quick response is necessary. Regulations require not just an immediate response to fix the issue, but also a plan of action to prevent future violations. An analysis log and subsequent management assist IT personnel in locating the source of the breach. The record gives insight into why the violation occurred and is a starting point for problem resolution.

GDPR

Not Just Limited to EU

The GDPR is the new privacy policy of the EU. However, that does not mean that it does not affect contractors and providers in outlying areas. Thanks to the worldwide nature of the internet, businesses work together across the oceans. For countries outside the EU, ensuring their practices line up with GDPR regulations is essential.

EU residents expect the same protection whether their data is collected and retained by a local company or a foreign entity. Corporations outside of the EU should review data protection and privacy policies to ensure they match up with GDPR standards. Hiring a Chief Protection Officer (CPO) familiar with GDPR requirements can consult with legal counsel and help others in the company understand legal obligations to EU clientele.

GDPR is the standard for consumer privacy in the EU. However, companies still have time to adapt these protocols before they face the hefty penalties called for under the new guidelines. With a deadline of May 25, 2018 looming, it is time for businesses to complete their updates to comply and not wait until the last minute to do so.

For more information read our blog post on: The Importance of Regional Data Centers for Office 365 Backup

Google Drive Down Worldwide: Averting Problems with Google Drive Backup

Google Drive Down Worldwide: Averting Problems with Google Drive Backup

Google Drive Down WorldwideHere’s the scenario: you get to work, ready to pull up the spreadsheet you’ve been working on from Google Drive. But there’s a problem: Google Drive is down. You wait. Check again. Google drive is still down, and it stays down. For over an hour. What are you going to do now? The answer: keep waiting, even as you waste time. While there is certainly nothing wrong with using Google Drive to back up your G Suite apps, recent issues like this one prove that Google Drive alone is not reliable enough to be your only backup. CloudAlly’s G Suite/Google Apps Backup gives you the security that your data will be protected, even if Google Drive fails.

Right now, Google Drive aims to simplify G Suite users’ storage and file sharing in the cloud, but the program regularly has its snafus.

Case in point about Google Drive’s unreliability: on the morning of September 7, Google Drive users started receiving error messages from the file storage service. Users around the world could not load their files.

At 10:37am EST on September 7, 2017, Google announced that it was working to resolve the issue:

“We’re investigating reports of an issue with Google Drive.” Google Drive was down for an entire hour. By 11:38am EST, the program had been restored for some users, but it was still down for others.

Google issued another message that users could “expect a resolution for all users in the near future,” but the company could not provide a concrete timeline. Only by 12:24pm EST – nearly two hours after Google started working on the problem – was Google Drive restored for all users. The tech giant apologized for the inconvenience and said that it planned to develop “continuous improvements to make our systems better.”

Sure, Google says they’re working to make Google Drive infallible, but what if they don’t deliver on their promise, like they most likely will? If Google Drive fails when you need important data, you’re stuck, waiting until Google recovers. Without a third-party program, there is nothing you can do about Google Drive’s unreliability.

You might think, Google Drive was down for a few hours. So what? The problem speaks to a common issue of unreliability with the service. Just a few days after the first issue, on September 11, nearly 3,000 people reported issues with Google Drive again.

Sure, Google Drive is helpful. But it is by no means complete.

Google Drive’s Unreliability?

Google Drive does back up your files and data. However, the protection it provides is not enough.

Take malware and ransomware. Does Google Drive protect your files from these malicious viruses?

Nope. Even if your files are stored on the Google Drive cloud, your data could be infected. Only a third-party software like CloudAlly can protect your Google Drive files from corruption or ransom.

But, you might think, at least Google Drive will be around forever, right?

Again, the answer isn’t certain. Google Drive’s future is at risk. In early September 2017, users feared that Google Drive was shutting down altogether. While this turned out to be hype, Google is shutting down its Google Drive app for Windows and Mac, replacing it with a new backup up.

Right now, though, take a breath. Google Drive is still accessible to all users through browsers on all devices, but this replacement demonstrates Google doesn’t love Google Drive enough that they’ll never change or replace it. Google Drive may not be around forever, and while Google Drive will likely not shut down without notice, it still makes sense to have a third-party software like CloudAlly to back up all your data.

CloudAlly’s G Suite/Google Apps Backup

Returning to the interruption of Google Drive on September 7.

Google Drive users without third-party backups just had to wait. And click to see if Google Drive had come back online. And wait. And click.

But if you were using CloudAlly, you could have exported critical documents instantly. You wouldn’t have wasted any time. CloudAlly lets you export your data to any and all of the programs or devices you need using efficient zip downloads. Instead of waiting for Google to repair Google Drive on September 7, you could have kept on working like nothing was wrong.

Besides, CloudAlly’s Google Apps Backup does more than protect your Google Drive files, too. It backs up all your G Suite apps, including Gmail, calendar, contacts, tasks, and chats on an automated, daily basis.

Don’t put your data safely entirely into Google’s control; take matters into your own hands! Want to see for yourself how CloudAlly is more reliable than Google Drive? Try our free backup for 15 days.