Apple’s solutions are seeing increasing use across the enterprise, but do you have a business resilience strategy in place in case things go wrong?
If you’re one of the estimated 73% of SMBs that have not yet made such preparation, now might be a good time to start.
Your data is your business
It’s challenging enough when a consumer user suffers data loss as precious memories and valuable information go up in the digital smoke. Natural disasters, technology and infrastructure problems or human-made problems such as burglary, cyberattacks or civil unrest can all impact the sanctity of your systems, whatever platform you use. It matters because in today’s connected world, your data is your business.
One way to approach business resilience is to adopt a mind-set in which you think about what happens if every piece of hardware your business uses fails at once.
While this might seem extreme, fire, flood or successful cyberattacks all threaten damage to your systems. And while the iPhones in your fleet may be left untouched, your internally hosted servers and on-site Macs and other equipment could suffer.
How do you protect yourself?
One part of the response is to put together and follow a data backup policy, but even if you do (and many do not), how robust is your protection? Do you have first line, second line, online and offline backups? Do you have a remote backup system in place? Do you use a password management system – and if you do are all the relevant master passwords held securely off-site?
It’s also important to develop a backup and recovery policy that companies and employees can easily maintain, including the use of cloud-based services.
Data stored in the normal course of business needs to be cohesively kept, as you do not want to have to explore every employee’s private Dropbox, Box, OneDrive or iCloud Drive account as you attempt to forensically pull all your information back after a disaster strikes.
It is also quite important to think about how your data flows.
While it’s less of an inherent problem for Apple systems, what happens if malware gets into your deployment? To what extent are your primary data backups sequestered from your day-to-day business, and what security verification policy do you have in place in order to ensure the integrity of the information you store in your primary backups?
The reason this matters is that in the event malware gets into your backup systems (perhaps hidden in something as seemingly innocuous as a PDF document), the problem could recur once you put all your enterprise kit back together.
The three-part approach
Reading around this topic and in previous discussions with people in this field, I’ve learned that businesses that manage to put good systems in place generally adopt a three-part strategy:
- Local backups: To shared local servers or locally attached hard drives.
- Online backups (offsite): For the very smallest SMEs, iCloud may be fine, but larger concerns will need shared online services, such as those from iDrive, Egnyte or BackBlaze.)
- Redundant backups: If local backups fail or online systems become compromised, a redundant backup system will have all assets regularly stored to a system held securely offsite. A consumer user may store their information on a drive at a trusted friend’s house, perhaps using two drives and swapping them out every few weeks. An enterprise may use the same rotating dual backup strategy to keep offsite backups regularly updated in a safe place. If you are based in an earthquake zone you might even choose to keep these in a completely different state.
It is important to note that whatever backup system is used is robustly protected with highly secure password systems. And make sure of clear role responsibilities so that someone is responsible for ensuring backups are successful.
The hierarchy of needs
While full backups are essential, not every piece of data is as valuable as everything else. This is why organizations should prioritize their data in terms of its importance. Typically, the order goes:
- Business operations/HR.
- CRM information.
- Documents and email.
- Everything else.
In most cases, it makes sense to run daily backups of the most important information. Automated systems (and it’s best to automate the process as much as possible) can be set to run these.
The role of MDM
If you use a Mobile Device Management system to handle your fleet, you should find it a little easier to deploy and equip replacement systems in the event of disaster, as long as you maintain backups offsite for access by your device management provision system.
Combined with regular backup policy, such as arranging weekly or monthly device backups from iOS devices locally to Macs using the Finder, and subsequent Mac backups using Apple’s Time Machine system, it’s possible to ensure that data integrity is near complete.
(Independently stored information should be thoroughly vetted before being introduced to core backup systems to avoid malware infection.)
A good MDM system equipped with robust security and management tools should help with the process.
Prevention is the core defense
The first line of defense is prevention and while you can’t prevent every imaginable crisis, you can prevent some. It means preemptive risk management and fostering situational and security awareness across your teams. Empoyees may be the first to notice any anomalies that signal a threat, and you need to work with them to provide a supportive culture in which they feel empowered to come forward with any concerns.
This is also why it’s important to develop a friction-free approach to your backup resilience strategy, ensuring whatever protections you put in place are used. Consumer-level backup services may form part of your preparedness strategy, but only if this is strategically managed through enterprise storage systems or emerging solutions that can work with consumer options, such as Challo.
Finally, it is extremely important to put together a plan to reconstruct your systems after a crisis. In an ideal world, if crisis strikes your organization then your people should already know their roles and be aware of what steps they should immediately take as you prepare to rebuild your organization.
Even the most die-hard Mac user knows that putting things together after data loss can be a lengthy and frustrating task if you are unprepared. (iCloud Drive helps a great deal with this.)
Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.
Copyright © 2020 IDG Communications, Inc.