• Our Services

      Browse all Our Services
      • Consultancy & Professional Services
      • Operational Services
      • Managed Services

      Consultancy and Professional Services that facilitate your business transformation

      Infrastructure Assessment

      Get a comprehensive overview of your IT environment.

      Design & Architecture

      Designing and building your IT Infrastructure Platform.

      Implementation

      Best practice implementations by certified and accredited consultants.

      Project Management

      A structured approach to delivering successful outcomes.

      Data Erasure

      100% certified erasure for complete peace of mind.

      Data Migration

      Our bespoke solution for securely migrating VMs, data and shares.

      Operational Services to optimise your performance and growth

      Hardware Maintenance

      Maximise the investment by extending the life of your current assets.

      Technical Support

      Comprehensive assistance for your IT operations and services.

      Data Centre Relocation Services

      Move your data centre with intensive planning and proven expertise.

      Managed Services for end-to-end IT activities.

      Managed Services

      We offer a complete managed service delivering all the technology, people and processes required to protect your business-critical systems.

    • Our Solutions

      Browse all Our Solutions
      • Data Center Transformation
      • Workforce Transformation
      • Networking & Security
      • Data Protection & Cyber-Recovery
      • Cyber Security

      Data Centre Transformation to help you realise your digital future

      Hybrid Cloud

      Giving customers interoperability between Public, Private and Edge clouds for ultimate flexibility.

      Private Cloud

      All the benefits of Public Cloud with the added security of an on-premise infrastructure.

      Hyper Convergence

      Streamline conventional server and storage elements into a single software-defined IT infrastructure platform.

      Virtualisation

      Save time and money by consolidating your applications onto a virtual hypervisor.

      Storage

      Our recommended modern storage architecture delivers consistent performance with low latency.

      Transform the place and the way you work

      Mobility

      Give your workforce greater flexibility to work from anywhere.

      Virtual Desktop Infrastructure (VDI)

      Manage your desktops from within the data centre.

      Advanced Security Solutions for your data and internal networks

      Networking & Security

      Meet the demands of high-performance networking with resilient, high-density, full-featured switching solutions.

      Defending your data with the most advanced technology

      Data Protection

      Integrated solutions that ensure you can protect, recover and replicate your data for backup, disaster recovery and business continuity as a whole.

      Cyber-Recovery

      High performance software and hardware solutions that protect your data following a disaster or malicious attack.

      Cyber Security

      Arctic Wolf

      Cyber Security portfolio of products, with stronger protection, faster outcomes with streamlined deployment.

    • Dell Technologies Showcase

      Products, Solutions, and Services
      • Data Center Solutions
      • Dell EMC Storage & Data Protection Solutions
      • PowerEdge Servers
      • Dell Technologies Cloud
      • Mid-Market Solutions
      • Optimize IT
      • Remote Working Solutions

      Data Center Solutions

      Get the agility, speed and scalability you need to improve customer experiences, and deliver better products and services faster - all by modernizing IT with Dell Technologies Data Center Solutions.

      Data Capital: Dell EMC Storage & Data Protection Solutions

      Inspired by data. Empowered by Modern IT.

      PowerEdge Servers The Bedrock of the Modern Data Center

      Modernize IT with server innovation

      Dell Technologies Cloud

      Take control of your cloud

      Mid-Market Solutions

      Explore solutions and products that scale to help your midmarket business grow.

      Optimize IT

      Optimize IT infrastructure to drive innovation and achieve real business outcomes.

      Remote Working Solutions

      Empower your remote workforce

    • About Us

      Learn about our company
      • About Constor
      • Case Studies
      • Culture & Careers
      • News & Blog
      • Privacy Policy
      • Contact Us

      A reliable associate for futuristic IT infrastructure solutions

      Ours is an organization of equality, where the ladder to the top is open to everyone.

      Be part of a global team that redefines the notion of IT infrastructure solutions

      Ours is an organization of equality, where the ladder to the top is open to everyone.

      A conversation goes a long way in building a long-lasting partnership

      Feel free to talk to us about your requirements and goals that you have envisaged to achieve.

      Stories of problem-solving, satisfaction and business growth

      Know about how we have eliminated the chances of insecurities, reduced the costs and enabled business growth.

      The insights we gained over the years are here

      Get to know us better by knowing about our expertise, insights, announcements and experiences that we would like to share.

      Privacy Policy

      We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy.

  • Tel: +44 (0) 207 961 9080

How secure is your data?

Home > Blog > How secure is your data?

I have been thinking for some time that I need to write a blog about how to protect data against Ransomware attacks and just like those customers who think “I’ll do that one day” and then it’s too late I’ve found the time to write it. As the world is gripped with the COVID-19 crisis, hackers and criminals are using this to their advantage. They target organisations by pushing compromised software onto systems often by watching the patch releases from suppliers like Microsoft and reverse engineering the patch to expose the vulnerability.

It’s just not customers who are being targeted these days, major vendors are being targeted as well and it can happen to anyone regardless of the size of the company. The cost of a security incident can be in the thousands, millions or scale to billions in some instances, an amount even the largest global businesses can’t sustain.

I have heard the phrases “Backup is boring”, “Backup is just an insurance”, “Data is protected using snapshots”, “We understand the risks of not having a backup” and others numerous times. With increase in hacks, backing up and protecting data is more important than ever. The best form of defense against a security incident is a good backup, but what if your backups get encrypted and held for ransom? What is the cost of not having a reliable backup?

Backups are supposed to be a last resort to get a business running again. I always stress to customers we should never consider backups an afterthought it shouldn’t be nice to have incase of an accidental deletion of a file, a human error or a virtual machine/server corruption. The ability to recover from known “good” backup and successfully restoring business services will protect you against having to paying any ransom.

Modern-day ransomware almost always scans for and targets the local backups during the initial phases of infection. If the ransomware can encrypt the backups or delete backups before the protected servers get encrypted, the higher the chances the hacker has of collecting the ransom so you can recover the files. This makes protecting the backups ever more important, as it has become the definitive line in the sand between paying a ransom and recovering the files or losing everything.
Now the question from anyone reading this far is how do we (Constor Solutions) help our customers when it comes to protecting data.

We ensure that when we transform our customers infrastructure:

  • They have a secure backup in place
  • Backup data is protected across sites (available in at least two locations)
  • Data is encrypted at source and inflight
  • Test restoring from a backup frequently
  • Protect the backup data in cloud as a third copy
  • Provide a fully air-gapped solutions as part of our service for the cyber protection

The best from of protection against a cyber-attack is to have an offsite air-gapped backup solution. An air-gapped backup solution is an offline copy of the backup data which will be completely isolated from your network. A segregated copy which will ensure that the data is clean and less likely to be impacted on a compromised network. This significantly increases the speed of recovery and effectively eliminates the need to pay a ransom. In addition to the air-gapped solution having a copy of the backup data in a public cloud will ensure that the services can be restored and available off-site for business continuity whilst the incident is investigated.

As a company ourselves we practice what we preach, having a copy of the backup data in the cloud allows us to:

  • Dramatically reduce downtime in case of an incident by spinning up the services in the cloud
  • Restoring the critical services in the cloud while the remediation is done at the original site(s)
  • Our IT team can concentrate on remediation of the compromised network while the production services and users can access resources/apps over the internet
  • Minimise the business impact while the issues are investigated

Data is the lifeblood of almost every company, having a secure data protection solution and policy should place as much emphasis on this as you put on your production SAN.

suman
Suman Ramesh Babu
Technical Director
Our Partners
Our services-led approach and partnership expertise helps us create a world of opportunity for our clients.

Leave a Reply