News
The Importance of Architecting a DR Plan to Enable Application Recovery in the Cloud
Published
4 weeks agoon
By
admin
Written by Sam Woodcock, Senior Director of Cloud Strategy, 11:11 Systems
Today being impacted by a cybersecurity incident is almost inevitable and it is not a question of if, or even when, but how often an organisation will be attacked. According to Veeam’s 2023 Data Protection Trends Report, which surveyed 4,200 business and IT leaders on their IT and data protection strategies and plans, 85% of organisations said they have had at least one ransomware attack in the last 12 months and 79% of respondents said they have a protection gap. Additionally, according to the UK’s Information Commissioner’s Office, one in three data breaches in 2022 were caused by ransomware. Therefore, as well as considering preventative cybersecurity measures, companies also need to think about whether and how they will recover from a malicious attack. How quickly they can recover their systems and applications and the cost of recovery to the business.
Do you have a plan?
A fundamental question every organisation should ask themselves is: Would we survive a cybersecurity attack? Along with: Do we know our level of preparedness; do we know how to recover our critical applications; do we understand the risks the organisation faces and do we regularly test our recovery plans?
Here at 11:11 Systems, we know that recovering from a data-compromising cyberattack requires planning, investment, capabilities, procedures, and so much more. Additionally, we understand how important it is for organisations to recognise the difference between traditional disaster recovery, in response to incidents such as wildfires, earthquakes, and extreme weather conditions, and compromised data recovery in the event of a cybersecurity incident.
Unfortunately, as the statistics above highlight, the latter is the more likely and more impactful disaster recovery event and unfortunately an interruption to operations caused by a cyberattack can cost businesses an enormous amount, financially and reputationally.
Cyber and back-up teams must be aligned
Another key finding from the Veeam research was that the vast majority of organisations surveyed had a hybrid environment, with an even split across architectures and workloads in the cloud, in virtual set ups, and on-premises. The key takeaway here is that modern data protection solutions must provide equitable capabilities across all architectures (physical, virtual, and cloud). In addition, organisations should plan for workloads moving across clouds and even back on-premises, and data protection strategies should accommodate for that fluidity. This means cyber and back-up teams must be aligned, and back-up must be part of an organisation’s wider cybersecurity strategy and integrate with modern systems management.
Interestingly, the research went on to highlight that 37% of victim organisations of a ransomware attack had a no pay policy, but regardless of their policy 80% of companies paid the ransom anyway. More concerningly, 15 to 20% of those who paid still couldn’t recover their data.
So, what should an organisation do to ensure that it can recover important applications?
In our cloud-centric world, organisations are creating an incredible amount of applications and data to drive their operations. IT teams use complex software programmes and applications that rely on other applications, external services, distributed systems, and various data sources. Application recovery planning helps organisations quickly recover critical data, applications, or systems in case of an unexpected outage or a cyber incident.
Application recovery requires careful planning
Determining how to protect and recover an application can often be easier than determining how quickly your business needs that application recovered. Establishing the correct recovery point objective (RPO) targets at an application level is a critical part of DR planning.
It’s important to understand best practices for building an application recovery plan for both simple and complex applications. Especially with dependent external software programmes and services.
The key to this is understanding how different components of the application interact with each other. This involves identifying all the external services and dependencies that the application relies on and understanding how they work together.
The organisation needs to think about compatibility and verification
In other words what technology should it leverage and where is the best place to bring applications back up and running from a compatibility perspective? Key questions to consider here are:
- Is my hypervisor and versioning compatible with the cloud solution?
- Is my virtual guest hardware also compatible
- How can I ensure that the architecture of my VMs is considered and compatible with the cloud
When considering connectivity, questions to think about include whether you have enough bandwidth to leverage cloud services as well as how to select the best cloud location for a positive and seamless end user experience. Likewise, how can you validate that connectivity will allow the organisation to meet its RPO objectives?
In a complex hybrid environment with many different components, it is also important to consider application dependency and to map out how applications work, how they communicate, and which are dependent on each other. To tackle these challenges, it is essential to understand the application architecture and the dependencies between its different components. This may involve conducting a detailed application analysis and identifying all external software services, systems, and dependencies.
This type of exercise should be undertaken on a continuous basis because the situation is dynamic and can change very quickly. A deep understanding of application and infrastructure is critical to successful application recovery, as is understanding end user access and ensuring a seamless user experience.
So, what are the key steps an organisation should take to recover applications from an attack?
- Identify and isolate the affected systems: As soon as the attack gets detected, the first step is to identify the affected systems and isolate them from the rest of the network to prevent further spread of the infection.
- Assess the damage: The next step is to assess the extent of the damage caused by the attack, including the loss of data and the compromise of critical systems. This assessment will help determine the application recovery strategy.
- Restore from back-ups: If you have backups available, you can use them to restore the system to its previous state. To ensure data integrity and system functionality, you should thoroughly test the recovery process.
- Rebuild affected systems: If backups are unavailable or the data gets corrupted, you must rebuild the affected systems from scratch. This process involves rebuilding the operating system, applications, and data, which can be time-consuming and challenging.
- Improve security measures: Once the system has been restored or rebuilt, it is essential to improve the security posture to prevent attacks in the future.
To mitigate these risks, it is critical to have a robust application recovery DR plan in place that includes regular back-ups, testing, and security measures to prevent such attacks. Having a clear communication plan is vital to inform stakeholders of the situation and the recovery. As the statistics in the Veeam Data Protection Trends report highlight, having a DR plan for application recovery in the cloud isn’t an option —it’s a must.
You may like
News
Unified ticketing: how can transport stakeholders ensure interoperability?
Published
2 days agoon
December 1, 2023By
admin
Arnaud Depaigne, Product Manager – Smart Mobility, and Taoufik Sakhi, VP Deputy – Technical Advisory at Fime
Public Transport Operators and Authorities (PTOs / PTAs) are under constant pressure to deliver a reliable service. And with different passenger groups to consider, each with unique demands, operators must develop smarter and more innovative ticketing experiences to keep up with the rapidly evolving smart mobility landscape.
PTOs and PTAs must work with other stakeholders in the transit ecosystem to create solutions while navigating incumbent systems, funding concerns and ever-changing political challenges. All of this must be considered while ensuring that ticketing systems meet the needs and expectations of passengers. In the second blog in our series on unified and interoperable ticketing, we will explore the factors that transport stakeholders must consider when implementing a unified ticketing approach.
Political and administrative considerations
Public transport is by its very name public. Be it operated by governmental organizations (at either the local or national level) or by private enterprise, it remains at its heart a public service. This means that it is subject to the scrutiny and regulation of local and regional decision makers and is often at the center of legislative discussions.
Political representatives frequently champion policies that directly impact transit networks. A common example of this is promoting free or concessionary fares for youth, students and seniors. Others may endorse large-scale infrastructure projects or network overhauls as part of their campaigning. However, this can also go the other way, with certain candidates advocating defunding or eliminating transit projects entirely.
This creates an even greater challenge when a network extends across two or more administrative boundaries. Two neighboring areas may have administrations which prioritize public transport differently. This can mean a network must deal with discrepancies between investment in modern infrastructure, funding and fare concessions. By adopting a unified ticketing model, transport stakeholders can work together to develop an interoperable regional network while remaining compliant with legislated priorities, as well as encouraging a modal shift away from private vehicle usage.
Funding to cost saving
The budget a network must work within is another major differentiator between networks. As mentioned above, the local government often has a large role in dictating this, but other factors such as ridership and ticket sales can have a significant impact too. Funding can also be obtained through Public-Private Partnerships (PPPs), which may require the operator to work within a framework dictated by a third party to achieve certain profitability targets.
Another concern is legacy debt and the available cash flow of a network. The timelines for implementing a new ticketing system are typically quite long, as specifications and deployment plans need validation from multiple stakeholders. These can include the national and local authorities, employee unions and passenger unions in addition to PTA, PTOs and suppliers. Engaging these stakeholders at the build stage can be crucial to reducing costs later on. In doing so, a system can be designed to meet user needs without unnecessary complexity, helping reduce potential project expenditures and the technical risks of integration. During the run phase, it enables more flexible equipment procurement and operational efficiency while also improving maintenance and staff skill management between operators.
Working within a fragmented market
Unlike the telecommunications or payments ecosystems, there is no globally recognized initiative for the standardization of ticketing. Initiatives such as ISO 14443 (contactless proximity cards), ISO 24192 (communication between contactless readers and fare media in public transport), CSN EN 12896 (Reference data model – Transmodel), CEN/TS 16614 (Public transport network topology exchange format- NeTEx), General Transit Feed Specification (GTFS) and others, have attempted to create consistency. However, each of these allows for an element of interpretation to account for local needs and requirements.
Furthermore, incumbent ticketing solutions have most likely been developed by market leaders in each region over a number of decades. These solutions each have their own design choices, with decisions driven by industrial optimization. Upgrades to stay in line with contemporary norms are often expensive. Additionally, meeting new operational requirements while keeping incumbent systems up and running can drastically lengthen the migration process.
While migrating to unified ticketing may require a significant effort to begin with, the long-term benefits make it worth it, as PTOs and PTAs are prepared for potentially the next decades of operations and upgrades. It places PTAs and PTOs in a strong position to protect their sovereignty, supported by industry leaders championing open standards. Unified ticketing development can pool the resources of operators and authorities, accompanied by partners that will manage integration and implementation with minimal disruption to the existing ticketing systems.
Finding the right solution
PTOs, PTAs and transit solution providers undoubtedly have a complex task designing and implementing flexible, scalable ticketing solutions. They must meet the evolving demands of customers while navigating numerous legislative and regulatory requirements dictated to them by local authorities. Unified ticketing is a way that resources can be combined and optimized to help provide a quality service and achieve operational efficiencies while keeping on track for their profitability targets.
Fime can work alongside multiple operators to guide them through the process of pooling their resources to create a unified ticketing system that works. This ensures that they meet the technical and quality standards they pride themselves on, while also complying with their transit policy and budget constraints.
Learn more about how Fime can help you accelerate your ticketing offer to create frictionless unified ticketing for passengers.
News
Provenir and Trustfull Agree Global Partnership
Published
3 days agoon
November 30, 2023By
admin
Trustfull and Provenir to deliver innovative risk decisioning using digital footprints via new global partnership.
Trustfull, the digital risk decisioning platform and Provenir, a global leader in credit and fraud risk decisioning technology have announced a global partnership that sees Trustfull joining Provenir’s Data Marketplace.
Trustfull enables companies to leverage the power of alternative data and digital footprint analytics to enhance their identity screening, prevent fraud, and improve digital onboarding experiences through advanced trust and risk signals coming from email, phone number, IP address, device, and browser data.
Provenir is a global leader in credit and fraud decisioning solutions that enable financial services organisations to redefine customer decisioning by optimising any decision across the customer journey. With a low-code UI, dynamic data orchestration, and flexible analytics deployment, Provenir’s AI-powered decisioning platform powers enhanced decisioning accuracy, speed and agility.
Provenir’s Global Data Marketplace brings together offerings from data partners around the globe and creates an ecosystem for organisations that are seeking an easy-to-use cloud solution for data consumption across their decisioning processes. With fully maintained API connections to both traditional and alternative data providers, organisations can easily add and test new data sources in minutes.
The synergy created from this partnership will provide clients access to a vast array of data sources, including new alternatives from social and web apps, telco data, among others — all seamlessly integrated with the Provenir decisioning engine, enabling clients to make smarter risk decisions faster. Most importantly, Trustfull clients will benefit from a data source that is truly global, allowing integration with any international market.
“We’re excited to welcome Trustfull to the Provenir Marketplace as we see increasing demand from clients on new sources of digital signals to further verify identity and prevent fraud,” said Carol Hamilton, Chief Product Officer at Provenir. “Trustfull’s solution brings a unique blend of data sources, accuracy, and risk scoring that is perfectly aligned with the Provenir decisioning technology.”
Alex Tonello, Chief Revenue Officer at Trustfull said about the partnership: “This strategic collaboration with Provenir is perfectly aligned with Trustfull’s ambition to become the preferred destination for enterprise clients seeking technology to support more accurate risk decisions, especially during a pre-KYC screening phase. Most importantly, the partnership offers clients an easier, single point of integration for organisations looking for comprehensive risk orchestration.”
Magazine
Trending


Revolutionizing Risk: Innovative Derivatives to Support the Evolution of Commercial Space
By Grant Gryska, Co-Founder and Director of Markets at Allocation.Space The space economy continues to expand rapidly, crossing $500bn...


How technology can help win the war on financial crime
By Andrew Doyle, CEO of AML compliance software, NorthRow Financial crime is on the rise and the stats are...


In 2024, payments will evolve to broaden accessibility
Attributed to Roy Aston, COO at Paysafe. As we look to 2024 and beyond, businesses will need to adapt...


2024 Payments Predictions
Alan Irwin, Vice President of Product & Solutions Europe, Global Payments: Open banking in 2024 will be all about the...


How to protect your business from the rise of sophisticated cyberattacks
Suhaib Zaheer SVP, Managed Hosting at Digital Ocean & GM, Cloudways In an age where technology drives business operations, the...


Increasing the visibility of assets: How will businesses track assets in 2024
Liam Reid, Technology and Innovation Director at The Barcode Warehouse There is a growing trend towards using device tracking...


Why asset management comms are samey and boring, and what you can do about it.
Tom Knox, Executive Partner at MullenLowe In asset management standardised communications seem to be a given. Our recent semiotic...


Unified ticketing: how can transport stakeholders ensure interoperability?
Arnaud Depaigne, Product Manager – Smart Mobility, and Taoufik Sakhi, VP Deputy – Technical Advisory at Fime Public Transport...


Is social housing at breaking point? How to tackle the social housing crisis in the UK
By Julie Thompson, Head of Tenant Liaison, Assisted Living Project The housing market is facing a huge upheaval with inflation rising...


Everybody wins with new Consumer Credit regulations as borrowing soars
By Mike Ward, Executive Chairman of Armalytix Why the FCA’s new regulations for the consumer credit sector are a...


CFOs: Want to reduce stock levels and improve margins in 2024?
Rob Shaw, SVP and General Manager EMEA, Fluent Commerce If any one word could encapsulate 2023, it would be...


Provenir and Trustfull Agree Global Partnership
Trustfull and Provenir to deliver innovative risk decisioning using digital footprints via new global partnership. Trustfull, the digital risk decisioning...


Driving Transformation in the Financial Sector: The Impact of AI in Finance
Wilson Chan, CEO of Permutable AI In the dynamic landscape of financial evolution, AI is a major disruptor, a...


Why financial brands should experiment to effectively innovate
by CJ Daniel-Nield, Co-Founder at digital product studio Planes The financial sector is experiencing a surge in innovation through product....


Consumers are ready to switch, are you ready to keep them?
Amanda Silcock, Senior Director, Client Success The current economic climate has meant that people across the UK have been...


Hype, Hysteria & Hope: AI’s Evolutionary Journey and What it Means for Financial Services
Written by Gabriel Hopkins, Chief Product Officer at Ripjar Almost a year to the day since ChatGPT launched, the...


Exploring the intricate link between commodity prices and forex markets
Many investors have dabbled in the world of commodities and/or forex trading. But few understand the intricate link between the...


Five predictions for digital service offerings in the UK in 2024
Mike Kiely, Regional Senior Director at IDnow With the rise of ChatGPT, the topics of fraud and deepfakes entered...


Non-bank financial intermediation: in turbulent times, how can incumbents manage risk?
By Muzammil Shabudin, UKI Risk CxP Advisory Lead at SAS UK & Ireland It’s safe to say the banking...


Rigby Capital unveils a new era of ESG-led IT financing
Simon Everidge, Managing Director of Rigby Capital UK A new collaboration between Rigby Capital, its sister company SCC, the...

Revolutionizing Risk: Innovative Derivatives to Support the Evolution of Commercial Space

How technology can help win the war on financial crime

In 2024, payments will evolve to broaden accessibility

2024 Payments Predictions

How to protect your business from the rise of sophisticated cyberattacks

Increasing the visibility of assets: How will businesses track assets in 2024

PCI DSS v.4.0 Latest Updates That You Need to Know

RBI’s MASTER DIRECTION ON DIGITAL PAYMENTS SECURITY CONTROLS

EMV® 3-D SECURE: ENABLING STRONG CUSTOMER AUTHENTICATION

HOW TO SIMPLIFY IDENTIFICATION IN THE GLOBAL DIGITAL ECONOMY WITH THE LEI

EXEGER – CHANGING THE PERCEPTION OF POWER

FUTURE FX PROMO
Trending
-
Business5 days ago
Consumers are ready to switch, are you ready to keep them?
-
Business3 days ago
CFOs: Want to reduce stock levels and improve margins in 2024?
-
News3 days ago
Provenir and Trustfull Agree Global Partnership
-
Finance3 days ago
Driving Transformation in the Financial Sector: The Impact of AI in Finance