{"id":1784,"date":"2016-10-27T21:28:19","date_gmt":"2016-10-27T21:28:19","guid":{"rendered":"https:\/\/blog.zerowait.com\/?p=1784"},"modified":"2023-05-10T14:41:11","modified_gmt":"2023-05-10T14:41:11","slug":"weighing-internet-availability-and-on-premise-systems","status":"publish","type":"post","link":"https:\/\/blog.zerowait.com\/index.php\/2016\/10\/27\/weighing-internet-availability-and-on-premise-systems\/","title":{"rendered":"Weighing Internet availability and On premise systems"},"content":{"rendered":"<h3><span style=\"color: #3366ff;\"><em><span style=\"color: #000000;\">&#8220;Our worst hacking fears came true on Friday as criminals deployed millions of everyday objects\u2014internet-connected cameras, printers, and so on\u2014to launch an attack on a critical part of the Internet. The attack was a success, crippling the websites of major companies like Amazon, Netflix and Twitter for hours at a time.&#8221;<\/span><\/em> <a href=\"http:\/\/fortune.com\/2016\/10\/23\/internet-attack-perpetrator\/\" target=\"_blank\" rel=\"noopener\">http:\/\/fortune.com\/2016\/10\/23\/internet-attack-perpetrator\/<\/a><\/span><\/h3>\n<p>Many of our clients use cloud services for their critical business services and storage needs, and typically they have made some calculation basing the risk of availability and security against the cost of keeping equipment and services on site.\u00a0 For companies like this the recent internet attacks on DYN have awakened that debate.<\/p>\n<p>The availability of email is essential to continuing in business, and to save costs many companies use outsourced email providers-. It\u2019s not just hardware\u2014the servers, firewalls, spam filters, email archiving storage,&#8211;but also administration.\u00a0 Email is a resource hog.\u00a0 On the flip side, you have the potential for an attack on an external email provider, potentially bringing down the service completely:\u00a0 Thousands of customers suddenly cut off from email! Can your company survive in today\u2019s integrated environment without access to your email for days, weeks or even months?\u00a0 What recourse do you have if your email is brought down by a malicious attack? How long will it take to recover once services are restored, if they are restored? Further complicating the issue for many companies is the use of IP telephony which can also be compromised in an internet attack.\u00a0 Phones out, too!?\u00a0 The whole scenario is pretty bleak, right?<\/p>\n<p><strong>So you need to ask these questions and more\u00a0 &#8211; now, not later:<\/strong><\/p>\n<ul>\n<li>If an attacker targets email services and internet telephony services how will your organization communicate with your customers and vendors?\u00a0 Most companies today are so integrated with on line services that if the internet gets brought down for a couple of weeks they will have a hard time recovering.<\/li>\n<li>Does your Disaster Recovery plan include a section on a complete communication meltdown of the internet?<\/li>\n<li>How would your company survive if all your data is at a cloud provider and some nefarious hacker simply mixed up all your customer, accounting and payroll records so your staff could no longer access your databases reliably?<\/li>\n<\/ul>\n<p>As a networking and storage focused company we believe there must be a balance between on-premise hardware and services and internet-based virtual solutions.\u00a0 As we\u2019ve seen, the risk of an internet based service provider being brought down is very real.\u00a0 Based on the recent experience of DYN, we think that more companies must reconsider the risks associated with their cloud based solutions providers. If the internet is brought down, and you have your business information on premises, at least your company will be able to function after communications are restored.\u00a0 If not, the dream of a virtualized world of internet-based services and storage for an integrated economy like we have today could quickly become a nightmare.\u00a0 Don\u2019t let it happen to you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Our worst hacking fears came true on Friday as criminals deployed millions of everyday objects\u2014internet-connected cameras, printers, and so on\u2014to launch an attack on a critical part of the Internet. The attack was a success, crippling the websites of major &hellip; <a href=\"https:\/\/blog.zerowait.com\/index.php\/2016\/10\/27\/weighing-internet-availability-and-on-premise-systems\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/posts\/1784"}],"collection":[{"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/comments?post=1784"}],"version-history":[{"count":10,"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/posts\/1784\/revisions"}],"predecessor-version":[{"id":2603,"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/posts\/1784\/revisions\/2603"}],"wp:attachment":[{"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/media?parent=1784"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/categories?post=1784"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.zerowait.com\/index.php\/wp-json\/wp\/v2\/tags?post=1784"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}