<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Securing Development Servers Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/securing-development-servers/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/securing-development-servers/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 17 Sep 2020 21:20:44 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Securing Development Servers Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/tag/securing-development-servers/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 046 Securing Backup Servers</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Thu, 17 Sep 2020 23:05:35 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Backup Servers]]></category>
		<category><![CDATA[Backups]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Development Servers]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Offline Backups]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Securing Backup Servers]]></category>
		<category><![CDATA[Securing Development Servers]]></category>
		<category><![CDATA[Securing Test Servers]]></category>
		<category><![CDATA[Test Servers]]></category>
		<category><![CDATA[Tipperary]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2287</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 46. This week we&#8217;re going to talk about securing backup servers. OK. Who wasn&#8217;t securing backup servers? Earlier this week I was reading a story about a large Canadian second-hand car business which had a data breach involving some 260,000 users. What had happened was that they had a backup server&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/">#WeekendWisdom 046 Securing Backup Servers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 46. This week we&#8217;re going to talk about securing backup servers.<span id="more-2287"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-2287-1" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4</a></video></div>
<h3>OK. Who wasn&#8217;t securing backup servers?</h3>
<p>Earlier this week I was reading a story about a large Canadian second-hand car business which had a data breach involving some 260,000 users. What had happened was that they had a backup server that wasn&#8217;t appropriately secured. People were able to get onto that backup server and download the data of all these users.</p>
<p>Basically that business did not appropriately secure the backup server. Maybe they thought &#8220;It&#8217;s a backup server it doesn&#8217;t need that much protection.&#8221; But think about it. A backup server is going to have a lot of your production data.</p>
<h3>So what does it need to set to?</h3>
<p>So the backup server needs to have the same level of security if not more so than your primary servers. Make sure that they are properly secured.<br />
Also with backups, I would also highly recommend having offline copies of the backups. Just in case that backup server ever gets damaged in any way by ransomware. So it&#8217;s important to back those up offline as well.</p>
<h3>Is that all?</h3>
<p>No. It&#8217;s not just backup servers that you need to take consideration of. Things like development servers or test servers. If you have some of those in your environment, they should have appropriate protections on there as well, because maybe they have some test data with actual personal data on them too. So ask your IT or your development team &#8220;Have you put appropriate protections in place on these servers?&#8221;</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>For small business, we can carry out assessments on your server infrastructure and point out discrepancies on the security configurations.</p>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-046-securing-backup-servers/">#WeekendWisdom 046 Securing Backup Servers</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/09/WeekendWisdom-046-lo.mp4" length="24796104" type="video/mp4" />

			</item>
	</channel>
</rss>
