Skip to content

Invest in disaster recovery strategies and avoid damages to your company

Failures in the IT infrastructure can compromise the continuity of a business. For this reason, organizations must have a disaster recovery strategy to avoid losses.

This solution is useful to circumvent problems that can have different origins: natural disasters such as fires, human error, and cyberattacks are some examples. 

In this article, we go into more detail about disaster recovery and its importance for the security of institutions. We have broken down our text into the following topics:

  • What is Disaster Recovery and What Is Its Importance?
  • Emergence of Disaster Recovery
  • What are the Main Obstacles Faced by Disaster Recovery?
  • Threats to Cybersecurity in Organizations
  • Top Disaster Recovery Methods
  • What is the Best Disaster Recovery Method for my Organization?
  • Building a Disaster Recovery Plan
  • Understand RPO and RTO 
  • Synchronous Replication: Excellent Method for Companies that Cannot Tolerate High RPO from Data to Disaster Recovery
  • Asynchronous and Mixed Replication

Enjoy the read!

1. What is Disaster Recovery and What Is Its Importance?

As we suggested in the introduction to this article, disaster recovery is important to ensure the continuity of a business. 

This is because it is designed to avoid data loss and enable the company’s operations again whenever there is an interruption generated by unforeseen events, such as natural phenomena, cyberattacks. or system failure.

Thus, it is possible to prevent these inconveniences from negatively impacting the organization’s image in the eyes of its customers and causing great damage to the company.

2. Emergence of Disaster Recovery

 Disaster recovery came on the scene in the early 1970s. Before that, companies were less dependent on computer-based operations. 

In the following decade, American banks had to adapt to a government requirement: according to the determination, they would have to present a backup plan that could be tested. As a result, companies in other areas had adopted the same strategy in order to avoid long pauses in operations. 

In the 2000s, the dependence on network services was greater among companies, which began to capture and store a large amount of data, making disaster recovery a highly complex solution. 

This was simplified after 2010 with cloud computing and disaster recovery services, or “data recovery as a service” (DRaaS).

With the evolution of malicious actor tactics in virtual environments, adopting a disaster recovery plan has become imperative. After all, cyberattacks can affect a company’s work to the point of destroying its credibility, in addition to the immediate financial impacts.

3. What are the Main Obstacles Faced by Disaster Recovery?

In this topic, we cover some inconveniences that can be avoided or tackled by a disaster recovery plan. Check it out:

  • Human Error

People are subject to failures, which can result in incalculable damage if not properly addressed. These errors can occur on purpose or accidentally.

In the case of professionals who deal with computer equipment, any error can jeopardize data and operations and bring great financial impacts to companies. 

  • Equipment Problems

Machines can have faults that generate great inconvenience. This could be associated with software crashes, slow equipment. or system crash. 

This type of failure causes loss of productivity or even downtime when it is necessary to send the equipment for repair. Inevitably, this generates losses for organizations. 

  • Natural Phenomena

While not a frequent issue, natural disasters can occur and be devastating for companies that do not have a disaster recovery plan in place. 

A storm, for example, can destroy a company’s headquarters and computer equipment. For this reason, one needs to be prepared for such situations. 

  • Power Outages

Outages in electricity supply occur much more frequently than a natural disaster and also have a great potential to interrupt the activities of organizations, causing incalculable damage.

This type of unforeseen event can damage IT equipment and cause data loss, which is a major inconvenience. That is, the possibility of having a power outage is one more reason to adhere to a disaster recovery plan.

  • Equipment Theft

Having the equipment stolen creates problems that go beyond the initial scare and the damage caused by the need to replace the machines.

Besides the devices, it is possible to lose customer data and information about the business itself, which can even affect the company’s credibility. 

In this sense, it is advisable to have resources that allow you to recover lost data and keep operations in full swing to avoid damage.

  • Cybercrimes

With the evolution of technology and the action of hackers, organizations are increasingly vulnerable to cybercrimes. 

Cyber intrusions can occur for different purposes: demanding a ransom or appropriating data relating to that business.

Thus, it is essential to have a disaster recovery plan to recover information and files that may eventually be lost.


4. Threats to Cybersecurity in Organizations

Cyberattacks are increasingly sophisticated, which requires security solutions and, often, disaster recovery. Here are some threats:

  • Phishing: This is a social engineering attack (it is based on the manipulation of victims). Its most common methods include links that copy websites of trusted companies used to collect information to steal bank accounts, among other malicious actions.
  • Ransomware: In this type of malware, malicious actors demand payment of ransom to give victims back access to systems and files lost in traps such as spam.
  • Backdoor Attack: A backdoor allows an administrator to access a certain system in order to solve a problem. However, this mechanism can represent a loophole for hackers.
  • DoS and DDoS Attacks: DoS is a malicious action that overloads a server, making access to a website unavailable. In turn, DDoS affects multiple machines, flooding them with false requests and undermining real demands.


5. Top Disaster Recovery Methods

Currently, there are several disaster recovery strategies and organizations often use more than one to ensure their security. Check out the main resources used:

  • Cold Site

Here, the disaster recovery strategy works as follows: the institution has a second facility so that employees can continue to perform their duties even if incidents such as storms or fires occur.

This solution prevents business downtime, but does not enable data recovery. For this reason, we strongly recommend that it be paired with other disaster recovery tools.

  • Hot Site

This feature is very efficient when it comes to avoiding downtime. That’s because it copies data frequently, keeping it always up to date. However, their setup takes a long time and they are not among the most cost-effective solutions.

  • DRaaS

This solution ensures that computer processing is transferred to a cloud infrastructure. In this way, the company can carry out its activities even if the servers are down. 

You can access DRaaS plans through subscription or pay-per-use.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Every programmer deserves a Vagrant File

Vagrant File: Working with virtual IDE’s

An Integrated Development Environment is like the personal office of every software programmer, because we have all the components in order to focus on the task. Today everything is oriented towards web applications and in a previous article we mentioned how large companies have taken advantage to offer such services quickly, in what have become known as “Architecture without server”, euphemistically. For these cases we tell you that a Vagrant File could be developed to simulate this environment without a server to perform tests, saving time and money before hiring these services and creating our web application.

In this article we will show you how the field of programming has evolved, always with concise narratives and additional links.

In the 20th century…

Computers were expensive, even more than today; so many of us didn’t have computers at home. Those were simpler times, and mobile phones were only used by our bosses, so when we left the office we were really disconnected and could get by without Internet. But when we turned on our computer to program we had already placed all the variables -and programs- necessary to begin our work. We had to have the whole programming environment set up and ready.

In those days, going to the office physically was common, but now, it’s not.

In this 21st century

Now programmers can work remotely and for several clients or companies from anywhere, but such flexibility brings the dreaded thing of “it works on my machine”, but not on that of other developers who work with us. Virtual machines have solved, in part, this problem and even its complexity has increased exponentially with the networks defined by software.

As we said, each application is unique and its components can become very unique or specific. All of the above may not fully meet our needs, but it is not yet time to say goodbye to our personal computers, at least not in our profession.

Vagrant File

vagrant file

vagrant file logo

Continuous Software Release and Continuous Integration have taken the demands much further to meet deadlines and goals: we must copy from the repositories the algorithms we are working on, to make very specific modifications and then return them to the common cause. Whether we are in America or Europe we must always be ready for any work, and this is where the Vagrant File comes in.

A Vagrant File describes both an operating system and the provisioning and also configuration of a development environment. For the programmers it is a complete and rather tedious work: it takes away our energy to program. With a Vagrant File created and adapted by all the members of the team, not only will we have a development environment, we will also have an environment identical to the one used in production, a task that we will do in a single opportunity in the device where we usually work.

Installing Vagrant

To install any Vagrant File we will first need to have VirtualBox installed, and in our case we use Debian/Ubuntu. Once we have installed this hypervisor we can proceed to install Vagrant. In a GNU/Linux environment it is common to use apt-get install vagrant or for CentOS and related yum install vagrant, but if you have a problem it is better to download the installation packages directly from the official site rather than the default repositories of your operating system. At the time of writing this post the supported platforms are as follows:

  • Linux (64 bits, package in AppImage format, which is very appreciated by Linus Torvalds, creator of Linux, who explains how it works)
  • Debian (32-bit and 64-bit, package in .deb format)
  • Microsoft Windows® (32-bit and 64-bit)
  • CentOS® (32-bit and 64-bit, .rpm package)
  • macOS® (32-bit and 64-bit, .dmg package)
  • ArchLinux (64 bits, package in .tar.xz format)

First steps

The first thing we run is the vagrant -v command in a terminal window, to see which version we have installed (2.1.2, to date). Then we will be able to choose the operating system we are going to use; in Pandora FMS the selected one is CentOS 7, so we will create in our user documents a folder called vagrant-home:

# mkdir ~/vagrant-home 
# cd ~/vagrant-home 
# vagrant init centos/7

This is where we need to be patient: we proceed to download an image of the desired provider, in this case a Content Delivery Network (CDN) from vagrantcloud.com:

“vagrant init centos/7” and “vagrant up”

It is fair to say at this time that many companies have collaborated by publishing each by their own means an image file for different hypervisors. In the case of CentOS we have for Microsoft Hyper-V®, Libvirt, VMWare Fusion® and, of course, for VirtualBox.

vagrant file

Vagrant images supported by CentOS for different hypervisors

Do we need a Percona database? We can search VagrantUp for a Vagrant Archive that suits our needs, or we can create our own Vagrant Archives and share them!

Finally using a Vagrant File

Now we will do all our work of server configuration management with a Vagrant File and we will start by reviewing the one we just created… When? Well, when we issued the vagrant up order in our vagrant-home folder:

Vagrant File

The famous Vagrant File, file in plain text

All the lines are commented, except the one that describes the virtual machine; there we can quickly change anything we need (IP address, listening ports to connect via SSH, etc.). For now we’ll use the vagrant halt order to shut down our machine.

The “mantra” of Vagrant

The idea is, by means of a Vagrant File that we get to download a virtual machine and, in addition, with additional instructions to carry out the provisioning and configuration of a development environment (or of production). This way we will have our own machine, we will turn on and off, and if at a certain moment we want to restart and start again we will use vagrant destroy.

Remember to save OUTSIDE the virtual machine all your work, or if you use Git apply the command git push; in Pandora FMS we use GitHub to store the source code since 2014.

Working with Vagrant

How do we connect to our Vagrant File (as we saw, this file is the core of the matter)? Because always located in our folder to that effect created, we introduce vagrant ssh and we will be connected to begin our work.

Do we want to connect in a “normal” way, as we have always done? The only change human beings like is the diaper change; if we want to connect with the command, ssh, first we must run vagrant ssh-config to know the configuration we will use.

vagrant file

“vagrant ssh” and “vagrant ssh-config”

Monitoring Vagrant

From the SSH connection we can add the parameter “-o LogLevel=VERBOSE” to know what happens with our connection (by default it is configured to “FATAL”, the other possible values are QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3). Also for logs, if we use VirtualBox, they are located at
“~/VirtualBox VMs/vagrant-nombre_de_nuestra_carpeta_default_XXX/Logs/VBox.log” in a very particular format… But before going deeper into that, we tell you that it is just the tip of the iceberg, because it only shows us the record of SSH connections and perhaps we should aim higher.

To keep track of the boot of our virtual machines we must use the parameter “–debug”to be able to get all the details of each boot and shutdown:

vagrant file

Result of the command “vagrant up –debug”

Note: always “VBox.log” will contain the last record, the previous ones will be listed and kept and if we want to monitor we must automate so that it always reads the record after a “vagrant halt” or “vagrant destroy”. The other possible values are: info, warn and error. If we want to save absolutely all the startup record we must send all the output to a file in the same folder where we run: “vagrant up –debug &> nuestro_registro.log” (the debug parameter has two dashes as prefix).

Any information we send you to register may contain personal information and/or sensitive data of the device where you are running Vagrant. Be careful.

Using Pandora FMS as a monitoring tool

We saw that Vagrant has a very particular way of keeping records. Therefore, the default option we have to monitor with Pandora FMS is like any other device, either installing a Software Agent or performing a Remote Monitoring, having the foresight to provide an IP address to the Vagrant virtual machine to communicate with the Pandora FMS server, central or satellite.

A few steps beyond

Once we have experienced working with third party Vagrant Files, it will be time to create our own well-customized virtual machines to share with our colleagues. To do this, we must use Packer, a tool specially designed for such tasks.

When we are very experienced we can even review the logs without having to connect via SSH through a very elaborate artifice called codeyourinfra, which consists of an Apache web server with Jenkins, which will allow us reading access.

Don’t hesitate to contact us in Pandora FMS to start working in your company or office. We have years of experience and a well-qualified team at an international level.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

What is Patch Management?

Patch management is the process of acquiring, testing and installing updates on computers. It is mostly done by organizations as part of their internal efforts to fix issues with the different versions of software programs. Additionally, patch management also helps to evaluate existing software programs and detect any potential lack of security features.

Continue reading
×

Hello!

Click one of our contacts below to chat on WhatsApp

×