top of page
  • mark13908

Altaro, and the fight against vulnerable EndPoint security

Updated: Jan 19, 2021

Data backup is essential for every aspect of business. When it comes to backups, there is a certain peace of mind that they offer, especially when it is regularly monitored by a third-party IT companies such as ourselves, and replicated in a virtual server. We have talked at length regarding why this is, and have discussed the many ways of which backups can be maintained and actively monitored.

confident man on computer

In the ever-growing world of the business, having the proper preventative procedures in place is not something to ever skimp on. When data gets lost, businesses can be severely hindered from anywhere between a few minutes to a few days. It could force them to use outdated and unpatched data and software, and more importantly, valuable highly personal customer data can be leaked rapidly. The trouble is people often become complacent with the cloud security procedures currently practiced in the workplace, and have absolute trust in whatever their business executives have deemed as acceptable.

Although this is not necessarily a bad practice, the trouble comes off the bat of many employees preferring the BYOD workplace. This can be for several reasons. Whether it’s the familiarity that is attractive or the fact that they trust their own device over those offered by the business, it provides a false sense of security. If your business is sitting comfortably on the fact that all of your data is backed up on a remote server and you have nothing to worry about, you may want to reconsider.

Realistically, with BYOD becoming the new norm, many users would – without thinking – save all of their word documents, excel spreadsheets, graphs, and client reports directly to their own devices hard drive, we then pose you this question: If something were to happen to your own device or a device owned by one of your employees, can you be 100% certain that whoever was affected would be able to quickly recover any lost data saved to that devices hard drive?

One of the most crucial oversights many businesses make is end-point security. An endpoint is a remote computing device that communicates back and forth with a network to which it is connected. Examples of endpoints include:

- Desktops

- Laptops

- Smartphones

- Tablets

- Servers

- Workstations

- Internet-of-things (IoT) devices

They represent vulnerability points that cybercriminals exploit. It is where the attacker executes the code and lays the roots of a cyber-attack, allowing for assets to be encrypted or leveraged. Due to the growing presence of BYOD, smartphones, and tablets, end-point security is a very real and frightening concern. The reason for targeting endpoints include, but are not limited to:

- Use of an endpoint as an entry and exit point to access high-value assets and information on an organization’s network.

- Accessing assets on the endpoint to exfiltrate or hold hostage, either for ransom or purely for disruption.

- Take control of the device and use it in a botnet to execute a DoS attack.

Prevention is often the key to precious data loss. If you can intervene early enough then there is a high chance that you can mitigate the loss or avoid it all together. This is where Altaro EndPoint Backup comes in. Altaro Backup enables a safety net further securing your business. When installed, we can restore all your files and folders from a Windows workstation, laptop or other devices with ease.

It is good practice as an employee to use a VPN when working from home or accessing a public network, however, Altaro conveniently backs up endpoint roaming without requiring a VPN to do so. Further increasing productivity as the connection does not have to bounce around the encryption tunnel. Through the creation of backup policies you can ensure the safety and security of your network browsing -in the office or otherwise- without having to do anything yourself.

Altaro can create these backup policies to define everything from the backup location to frequency and retention. When using multiple backup policies, it can easily configure the backup settings for a large group of endpoints. For example, it can set up a policy specific to your sales team and a different one for your administration team. What this means for you is that Altaro can indvidualise and specify a policy that meets the needs of each for your departments, and can keep a close eye on all of it.

It can also provide you with unlimited scalability.

As a business, scalability is the holy grail. Every business needs to have the scalability to match changes as they occur. Whether up-sizing, down-sizing, or facing a merger. Without the versatility to handle this change, your business can severely suffer. With Altaro Backup, you can have peace of mind knowing that your business can seamlessly match the changes required as you have more workstations and laptops that need backing up, providing seamless coverage via the same solution.

If you are unsure of whether your company is protected for all scenarios or want to further improve security for your business, ACS has the experts ready to point you in the right direction and lend a hand in providing your business with complete and total security.

19 views0 comments


  • Facebook
  • LinkedIn
  • Twitter
bottom of page