Skip to content

EasyVista Releases Latest Version of EasyVista Platform 2024.3

NEW YORK – EasyVista, a global SaaS provider for comprehensive IT service management (ITSM), IT monitoring , Enterprise Service Management, and Remote Support, is proud to announce that it has been named a Leader in the 2024 SPARK Matrix™: IT Service Management Tools by QKS Group (formerly known as Quadrant Technologies) for the second year in a row. The EasyVista Platform stood out for its advanced features, low total cost of ownership (TCO), built-in customization options, and comprehensive end-to-end service experience.

Continue reading

Advantages And Disadvantages Of Continuous Data Protection

Businesses and organizations need to store, back up, and protect data. The data and information generated must be backed up and protected from loss and cyber threats. Hence, every organization strives to find the best method for protecting and backing up data.

Over the years, organizations have employed several conventional methods to back up data. One common issue they pose is the backup window–the time frame in which a backup is scheduled. Since these methods preschedule backups, there could be a significant data loss if a data-loss incident occurs between two back-ups.

The best way to reduce data loss is through continuous data protection. Continuous data protection (CDP) backs up data in real-time, ensuring that there is little to no loss of information in the face of a failure or disaster. This post delves into continuous data protection, how it works, its advantages and disadvantages, including how it differs from other backup methods.

What is Continuous Data Protection?

Continuous data protection, also known as continuous backup, is a backup method that stores data in real-time. It immediately saves every change to the original backup, reducing the backup window.

As a result, you won’t lose your data if there is a failure or natural disaster. You can restore your data to where it was before the failure occurred. Hence, there is little to no loss of information.

How Does Continuous Data Protection Work?

Continuous data protection, patented by British entrepreneur Pete Malcolm, provided a solution to the problem of shrinking backup windows in previous backup methods.

Former backup software only allowed users to store data in a strict backup window. Thus, backing up large data amounts was challenging, even with the available ways of speeding up tape backup. There was a limit to how much data you could back up within a specified period.

CDP sought to correct this problem by backing up data in real time. After it backs up the initial, the server runs in the background. Once there are changes to the information, it immediately backs it up, syncing it to the original backup file. It keeps monitoring changes made and new data created and backs them up.

This method reduces the amount of data backed up at a time as storage occurs almost every minute. At the same time, traditional methods do backups once a day. Thus, once there is a failure or disaster, like powering off your computer, you will lose the day’s data. However, CDP preserves every data backed before the failure gets saved.

The server also captures the various changes made, recording every version of the saved data. These records are saved in separate storage, so you only need to roll back the data to the specific date and time whenever you want to review previous data.

True Continuous vs. Near Continuous Data Protection

True continuous and near-continuous data protection are similar backup methods. However, near-continuous data protection does not capture data in real time. Instead, it works by scheduling a backup time. At the specified time, the server backs up data changes. The scheduled time could be an hour or as short as 20 minutes.

True-continuous data protection offers real-time data backup, ensuring no information gets lost due to backup windows. On the other hand, when using near-continuous protection, you will lose data changes between the last and the next scheduled time if a failure occurs. But it still reduces the potential data loss you will experience using traditional backup methods.

Near-continuous data protection can provide sufficient protection for businesses with less complex needs. However, establishments processing large amounts of data every minute may need a better solution. Hence, they should go for true-continuous backup.

Advantages of Continuous Data Protection

CDP offers many benefits for data backup and cybersecurity, which is why it’s one of the most popular data backup methods. Here are some perks to note:

  • Significantly Reduces Backup Window

Continuous data protection closes the backup gap, ensuring there is little data backup window. CDP saves data almost every minute, bridging the time gap and shortening the recovery point objective (RPO), which is the maximum acceptable amount of data lost after recovery from a data loss incident. With this backup method, you can store data every minute instead of the daily backup that traditional methods offer.

You can rest assured there will be little data loss thanks to the continuous backup process. Typically, the data lost will only be a few minutes worth of backed data, preventing massive data loss that may occur when data is backed up less frequently.

  • Saves Disk Space

CDP supports minimal use of disk space.  The full backup only happens once. After that, the server adds new information to the already backed-up data. CDP also provides a history log that captures the changes made instead of using snapshots. This saves disk space.

  • Records Multiple Versions of Data

A separate storage captures data changes in real-time, providing multiple versions of the modifications made over time. Thus, you can always roll back to recover information from any date and time of backup. This facility is most helpful when multiple users assess the records because it ensures they can all find past information without impacting the other user’s activities.

  • Constantly Syncs Data

Continuous backup enables constant syncing of data. Hence, it reduces the potential data loss by syncing data streams as they are backed up.

  • Doesn’t Slow Down the Server

When using the CDP method, your system doesn’t have to go through all backed-up data every time. Instead, it only reads the current changes made. Hence, the backup process won’t hugely impact your server’s performance, ensuring a speedy process.

  • Supports Faster Disaster Recovery Time

You can always roll back to recover data, so if a cybersecurity attack takes place, leading to data loss, you can always recover them. Also, you can duplicate the CDP storage to an offsite storage facility to protect the data. Doing so enables you to recover quickly from crashes, data corruption, infrastructure failure, and other causes of data loss.

Disadvantages of Continuous Data Protection

Despite the benefits, CDP has some drawbacks. They include:

  • High-Cost Investment

CDP uses physical disk storage, so any organization looking to employ this method must invest in disk drives. These disks must be efficient and fast enough to keep up with the high-performance rate. Thus, they usually require heavy investment, leading to increased operational costs.

  • CDP Servers Could be Your Single Point of Failure (SPOF)

Although continuous backup reduces the risk of data loss, it is still fragile. Your CPD server can be your single point of failure because damage to the server will mean a total data loss. Thus, your organization must have a secondary means of data-protecting backups to prevent loss. One way to do so is to have a secondary CDP server.

  • Compatibility and cloud issues

Incompatibility is also a challenge. If your application and operating system are incompatible with CDP, it won’t work. Hence, you must consider compatibility when deciding on which backup method to adopt.

  • Increases Data Volume

CDP backs up data in real-time, doubling your throughput. The rapid increase in data volume can cause performance issues for data resources.

Comparing Continuous Data Protection with Other Data Backup Methods

Besides CDP, there are other methods used to back up data. This section will explore how each of them differs from continuous backup:

Continuous Data Protection vs. Traditional Backup 

Traditional backup methods are the earliest ways to store data. They specify a data backup timeframe, usually by the end of the day. So, unlike the continuous backup technique, they schedule backup time. The true CDP eliminates the need for scheduling by writing the data to a disk and also writes it to a second location.

With traditional backup methods, you cannot restore data from any point in time. You can only restore data up to the last backup schedule. Hence, there is a higher risk of data loss, and recovery also takes longer when there is a data loss or corruption.

Continuous Data Protection vs. Snapshot-based Technologies 

Snapshot-based technologies work with schedules, while CDP doesn’t. When using this system, you must schedule a backup time. Before the scheduled time, the system takes snapshots and saves them to the original network.

These snapshots take up much storage space, making this method less efficient than continuous backups. Snapshot-based backups use about two times that of CDP. The continuous backup technique also reduces data loss to seconds instead of minutes, making it a better option for data protection.

Continuous Data Protection vs. Mirror Backup 

Mirror backup is a fast backup method that mirrors data from your computer system to a separate disk. It creates an exact copy of the backup data. Mirror backup only saves the most recent version of the stored data.

Hence, you cannot recover data from any point in time. Conversely, continuous data protection is a better backup method because it captures data changes, allowing you to recover the data fully.

To Sum it Up

Continuous data protection (CDP) is a technique that backs data up in real time. It saves every data change as it occurs, eliminating the backup window. CDP also saves disk space, syncs data, provides multiple versions of the data, and supports fast recovery. It offers optimum protection against data loss due to natural failures or cyber-attacks.

CDP provides the highest advantage when compared with other available backup methods. However, businesses and organizations with less complex needs can use near-continuous data protection methods. Those with simple needs may choose more straightforward techniques, like traditional backup solutions.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Autumn in NACVIEW was full of events

It was an time with plenty of conversations about cybersecurity and cooperation, all of which solidified our belief that Network Access Control solutions are now in demand by customers like never before. The interest is primarily caused by new regulations, a better understanding of a holistic attitude to security, and a growing number of incidents..

New customers, new partners, and new friends – thanks to all organizers for the opportunity to present NACVIEW and meet great people.

it-sa Expo&Congress 2024 – Nürnberg

Technology Lunch with VERISM – Warsaw

Black Hat MEA 2024 – Riyadh

 

About NACVIEW
A powerful network access control (NAC) solution designed to provide organizations with comprehensive visibility and control over their network infrastructure. Developed by leading network security company, NACVIEW offers advanced features and capabilities to ensure secure and efficient network access for users and devices.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The darkest season: the peak time of cyber threats

Summary: Dark web forums peak in activity during winter months. Holiday scams surge, boredom rises, and AI makes cyber-attacks easier.

The dark web is a key enabler for cybercrime. It allows bad actors to share tools, knowledge, and services secretly.

Anyone wanting to buy illegal items—like cyber-attack tools or drugs—can find them on dark web marketplaces. These markets appear and disappear quickly as they get blocked. They are usually advertised on dark web forums, and some even have mirror sites on the clear web.

Researching the dark web is hard because marketplaces have short lifespans. They come and go quickly. That’s why NordLayer and NordStellar decided to analyze dark web forums instead.

Forums are more stable over time. This stability makes it possible to see trends in discussions. These forums mix legal topics like news, politics, and content sharing with illegal activities.

However, legal activities like whistleblowing make up less than 1% of the content. Illegal activities are the largest part. By studying these forums, we wanted to uncover new trends in illicit activities.

Our research shows that illicit posts peak in November, December, and January. The darkest months of the year also see the most activity in the web’s shadowy corners.

Why is winter the peak season for illicit posts?

We studied posts from June 2023 to October 2024. We categorized posts by topics and focused on illicit ones. Here’s how those posts were distributed:

These numbers reflect posts on the dark web, not actual attacks. However, research by BitNinja Security, Cloud Security Alliance, and Mimecast shows that Q4 is also when most cyber-attacks take place. This suggests a link between increased dark web activity and real-world cybercrime during this period.

Why are threat actors more active in dark months, both discussing illicit topics and committing crimes?

Carlos Salas (Sr. R&D Engineer at NordLayer): “In most industries, November to January is the busiest time, mainly because of the high amount of transactions from Thanksgiving, Black Friday, and Christmas. Criminals exploit this, knowing people are more likely to click on a phishing link while going through thousands of email orders and offers, compromising their network security.”

It’s a known issue. Black Friday is already called Black Fraud Day. In the UK only, more than 16,000 reports of online shopping fraud were recorded between November 2023 and January 2024, with each victim losing £695 on average.

Andrius Buinovskis (Head of Product at NordLayer): “Everyone is looking for gifts and the best prices, and fake ads try to hook you into deals. Bad actors exploit this season, using urgency tactics boosted by AI to spread threats. People are more relaxed and less cautious, paying less attention to how they use personal and company devices. Employees might receive phishing emails like a supposed ‘yearly bonus’ from the CEO, which could lead to catastrophic consequences for the company.”

But on dark web forums, people discuss not only cybercrime. A big part of forums is about sharing pirated software and media, like movies.

This number grows in dark months. Comparing the summer months of 2023 with November—January, the number of dark forum posts about all kinds of pirated content surged by 105%.

Vakaris Noreika (Head of Product at NordStellar): “I think it’s the weather, to be honest. People tend to stay at home more and sit at their computers bored, which makes them more active in their cybercriminal activities. We’ve seen a similar effect during the COVID lockdown when the number of dark web users increased a lot. We also see fewer large data breaches in the summer, and this cycle seems to repeat every year.”

Like advanced persistent threats, “advanced persistent teenagers” are now a problem. Bored but skilled threat actors cause major disruptions. They trick employees with emails and calls, posing as help desk staff. These attacks lead to data breaches affecting millions. Teenagers now show techniques once limited to nation-states.

Another factor is adding to the boredom of dark web forum users. They are mostly from countries where winter is pretty harsh. Most users accessing Tor—the browser used for dark web activities—are from Germany (36%), the US (14%), and Finland (4%). For countries where users access Tor via bridges, the top is Russia (41%). Maybe dark web forums are just the coziest winter hangouts.

Changing platforms and AI effects on cybercrime

Our research shows that September and October of 2024 had much fewer posts about illicit things on dark web forums than a year before. Why is that?

Vakaris Noreika: “There could be many reasons why this happens. The most notable ones are maybe the platform changes; some hacker forums close, others open up, some become popular to fade out later.

There are some hacker communities, especially from Russia, which have been active for more than 20 years now. This is because the forum owners don’t get arrested, unlike forum owners from the US, UK, etc., who do get arrested way more often.

Telegram has also been a huge platform change. We’ve seen exponential growth in hacking-related activity on Telegram since the beginning of the war in Ukraine. But Telegram activity is focused on niche topics, while forums cover a wider range of ideas.”

Another trend affecting dark web discussions could be AI use in cybercrime.

Retail and cloud computing giant Amazon, which can now view activity on around 25% of all IP addresses on the internet, says it is seeing hundreds of millions more possible cyber threats across the web each day compared to earlier this year. They used to see about 100 million hits per day, but that number has grown to 750 million over six or seven months.

Amazon’s Chief Information Security Officer is sure AI is making tasks easier for ordinary people, allowing them to do things they couldn’t do before just by asking the computer. This might explain fewer discussions on dark web forums—why ask others when AI can do the work for you?

How to protect organizations during peak cybercrime seasons

So, winter months bring not only holidays but also heightened cyber risks. Instead of enjoying time with your family, you might find yourself dealing with cyber-attacks.

But don’t worry—there are steps you can take to protect your organization. The good news is these measures aren’t expensive or hard to implement.

Many of these precautions are the same as those needed year-round. Basic cybersecurity practices like employee training, strong passwords, and regular software updates are essential.

Employee education is the first line of defense.

Vakaris Noreika: “It’s hard to control what happens with your employees. It’s unavoidable that their data will be leaked online, and this data might be used to attack your company. Here’s what I always encourage companies to do:

  1. Educate employees about phishing, credential stuffing, and other popular attack methods.
  2. Take care of the information that’s already leaked: monitor it and react. NordStellar can help with that.
  3. Manage access to important company resources carefully.

By doing this, you will be better off than 99% of companies around.”

Prepare now to minimize risks during the peak cyber-attack season.

Carlos Salas:Double down on cybersecurity awareness in months before the high season. Consider having a pentest done beforehand to know what could be exploited by criminals.

That said, we’re humans, and there will always be a chance of clicking the wrong link or sharing the wrong files. So, practices such as network segmentation, setting up security policies for devices, or using toolsets such as Data Loss Prevention suites and malware protection are a must-have. They help contain the threats and minimize the ‘blast radius’ of any security incident.”

With AI making cyber-attacks easier, it’s crucial to think about these things right now, when the cyber-attack season is at its peak. The next year could bring even more advanced threats.

So, give your company a Christmas present and invest in a solid cybersecurity solution.

Methodology

NordStellar acquired data from over 80 forums where illicit activities are most often discussed. These forums span different web layers: the clear web, the deep web, and the dark web. We gathered textual content from forum threads between June 2023 and October 2024. The numbers we obtained represent the number of forum posts.

We used a fine-tuned AI model to categorize dark web posts into 67 tags. These tags were then grouped into 10 broader categories. For example, the tag “SERVICE” refers to posts where users offer services for a fee, including hacking or hiring hitmen. This tag falls under “Illicit services and marketplaces.” 

The study is thorough but has limitations from analyzing posts on approximately 80 forums only. Additionally, the shorter lifecycle of criminal sites and the rapid rise of mirror sites can affect data consistency and completeness.

About NordLayer
NordLayer is an adaptive network access security solution for modern businesses – from the world’s most trusted cybersecurity brand, Nord Security.

The web has become a chaotic space where safety and trust have been compromised by cybercrime and data protection issues. Therefore, our team has a global mission to shape a more trusted and peaceful online future for people everywhere.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Keepit recognized for its green data centers by Business Awards UK, 2024 Corporate Sustainability Awards

Keepit has been awarded “Best Green Initiative” by the Business Awards UK, 2024 Corporate Sustainability Awards.

Copenhagen, Denmark – November 29, 2024 – Keepit, a global provider of a comprehensive cloud backup and recovery platform, today announced it has been awarded “Best Green Initiative” by the Business Awards UK, 2024 Corporate Sustainability Awards. Keepit’s data centers in the Americas and EMEA have been powered by 100% renewable energy since 2023.

Headquartered in Copenhagen, Denmark, with offices in the US, Germany, and the UK, Keepit counts The National Gallery and Oxford University Innovation Ltd among its UK customers.

“Keepit prides itself in having built its whole operation efficiently, with sustainability in mind. Providing our customers with the ability to secure their data on our platform, knowing we’re also doing our part to reduce environmental impact, is important to us as a company”, says Michele Hayes, CMO at Keepit.

Keepit’s continuing commitment to sustainability

Since 2023, all Keepit’s data centers in the Americas and EMEA have been powered by 100% renewable energy. Keepit reached this important green energy milestone ahead of other cloud-based backup vendors.

Keepit constructed its technology stack from the ground up, specifically designing it to efficiently address data storage challenges. This approach reflects a commitment to optimizing resource utilization and delivering a service that is not only effective but also resource efficient. Read more about Keepit’s commitment to sustainability.

Keepit platform was also named “Best Cybersecurity Backup Service” by Business Awards UK, 2024 Cybersecurity and Resilience Awards.

About Keepit
At Keepit, we believe in a digital future where all software is delivered as a service. Keepit’s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×