Backup Software Vulnerabilities and How to Provide Protection

Backup software is a commonly used precaution for most organizations to prevent the loss of data that is crucial to the operations of businesses and corporations. As a general rule, most IT administrators limit backup software to a small number of servers or even just a single server. The clients that require backup then communicate with the backup server over the network by transmitting the data that is to be backed up. It is also possible for the backup server to survey the servers to locate the data that requires backup.

Since the backup software on servers scans the system to view all of the files, backup software vulnerabilities can significantly compromise the system if a hacker spots the vulnerability and then exploits the hole. The exploit can send numerous malicious files into the wild which can access a variety of clients and applications due to the fact that the backup software scans the entire system.

How the System Checks for Vulnerabilities

  • Vulnerability Scanner: Most organizations employ vulnerability scanning that routinely checks the entire system for security holes and vulnerabilities.
  • Port Access Check: It is important to check all network ports that used by the backup software. There are backup products on the market that are specifically designed to conduct port checks for any unauthorized access.
  • Backup Software Updates: IT administrators for organizations update the backup software with the latest version and then set up a monitoring system with the vendor site to receive notifications when patch updates are released due to an exploit or vulnerability that has been discovered.

How to Provide Protection against Backup Software Vulnerabilities

In addition to installing the latest patch updates to the backup software and vulnerability scanning, protection can be provided as follows:

  • Port Firewalls: Firewalls should be installed on all of the ports of the network that the backup software uses. This prevents untrustworthy networks such as the Internet from accessing the backup software.
  • Run Network-Based Firewalls: Network-based firewalls should be run consistently to restrict access to the backup software. Running a network-based firewall ensures that only certain hosts are allowed to use the backup server ports.
  • Encrypt Data: Prior to being transmitted on the network, all data should be placed in encrypted form before being stored on backup software.
  • Monitor Backup Software: Data that is stored on backup software should be monitored on a regular basis to ensure there has been no theft or unintentional loss of the information.
  • Disposal Policy: The organization should have an established policy in place that outlines how data should be disposed of when it is no longer needed.

Backup software vulnerabilities are not isolated to specific systems. Instead they are existent on all operating systems that run backup client software however; the most affected systems tend to be the Windows and Unix operating systems.

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.
In 2003, more than 10 million Americans fell victim to identity theft.

Identity theft costs business and individuals $53 billion dollars annually

In 2003, Americans spent 300 million hours resolving issues related to identity theft.

70% of all identity theft cases are perpetrated by a co-worker or employee of an affiliated business.