1MC – July 06, 2024 – Links We Like

1MC: The general announcing system on a US Navy vessel

Cool Icon Collection
Phosper iconography

Python Version Lifecycle
Find out when your favorite version of Python goes end-of-life

Nvidia Expects To Book $12B In GPU Sales To China
Capitalism trumps politics every time

Hackers Have Access To Over 10 Billion Stolen Passwords
There’s 8 billion people in the world…do the math

Using R With a 1 Billion Row File
I don’t know; the word billion is on a roll this week

AI Open Source Tools
It wouldn’t be a blog post without mentioning AI

How Does Email Work
Great article, not too technical. If you think Outlook is email, read this

Healthcare And Data Privacy
Ads, trackers, cookies everywhere…

Admiral Rickover’s ‘Paper Reactor’ Memo
For the next time someone tells you, “Theoretically it should work.”

NSA Cybersecurity Website
Great info from America’s favorite spy gang

1MC – June 23, 2024 – Links We Like

1MC: The general announcing system on a US Navy vessel

California AI Legislative Bill
Game on between safety advocates and the big AI players. Hmmm, big business interests vs. consumer privacy and safety — game over before it starts.

Roger Federer’s Dartmouth Commencement Speech
Words of wisdom from an all-time great.

The State of the Nation’s Housing – 2024
From Harvard U.’s Joint Center for Housing Studies

Majority of Americans Support Key Covid-19 Policies
Hindsight being 20-20…

Maintaining Large Scale AI Capacity at Meta
Excellent tech article from Facebook’s AI engineering team

Los Angeles County Public Health Department Hacked
How many times do we have to say it? Don’t open suspicious email attachments! Over 200,000 people affected.

Ransomware in Healthcare
What IT leaders need to know.

1MC – June 16, 2024 – Links We Like

1MC: The general announcing system on a US Navy vessel

Cyber Insurance Claims Hit Record Highs in 2023
Healthcare leads the way followed by education, retail, and finance

The Artificial Intelligence Hype Cycle
AI has been around a long time, what’s different now is vendors figured out how to take money from you instead of the government..

Zero Trust – Building Blocks
If your business isn’t implementing zero trust — see the first link in this list and get in line to file a cyber insurance claim

NASA Releases Near Real-Time Air Quality Data

The Hollies
The 70’s, what’s not to like!

Microsoft Security Blog – Phosphorus
Anatomy of a ransomware campaign

FBI Crime Data Explorer
Don’t believe the clickbait, violent crime is at it’s lowest level in years

Speak to a Real Customer Service Person at Amazon
You simply need to learn the secret handshake

Microsoft is Changing How Outlook Security Works
Significant changes coming soon, don’t get caught unaware

Microsoft Releases June Patch Updates
51 flaws, 1 zero-day, 18 remote code vulnerabilities — update NOW!

1MC – June 09, 2024 – Links We Like

1MC: The general announcing system on a US Navy vessel

Zero Trust Networking 101
Remote Users + Remote Access = You Need To Read This

No-Defender
A utility to disable Windows Defender

2024 Microsoft Multi-cloud Risk Report
Six insights on the top multi-cloud security risks across Microsoft Azure, Amazon Web Services, and Google Cloud Platform

Google’s Find My Device Network
Using crowdsourced Bluetooth proximity data to locate lost devices

PIN Passwords Analysis
Before reading, try to guess the most common 4 digit password

WWDC24 June 10-14
Apple’s Worldwide Developer Conference is this week!

Rule of Three

Best practices for Data Backup

The Rule of Three for Data Backup: Ensuring Your Data’s Safety

Data loss can occur due to various reasons, from hardware failures and cyber-attacks to human error and natural disasters. One of the most effective strategies to protect your data is the “Rule of Three”, also known as the “3-2-1 backup rule.” This rule is simple yet powerful: it recommends having three copies of your data in two different formats, with one copy stored off-site. Let’s breakdown what this means and how you can implement it.

  1. Three Copies of Your Data:
  • One primary copy (the data you actively use).
  • Two backup copies.
  1. Two Different Storage Formats:
  • Use two different types of media for storing your backups (e.g., external hard drives, cloud storage, USB drives, etc.).
  1. One Off-Site Copy:
  • Store one of the backups off-site to protect against local disasters (like fires, floods, or theft).
Why Follow the Rule of Three?

Implementing the Rule of Three reduces the risk of data loss. If one copy is corrupted or compromised, you still have two more copies to rely on. By diversifying storage formats and locations, you protect against various failure scenarios.

Implementing the Rule of Three
Step 1: Create Three Copies of Your Data

Your primary data is what you use day-to-day, stored on your computer or main server. Create two additional copies. For example:

  • Primary Copy: Data on your laptop or desktop.
  • First Backup: External hard drive.
  • Second Backup: Cloud storage.
Step 2: Use Two Different Storage Formats

Diversifying storage formats mitigates the risk of failure associated with a specific type of media. Here’s how you can achieve this:

  • Local Backup: Use an external hard drive or a NAS (Network Attached Storage) device.
  • Cloud Backup: Services like Google Drive, Dropbox, or dedicated backup solutions like Backblaze or Carbonite.
Step 3: Store One Copy Off-Site

Storing one copy off-site ensures that your data is safe even if your local backups are destroyed. Off-site storage options include:

  • Cloud Backup: Automatically provides off-site storage.
  • Physical Storage: Keep an external hard drive at a different physical location (e.g., a friend’s house, a safety deposit box, or your office).
Visualizing the Rule of Three

Rule of Three Diagram

Tips for Effective Backups
  1. Automate Backups: Use software to schedule regular backups.
  2. Test Backups: Old IT saying: “You are only as good as your last restore, NOT your last backup!”
  3. Update Backup Strategy: As data grows or compliance requirements change, reassess and update your backup methods.
Conclusion

The Rule of Three is a robust and straightforward strategy for data backup that significantly reduces the risk of data loss. By maintaining three copies of your data, using two different storage formats, and ensuring one copy is off-site, you are protecting your data against a variety of threats.

Old IT saying: The best time to back up your data was yesterday. The second-best time is now.


Note: For you Enterprise IT folks, yes I understand…Geo-Redundancy, 4-2-2, Replication, blah, blah, blah. This post isn’t for you.