DISASTER RECOVERY THE SOLUTION
The Italian story of the database of the Lazio Region, where it was encrypted the entire database and the entire backup database leads to say that many disaster recovery procedures in the face of malicious attack are not enough. Although in this case, it seems they haven’t been followed.
Having the backup database connected to the internet leads to risk its corruption.
We propose the solution.
The backup database must be separated from the on-line database and connected via two CRIPPTEOS 3001 stations, one coding inserted in the online database, and one decoding connected to the backup database. We remind you that CRIPTEOS3001 has 128 kilobytes long keys.
If the on-line database is attacked, and maybe even the CRIPTEOS3001 workstation attached to it, the backup database is saved with its encrypted data from us, of which however the database manager has the key.
This is made possible by the encryption speed features of the CRIPTEOS 3001 system, dive with a normal PC reaches the speed of a gigabyte of encrypted data in about 80 seconds.
Industry experts testify that we have an encryption speed comparable to that of hackers.
In other pages there are further explanations of how CRIPTEOS 3001 works.
Once the amount of data to be saved has been evaluated, backups can also be scheduled from hour to hour and not just daily.
The recovery is therefore easy.
For micro-company situations it is better to save on a hard-disk connected to the network only the time needed to save.
This is to face the classic ransomware, the one with ransom demand with payment in bitcoin.
The new attacks that involve the theft of data to publish and sell them, or maybe ask for a ransom not to publish them, can be easily tackled by encrypting all data entering the database with CRIPTEOS 3001 software from all devices accessing the database. This leads to a more complicated situation, having the database need processing and then you have to provide partial encryption of the data.
We remind however that the data that interest, names, addresses, medical records, credit cards are generally in the alphanumeric databases not indexed, while the indices and numbers on which to do the calculations have no interest for hackers. Even if it says a million-dollar payment, if the recipient’s first name and surname are encrypted for hackers, they become meaningless numbers, and therefore they have no economic value.
Generally, in fact, in databases The personal data are linked to an alphanumeric code that becomes key for all other processing, then encrypt The personal data makes the database unusable for hachers who want to blackmail and demand a ransom.
All documents and images would be cleverly encrypted by CRIPTEOS 3001, which is able to encrypt and decrypt all 256 symbols and ASCII characters.