Quote:
Originally Posted by Z-man
All of this extra storage won't be very helpful to you, if they are constantly connected to a system that has been compromised. I suspect that any encryption trojan will go after any and ALL storage it finds attached to the host system. So - you will have backups of your files that were encrypted, but your backups will also have the same fate - they will also be malicously encrypted.
But, on the other hand - if your backup device is only connected when you perform a daily or incremental backup, then you minimize the risk of your backup environment being compromised. Better yet - it also makes sense to copy or data onto removable media like digital tape or Bluray that is write-protected (WORM technlology - write once, read many). Store these backups (of your backups) in another house / building to counter physical disasters.
I work in IT - and am a SAN / Storage architect. I also manage my company's disaster recovery for our mainframe environment. And - like the saying goes - you can never have too many backups...
-Z-man
|
The main box is my personal server. The only executables on it other than what the OS requires are builds/source code from our developers that I put there. And I'm the only user with access to it. The only external network connections it makes is for software updates direct from Apple and the connection to it internally is not persistent.
I'm not worried about that box being compromised. I'm worried about hardware failure as some of the drives are aging out.
I did a stint as Director of CA's consumer security group.
Not my first rodeo.