Nick Shmakov

Does Zero Trust Eliminate the Need for Backups?

Does Zero Trust Eliminate the Need for Backups?

The rise of cloud storage solutions has revolutionized the way businesses handle data. The cloud’s promise of accessibility, scalability, and security has many believing their data is invincible. Add to this the increasing adoption of the Zero Trust model – a security concept where no one, inside or outside the organization, is inherently trusted – and it’s easy to understand why some might think backups are obsolete. But are they?

1. The Illusion of Cloud Safety

While cloud storage providers invest heavily in security, no system is entirely infallible. Contrary to popular belief:

  • Data Loss Can Still Happen: Whether due to human error, software bugs, or hardware failures, data stored in the cloud can still be lost.
  • Ransomware Threats: Cybercriminals have evolved, targeting cloud storage with sophisticated ransomware attacks. Even if data isn’t lost, access can be temporarily or permanently denied.

2. Zero Trust: A Layer, Not a Panacea

Zero Trust architectures, which operate on the principle “never trust, always verify,” indeed offer a robust security layer. However:

  • Potential Vulnerabilities: While Zero Trust greatly minimizes the risk, it’s not absolute. Advanced persistent threats (APTs) and determined malicious actors can still find ways to penetrate networks. According to cybersecurity experts, while Zero Trust can significantly reduce the attack surface, no security model can guarantee 100% protection.
  • Internal Threats: Zero Trust is designed to combat external threats. However, accidental data deletion or modification by employees remains a concern.

3. The Perils of Data Movement and Overwriting

Modern businesses are dynamic, with data frequently being moved, modified, or overwritten:

  • Accidental Overwrites: As teams collaborate, there’s always the risk of essential data being mistakenly overwritten, especially in cloud environments where multiple users can access files simultaneously.
  • Migration Risks: Moving data between servers or platforms can result in data corruption or loss, especially if done without adequate precautions.
  • No Backup Equals No Recovery: If data is lost during such operations and no backup exists, the recovery is virtually impossible, potentially spelling doom for businesses.

4. The Undeniable Need for Backups

Even in a world of advanced cloud storage and Zero Trust security:

  • Backups Are Your Safety Net: They provide a fail-safe, ensuring that even in the worst-case scenario, your business can recover.
  • Regulatory Compliance: Many industries mandate regular backups as part of compliance requirements, emphasizing their importance.
  • Peace of Mind: Knowing that your data is backed up provides peace of mind, allowing businesses to operate without the constant fear of data loss.


While cloud storage and Zero Trust networks offer formidable protection, they cannot replace the assurance backups provide. As the old adage goes, “It’s better to be safe than sorry.” In the digital age, this couldn’t be more accurate. Ensure your business’s longevity and reputation by investing in comprehensive backup solutions.

Backup and Disaster Recovery - Australian Backup

Backup and Disaster Recovery – Australian Backup

Backup and Disaster Recovery – Australian Backup – We keep your business safe

It’s essential to have the right IT backup and disaster recovery (DR) systems in place if you want to safeguard your company’s digital assets.

According to Symantec research ransomware attacks to date have been largely indiscriminate, however, there is evidence that attackers have a growing interest in hitting businesses with targeted attacks.


“The average ransom demand has more than doubled and is now $679, up from $294 at the end of 2015.” The report says. With every new cryptocurrency payment deposited, not only is there new incentive for criminals to improve their technology and techniques. There’s even more incentive for other criminals to get in on the action.


Hardware isn’t prudent to failures. The Recent disaster regarding the ATO (Australian Taxation Office) in conjunction with hardware failure should make every business owner spend time revising their disaster recovery plan.

The right strategy and solution

As an IT manager, you want to stress test your backup solution to determine how well your system can withstand critical situations.

Having a document outlining details of the solution might save you thousands of dollars in an event of system failure. You can download a copy for your records here or generate your own PDF here


  • Write down the Software you use for the backup
  • Licensing: do you pay an annual fee to keep your software up to date?
  • Where can the software be found in the event of a system failure
  • The process to go through in an event of data loss (files)
  • The documented step-by-step guide on how to recover your server environment


A good backup and Disaster Recovery strategy should include off-site / cloud storage of important information.

For example, for a legal firm with 20 lawyers and $20 000 000 turnover, an hour downtime can cost the practice as much as $8500 (Downtime cost calculator). This doesn’t cover the cost of the document that wasn’t saved and took an hour to create. An Instant document backup or an hourly backup scheme might be something to include as part of your backup routine.

A stress-test of your recovery plan can identify weaknesses in your system and alert you to where improvements in your network’s defenses are required.

To stress test your system, you need to perform the following checks at least once a year:


  • Recover a random file from the past week / month / year (depends on your backup routine)
  • Recover folders and subfolders
  • Recover one of your database files and attempt to access it (document management, accounting programs)
  • Recover your Remote or Onsite server
  • Note the time taken to recover each segment of the test. This is important: if you aren’t able to recover your email server or database for hours you are at risk of losing profits


Having a local data centre in Australia or even in the city where your business is situated helps to optimise time taken to retrieve your backups and get your team operational quickly. The local technicians will also be quick to respond as they are located within Australia.

It is vital to keep your antivirus software current on all workstations and servers within your office, and to ensure everyone knows how to isolate an affected machine before the contagion spreads.


Keep all production servers/network devices up to date with the latest patches, and scan for vulnerabilities on a consistent basis. The best DR plans include regular backups of all production-critical devices, to a secure environment safe from any further attempts of malicious attack. The secure environment needs to be accessible for easy recovery of backups, and include a step-by-step recovery procedure that relevant personnel can understand clearly and initiate in an emergency.

Consider applying for Cyber insurance to protect from accidental downtime.

The good news for CIOs, CTOs and others responsible for ensuring IT infrastructure is up to date and resilient is that backup and DR systems have been converging for some years now.

How to design a backup strategy

How to design a backup strategy

How to design a backup strategy

How to design a backup strategy

Your business continuously generates additional data. Being without your data for even an hour could be expensive and extremely detrimental. The answer is to back up everything. All the time. First, you need to choose what you’ll use for backup, and then you need to decide on a combination. One source of backup is never enough.

Readily available options

Direct attached storage (DAS)

DAS devices connect to your PC or server (usually via USB). They are handy and portable, which means they could be taken out of action at the same time as your main storage if the issue is something like theft or fire damage. That makes them a great first line of defense, but don’t make the mistake of depending on these devices for your entire archiving and disaster recovery plan.

Network attached storage (NAS)

NAS appliances connect directly to the network. They have file server and redundancy capabilities, and in some cases, they have the ability to synchronise data with a compatible remote NAS.

This demonstrates the necessity for a remote solution, which is essential to any robust strategy. This might involve physically rotating devices offsite; however, if they aren’t taken far enough away from the site, the same event, such as an earthquake, might still jeopardise the components in your backup system.

Disaster protected storage

One precaution to take against fires, floods, or earthquakes is disaster-protected NAS or DAS units. These devices are built tough, and manufacturers claim that the devices have the ability to survive day-long baths or periods of fire. This isn’t always the case.

Fears of Mass Data Loss Disaster with ATO storage.

Therefore, we always recommend to check and verify that data is recoverable at least once a year and ideally every quarter.

Going online

Assuming your online provider’s servers are located far from your computers, you’re insulated from a city-wide disaster when you upload your data. On the upside, you’re not investing capital upfront, and sending data online works well if it’s done in installments; however, an initial upload (seeding) can require a long period of time, as can downloading data in the event of a disaster, if you need a full restore. We can do initial seeding of your backup, which means we’ll upload your data at our office with the fast link to a cloud storage.

Private cloud

A private cloud has all the advantages (and disadvantages) of sending your data online without the worry that it’s in the hands of a third party. It can be prohibitive for small businesses, but innovations have made the private cloud more affordable and worth exploring.

Old school

Backing up data to tape drives, DVDs, and Blu-Ray DVDs may seem obsolete, but Google and Facebook use tape and optical media.

The right combination

A good starting point is the rule of three: 2 + 1.

    • 2: A full copy of everything on at least two different physical devices plus plus
    • 1: A third copy that’s offline at another location. Consider investing into automatic cloud backup

The offline version is critical. It can’t be hacked, it can’t be corrupted accidentally, and it’s harder for someone with malicious intent to access (a rampaging ex-employee, for instance). Like everything else associated with data, a good backup strategy involves simple math.

Call us on 1800 12 42 32


Do not open a door for data thieves

Do not open a door for data thieves. Lock your Data

Do not open a door for data thieves. Lock your Data

Do not open a door for data thieves.

In the movies, hackers only have to swivel from their pizza boxes back to their keyboards and type a couple of lines. With that, they have access to everything from their target’s credit card number to their emails and appointment books.

With organisations investing heavily in IT security, the reality might be a touch more difficult. That means those with malicious intent are becoming physical. They might come to your premises to steal the information they’re after. Alternatively, their visit might be a preliminary step, such as stealing a manual or a telephone directory they can use for social engineering.

Your light-fingered visitor might not be a visitor at all. It might be an insider—an employee or a contractor.


If someone can walk into your office and walk out with an unsecured laptop loaded with customer and financial information, it might be a lot easier than trying to hack their way into the same information.

Here are some simple tips.

1. Lock down the lobby

If you’re lucky enough to have a receptionist, don’t assume they’ll be able to have their eye on the door to the interior at all times. If you don’t have a receptionist, you definitely need a locked door between the entrance and the equipment

2. Lock the data centre

Someone with their hands on your equipment can do things that someone with only remote access can’t. Whether your data centre is buried in a mountainside or a server cluster in a cupboard, lock it.

3. Check the locks

Proximity cards seem secure, but those beeps on acceptance can give a false sense of security. Make sure you’re using encryption or that someone nearby can simply capture the data and clone the card.

4. Keep “eyes” on at all times

The price of cameras and hard drives is so low today that there is no excuse for not having cameras. We recommend Axis or Bosch cameras as most reliable

  1. They’re a deterrent
  2. They’ll show you a threat in progress (if you’re watching—put a monitor on someone’s desk)
  3. If you’re not watching, you can review afterwards

5. Secure the portables

A central locker is a good thing to provide for laptops and external drives. If you don’t want to have to move the laptop from your desk every time you walk away, you can lock it to the desk. Portable locks are available when you’re using a laptop on the go.

Whatever physical security solutions you choose, the most important thing is to remember that you should always be aware of the physical weaknesses in your IT security.

Using your mobile phone to make payments everywhere

Why your mobile phone should have an NFC chip.

The change is imminent. The cheques and bank cards may soon be replaced with just your phone.

How do you make payments just with your mobile phone? Using NFC chip inbuilt into the phone to make payments will become more popular in upcoming years. Traditional banking or the way we use our how to make payments using your mobile phone; using mobile and NFC chip to make payments; personal banking online; backup your mobile data and settings; credit and debit cards will be changing forever in a nearest future.  The banks aren’t in a big rush to adopt to a change. And there is a one big reason: mobile providers and phone manufactures such as Apple or Samsung together with Google and Microsoft may soon take over your personal banking needs.


And why not? All of you make purchases using Apple ID to pay for music, Google Play to purchase Apps and most of you now have the phone with NFC chip inbuilt into the it. The very next step is going to be when the big guys mentioned above will become your imminent


Near-field communication (NFC) is a set of communication protocols that enable two electronic devices, one of which is usually a portable device such as a smartphone, to establish communication by bringing them within about 4 cm (2 in) of each other.[1]

What does this chip do and how does it work exactly? in a nutshell: NFC is a device inside your phone that allow to transmit information via secure protocol to another device. Where can you use it?

  • Supermarkets: when you get to pay for goods at the supermarket you simply touch the terminal with your phone and authorize the purchase generally using your pin or fingerprint;
  • Cashless society: No more credit cards or cash left on a piano at home. Statistically, you are likely to forget your card at home than your mobile;
  • Healthcare: Some medical practices already implemented systems where your medical data can be stored in your phone and accessed by doctors and nurses;
  • Keyless entry: Smart Homes and modern security systems allow you to use NFC chip as the key to your office or your house.


ANZ mobile paymentSome of you may ask how secure it is. Well, let’s just say that with traditional door key you don’t need to use your fingerprint to open the door. And you do need to confirm your purchase at least twice before making a transaction in the supermarket. But the info stored in your phone may save you time while getting a prescription drug from the pharmacy Using your mobile phone to make payments everywhere

Backup, cloud storage, cloud backup, file sync tools explained

Backup, Cloud storage, Cloud backup, File sync tools explained

Backup, cloud storage, cloud backup, file sync tools explained


Backup: Copy of your pictures, documents and files somewhere other than your computer;

Backup Software: Program or Software on your computer that looks after copying files from you local internal drive (C Drive) or Cloud account to a different location; Please note that if you have a Backup Drive that doesn’t mean it will backup your files without a software. Imagine your house being your computer and “storage” – place where you want to “copy” the content of your house. The Backup software is Removal Company that will load the truck and move your valuables to the storage.

Cloud: big box (computer) in a different physical location that your computer could connect to via Backup Software;

File Sync: The files from your computer are synced using File Sync Tools to an External Drive or to Cloud Storage. If you open and save document “My Memoirs.DOCX” in a folder that is set up to Sync with your External Drive or Cloud storage it would make a copy of the same file and save it. If you modify or change the document it would update (sync) this file and its modifications.
Examples of File Sync Tools: There are number of Sync tools available. For example, when you purchase Seagate External Drive it comes with Seagate Dashboard which allows you to sync files between your computer and external drive. The other way to sync your files is to use Cloud Storage such as Google Drive, OneDrive or DropBox;

Cloud Storage: Cloud Storage is the storage provided to you to store your documents on the internet. The documents are stored via agent software installed on your computer that allows you to sync, view and modify files and folders. In general you can share those folders with others. The files are in Sync with the folder on your computer. In some cases you could keep a number of modifications of the same file that is also referred as File Retention Policies. If you delete the file it would also delete it from your Cloud Storage DropBox Help

Cloud Backup: Cloud Backup is a Copy of your Files and Settings saved and stored permanently in a Cloud.  In case the file is corrupted or deleted you can restore this file from your cloud backup.

Disaster Recovery (Planning): Disaster Recovery (DR) is a documented plan of recovering critical data, application and physical server (s) in case of equipment failure. DR planning generally covers how you recover your business applications (software), servers and files. One of the critical aspects of DR planning is time taken to restore your data and staff to resume normal operations.