Posts

The global business trend is that more and more companies are migrating data to the cloud and using SaaS, cloud-based office suite, and applications such as G Suite of Google (G Suite Business, Enterprise, and G Suite for Nonprofits, G Suite for Education). Most often, management makes such a decision as part of an integrated approach to improve the overall performance of the business. This approach became very common, especially due to the worldwide pandemic spread of COVID-19, and the need to work remotely; large number of employees started working from home, outside of a traditional office environment.

What is G Suite?

G Suite or “Google Suite” official name – Google Workspace. This is a set of cloud services, productivity and collaboration tools and apps, provided by Google for all kind of businesses be it a startup, a new business of any size: small and medium-sized businesses, and large enterprises.

What is G Suite used for?

Google Workspace Apps makes collaboration simple and effective; G Suite provides a powerful solutions for four main types of tasks:

Collaboration:

  • Google Docs – the possibility of co-editing texts in real-time
  • Google Sheets – multifunctional sheets editor
  • Google Forms – to create custom forms for surveys and questionnaires.
  • Google Slides – allows collaboration on presentations.
  • Google Keep – storing and organizing notes.
  • Google Sites – to create high-quality sites for team, project, or event.
  • Google Apps Script – to create custom solutions for special business needs.

Communication:

  • Gmail – professional email
  • Google Calendar – shared calendars for planning teamwork
  • Google Chat / Meet — A chat and video meeting service

Storage and retrieval:

  • Google Drive – secure data storage in the cloud, file sharing and synchronization
  • Google Cloud Search is an efficient way to find content across G Suite services.

Control:

  • Google Admin Console – manage user, device, and security settings
  • Google Vault – retain, hold, search, and export users’ Google Workspace data.
  • G Suite Work Insights – statistics related to employee actions and their collaboration.

Data in G Suite is Not Automatically Protected

Many business owners think that traditional best practices like data backups are outdated.

They mistakenly believe that a SaaS application such as Google Workspace is always available, guarantees data security, and does not require backups.

Incredibly, 1 in 3 companies reports data loss in cloud-based applications. This means the loss of potentially hundreds of work hours.

What is the main reason for data loss? End-user error. Other common reasons:

  • Ransomware/cryptoviruses attacks. They work in a similar way: they encrypt important documents and files and demand a ransom.
  • Malicious activity of end-users.
  • Operational errors such as accidental overwriting of data.
  • Loss of data due to canceled account subscription
  • Errors of external applications (data corruption due to synchronization or overwriting)

According to Google Cloud Blog, “Now more than 5 million paying businesses are using G Suite. In the past year alone, 1 million new customers have signed up for G Suite”.

Thus, companies using G Suite should not ignore the risks of data loss. Remember that backups are just as important in the cloud as they are in traditional on-premises IT systems.

Few people pay attention, but even G Suite Administrator Help: https://support.google.com recommends Third-Party Backup because “You have a limited time from when the data was permanently deleted to restore files and messages. After that, the data is gone forever.”

An independent third-party SaaS backup solution is the best way to protect your business from data loss.

Google Vault is not a backup solution

Vault is information governance and eDiscovery tool for Google Workspace. However, Google Vault is not a backup solution even if Google Vault has primitive recovery capabilities, but it does not protect against:

Data loss due to a ransomware attack.

If your company has been attacked by ransomware, Google will not allow you to roll-back data to an exact time before the ransomware attack. Thus, you will lose your critical and valuable business data and no guarantees the same attack in the future.

Data loss due to permanent deletion of data.

If the end-user or administrator deletes data permanently, the files can only be recovered for a short period of time. Therefore, practice shows that searches for an accidentally deleted file do not occur immediately. It often happens that it takes a long time before the loss of important information is discovered. Moreover, administrators do not have the control they need, Vault restores all information deleted in the last 25 days.

Wasted time to recover files.

The time it takes to recover data from the cloud may take longer than you expected. This can negatively affect all business processes and lead to financial losses for the company. Keep in mind that recovering lost data can take up to several weeks.

Data loss due to inactive licenses.

You can only access G Suite data with an active G Suite license. Thus, inactive, or de-initialized user data is permanently deleted and cannot be rolled back. This often leads to the loss of important data when changing employees.

What is SaaS protection?

SaaS Protection is a backup solution to help ensure that businesses using Google Workspace can access, control, and protect their Google G Suite data.

Our company Namtek Consulting Services provides the leading G Suite backup solution for MSPs. Our SaaS Protection for G Suite is a reliable cloud-to-cloud backup solution for storing a copy of your SaaS application data in Datto’s Cloud.


SaaS Cloud protection price

Why companies need SaaS Protection for G Suite?

Reliable backup

A company that uses G Suite must have complete confidence that their data is protected with a reliable solution designed to reduce risks and quickly manage backups.

  • Automatic continuous backup of Gmail, calendar, contacts and shared drives
  • Simple and fast connection
  • Flexible storage retention options to suit individual customer needs.
  • Flexible storage options according to individual customer needs.

Fast and easy recovery

  • Fast recovery or export of data for a specific required period.
  • Rapid recovery of individual objects or entire accounts while preserving associated records and folder structure.
  • Ability to restore data from one G Suite user account to another.
  • Keeping inactive G Suite user data with SaaS Protection for as long as you need it.
  • Ability to export all accounts or specific items to standard file formats.

Protect Your Google G Suite Data with the best third-party backup solutions

If for some reason you have lost some G Suite data, this means not only a loss of data but also a loss of time and money for the recovery of valuable information. Unfortunately, without additional SaaS Data protection, it is not always possible to restore it.

Moreover, your company’s reputation and relationships with customers and business partners can be compromised.

As a cloud solutions provider, we offer enterprises an efficien

When software experts mention the words “business disaster” or “disaster recovery”, many top business people think about natural, or weather, events, such as floods, hurricanes, fires, ice storms, earthquakes, tsunamis, wind storms, etc. These disasters can of course occur at a company and can have devastating repercussions, such as prolonged downtime, property damage, injuries and more. The likelihood, however, of such weather events are much less likely than technological and man-made events.

Technological and man-made disasters, including hardware failures, software malfunctions, user errors, security breaches, etc., can also have devastating effects on a business’ operations, causing downtime, data loss, lost productivity, lost revenue, delayed sales, increased expenses and more. One hour of downtime can cost companies anywhere between tens of thousands of dollars for small businesses to hundreds of thousands of dollars for large organizations!

It’s critical to know your Recovery Time Objective (RTO), which is your company’s maximum allowable downtime. How long can you go down and survive? If your RTO is seconds or minutes, then you better make sure you have a business continuity solution with off-site data storage.

Business Continuity ServicesMany businesses, without a proper business continuity and disaster recovery plan and solution, don’t recover from some disasters. So, before you think to yourself, “well we have beautiful weather here or we hardly ever get power outages, why should I pay for a Business Continuity Service?” – remember that your company is much more likely of falling victim to a ransomware attack, having an employee accidentally delete an important file or dealing with a malfunctioning server. No matter what sudden disastrous event occurs, you want to be protected. Ask yourself, is my company’s data worth risking? You may have gone the last 10 years disaster-free but can you truly guarantee that the next 10 years will also be free of crisis?

Business Continuity services for complete data protection

In our blog Business Continuity: A Much-Needed Insurance Policy For Your Data we mentioned the term “data insurance”. This is how our customers view their Business Continuity solution and service. They see it as an insurance policy in place to protect their company’s most important asset – their data! Companies are more and more willing to pay a monthly Business Continuity service fee to ensure that their data is 100% protected as well as easily and quickly recoverable. It’s useless to simply backup your data only to realize after a disaster struck that it takes DAYS to recover it all! Now that companies are using full management systems rather than keeping important information on paper, they realize the need for such a backup solution.

Don’t be Victim of Ransomware

QBR (Quick Backup Recovery) is a hybrid business continuity and recovery solutionWe all keep hearing about Ransomware. This type of security breach is currently a big problem for businesses, even individuals, all over the world. The likelihood of a company experiencing a ransomware attack is very high. This virus not only encrypts a company’s data but also demands payment for it to be unlocked. The governments discouraged victims from paying hackers since paying the ransom does not guarantee the release of their files.

There are many ways a company can fall victim to such a cyber attack. The most common are when computer users click on a bad link or download an encrypted email attachment. Other scams include phishing, baiting, quid pro quo, pretexting and tailgating.

Be prepared for any business disaster with Business Continuity

QBR NamtekQBR (Quick Backup Recovery) is a hybrid business continuity and recovery solution. It has the capability to store data both on premises and in the cloud. No human intervention is needed during backup. Virtual Machine snapshots are scheduled from the start at which point QBR can take snapshots at intermittent times throughout the day of the office servers and workstations to be stored on the QBR device as well as pushed off-site in the cloud. This off-site capability ensures optimal safety in case the QBR device gets damaged from a fire, flood, or other means on-site. During the restoration process, there are several options available to the business;

  1. File Restore: If the company needs to recover a specific file(s) from a specific VM taken at a specific time of the day
  2. Bare Metal Restore: If a company needs to restore a complete VM from the local device into a physical machine
  3. Export VM: If a company needs to restore the backup from the QBR device to HyperV or VMware format, so it can be deployed on a virtual environment.

With all of these options, a company’s data can be accessed almost immediately during a disaster. The whole point of a Business Continuity solution is to ensure a business remains operational, without any data loss, during a disaster.

Keep your business data safe from hackers and other disasters

It’s important to understand why total data protection is essential in today’s business world. Businesses are now run and managed with software systems so it’s important to ensure no downtime is incurred if something unexpected happens. Companies must not only protect themselves from natural disasters but also from technological and man-made events, which are much more likely of occurring. Reduce your risks with a Business Continuity solution and a solid disaster recovery plan.

When it comes to your business’ future, don’t take a chance! Look into the safest way to backup and restore your data with QBR.

Contact us today!

Total Data Protection Business Continuity Services

Ransomware: Why You Should Care

Viruses extortionists (ransomware, cryptoviruses) work in a similar way: they block the user’s desktop, encrypt important documents and files saved on the computer, then delete the originals and demand a ransom. Typically in Bitcoin, so they can provide you with a key to unlock your computer and to be able to continue working and have access to your saved files. Often the creators of cryptoviruses have strict conditions for the terms of payment of the redemption. If the owner of the files does not fit within these terms, the key is deleted and it will be impossible for the user to restore the files.

Ransomware is the most massive and significant attacks of computer viruses in the world.

Here a chronology of the first viruses in history, as well as the largest-scale virus computer attacks.

In 1971, the first program in the world, which was able to independently reproduce copies of itself on a computer network, was created by the engineer of the American technology company BBN Technologies, Bob Thomas. The program, called Creeper was not malicious: its functionality was limited to self-copying and displaying the message: “I’m the creeper, catch me if you can!” A year later another BBN engineer, e-mail inventor Ray Tomlinson, created the first anti-virus that self-replicated on the network computers and deleted Creeper.

The first virus created in 1981 caused an uncontrolled “epidemic.”  This virus spread using a technique now known as a boot sector virus. A virus called Elk Cloner was created by a 15-year-old American high school student Richard Skrenta by infecting the Apple II operating system. The virus infected the magnetic diskettes and, after the 50th access to the infected media a blank screen appears and a joke poem message was displayed. In some cases, the virus could also damage the floppy disk.

The first malicious program Michelangelo that infected over 1 million computers worldwide appeared in 1991 in Australia was written for IBM-compatible personal computers (PCs) and the DOS operating system. Other information from the disk could be restored, but it was difficult for an ordinary PC user to do it. The creator of the virus remained unknown, some cases of program activation were recorded until 1997.

On June 2, 1997, Chen Ing-hau, a student at the University of Datong (Taipei, Taiwan), created the first version of the Chernobyl virus (“Chernobyl” or CIH – according to the first syllables of the author’s name). The virus infected computers with operating systems Windows 95 and 98, triggers on April 26 of each year, the anniversary of the Chernobyl nuclear disaster. The virus erased the boot sector of the hard disk and, sometimes, the BIOS data – the boot sector of the computer. In the latter case, it was required to change the chip on the motherboard or even acquire a new computer, since the old one was out of order.

It is estimated that more than 60 million PCs were infected worldwide, and the damage exceeded $ 1 billion.

On May 5, 2000, the world’s largest epidemic of computer virus began. Created by Filipino students Reonel Ramones and Onel De Guzman, the “worm” ILOVEYOU sent itself to all e-mail contacts of the owner of the infected PC and replaced most of the files with documents, images and music on copies of itself. Only in the first 10 days of the epidemic, the number of infected computers exceeded 50 million. To protect themselves from the epidemic, many government agencies around the world have temporarily disconnected e-mail. The total damage was subsequently estimated at $ 15 billion. The Philippine police quickly found the creators of the virus. However, they went unpunished due to the lack of an article in the local criminal code providing responsibility for computer crimes.

On September 2010, the Stuxnet virus hit the computers of employees of the nuclear power station in Bushehr (Iran). It created problems in the functioning of centrifuges of the Uranium Enrichment Complex in Natanz. According to experts, Stuxnet was the first virus to be used as a cyber weapon.

Danger of Ransomware

On May 12, 2017 a significant number of computers with Windows as operating system were attacked by a virus-extortionist WannaCry. The virus encrypts user files so that they cannot be used. For decrypting the data, the attackers demanded $ 600 in the crypto currency of bitcoin.

According to Europol, the attack affected more than 200,000 computers across 150 countries. The four most affected countries were Russia, Ukraine, India and Taiwan according to Kaspersky Lab.  The attack, in particular, affected the National Health Service hospitals of Great Britain. Up to 70,000 devices including computers, MRI scanners, blood-storage refrigerators, and theater equipment have been affected. Cyber risk modeling firm Cyence estimates the potential costs from the hack at $4 billion.

Don’t Miss: The Dangers of Ransomware & How To Overcome A Cyber Attack

On June 27, 2017, from the attack of a new variant of Petya Ransomware many of large organizations have suffered in multiple countries, but especially in Ukraine and Russia.

The Petya virus spreads through links in e-mail messages and blocks the user’s access to the computer hard drive, demanding a ransom of $ 300 in bitcoins. This is similar to the malicious program WannaCry. During this attack, the radiation monitoring system at Ukraine’s Chernobyl Nuclear Power Plant  went offline. Some Ukrainian ministries, banks and metro systems were also affected. It is said to be the most destructive cyberattack ever.

The Business Continuity Solution to Ransomware

The best solution to protect your data and company from a different type of cyberattack is QBR (Quick Backup Recovery) Business Continuity Service, powered by Datto and provided by Namtek Consulting ServicesQBR entails on-site real-time data and machine backup through virtualization as well as off-site backup to the cloud. This hybrid solution allows for quick recovery during a disaster with no downtime or data loss. For more information about the latest solutions in Backup and Recovery visit us at: Quick-Backup-Recovery.com

dont-be-the-next-victim-of-a-ransomware-attack-qbr

During the first week of June, according to CBC News, the University of Calgary became a victim of a ransomware cyber attack. A ransom note was left when the University first detected an encryption on their computer network. The amount requested for the method of decryption was $20,000, which was eventually paid to the attacker on June 7th, 2016. The encryption meant that their students and researchers would not be able to access any of their important files, so long as the ransom was not paid, in order to receive the decryption key. Read more

Last week, we published an article explaining why proper business data protection should be taken seriously in this day and age. Today, I will dig a little deeper and go over 4 main questions every business executive should ask him/herself in order to assess if their current backup and recovery process and solution are effective and complete to reduce or even eliminate downtime. Read more

Protecting your company’s data should be of high importance, no matter where your office is located or how many employees you have. Downtime is real and if and when it does occur, the cost PER HOUR can range between $9,000 to $700,000, according to the Aberdeen Group (2013). On top of this, most crises happen because of human error and network outages, rather than natural disasters, as everyone mistakenly believes. Read more

Nowadays, many businesses, small or large, input and store their data in some kind of system(s), like a CRM system, an Accounting software, a Warehouse Tracking system, or a fully integrated ERP management solution. Unfortunately, these companies, who rely so heavily on these systems and on having real-time data, still trust their backup tapes, disks or online methods. In this case, how safe is their business data from being lost due to an unexpected crisis or disaster? From our experience, not safe at all! Read more

Today’s infographic provides brief descriptions of the many parts of a complete Business Continuity Plan. It’s time you protect your business from downtime BEFORE a disaster occurs. Read more