| | |
|
| |
| | |
|
|
| | |
|
LTO Tape and The Cybersecurity Ecosystem Building Blocks
Physical Tape Air Gap |
An electronically disconnected or physically isolated copy of data in a robotic tape library or tape rack
preventing cybercriminals from directly attacking a backup, archive, or other data copy on magnetic
tape. Data stored behind a physical tape air gap cannot be hacked. |
|
Logical Tape Air Gap |
Uses network and user access controls to create additional levels of data isolation from the production
and primary backup environments. Since logical air gaps still have an electronic connection and it
requires human intervention, it is not as secure as a physical air gap. |
|
3-2-1-1 Backup Strategy |
Back up data regularly using the 3-2-1-1 backup strategy. Three copies of data on two different
storage media, one offsite copy and one air gap copy. The cloud is often used to store the offsite and
air gapped (offline) copies of backup and archive data. |
|
Encryption
(Incomprehensible Text) |
Encryption translates data into an unreadable format. Only people with access to a secret decryption
key or password can read it. One of the most popular and effective security methods available, most
organizations use at least 256-bit AES encryption for data at rest and in motion. |
|
WORM
(Immutable Copy) |
Write-Once-Read-Many provides immutable storage and is used for tape and HDDs. You can write
data to a WORM storage device or media exactly one time. After that, no one can legitimately change
the data in any way. The data can be read an unlimited number of times. |
|
Multi-factor
Authentication
(MFA) |
MFA is an authentication method that requires the user to provide two or more verification factors
beyond the standard username and password, often including a one-time password, to gain access to a
resource such as an application or online account. |
|
Antivirus Software |
Antivirus (AV) software scans, detects and deletes viruses (malware) from a computer. Most AV
software runs automatically in the background to provide real-time protection against virus attacks.
Use antivirus software from trusted vendors and only run one AV tool on your device. |
|
Firewalls |
A firewall is a network security device that monitors and filters incoming and outgoing network traffic
based on an organization’s previously established security policies. |
|
VPNs |
A virtual private network allows users to create a private connection over a less private network by
creating an encrypted tunnel between your computer and the internet. |
|
Contact your BackupWorks Account Rep today for
all your LTO Ultrium needs at 866 801 2944
| |
| | |
|
|
|