Skip to content

Silicon shortage, is another global crisis coming?

We are drug addicts. Not to green cannabis or MDMA, necessarily, but we do are addicted to some elements scattered around the globe that support the base of the world economy and that we need, like water, so that everything remains in order. The shortage of silicon chips is already one of the most suffocating problems that humanity has to face these days, we tell you about it in this article.

A new world problem: shortage of silicon chips

Perhaps there were some smart people who knew it before, but, for the rest of the mortals, it was in 2021 when the crude dependence that the technology industry has on factories that produce microchips was revealed. Yes, those little things are absolutely essential for the operation of electronic devices.

You can now start trembling with fear, the shortage of semiconductors, of silicon chips, which work as the heads of computing devices, is not good for us. Because, as you may tell, they control everything these days, from your smartphone to your laptop, from your tablet to your new car, from your state-of-the-art washing machine to your kid’s Playstation 5.

What is this semiconductor crisis about?

As it happened with the rest of the markets, the restrictions imposed by the pandemic forced the closure of many of the factories that were devoted to the production of these chips, thus making their production more difficult. And what’s worse, on top of that, the demand for computer devices increased, since everyone was locked up at home, needing to work remotely or entertain themselves with screens so as not to die of disgust making bread or staring at the wall. To all of this we add the inevitable delay in shipments and transport on a global scale, as well as the rise in the price of silicon, an essential element for microchip manufacturing, and other components that were bitterly disputed by the great world powers. As if that were not enough, two large chip producers, Taiwan and China, suffered certain catastrophes that seriously affected the capacity of their factories.

We know that the semiconductor industry fluctuates, that it is fickle and regularly goes through certain cycles of shortage, but all of this happened at the same time: this fluctuating nature, the alteration of demand and supply patterns due to the pandemic, the disagreements between the great powers, and then the catastrophes in the countries with the highest production… Not even done on purpose!

Who has been the worst off because of the shortage?

One of the markets that has been the most affected is the automobile sector. In fact, the AlixPartners financial consultancy recalls that, due to the shortage of chips, the global automobile industry has lost, this past 2021, 210,000 million dollars in revenue. That’s about 7.7 million cars less.

But not only that, the shortage of semiconductors also threatened the availability of smartphones, tablets and other gadgets with microchips in the last months of last year, which is, as you know, when these things are sold more. The Christmas campaign.

In fact, the very Apple, during November, had to choose between its iPads and its iPhones, diverting the chips that were originally destined for the former for the latter, since the iPhones are sold more and they are more lucrative. This meant that many specialist stores in the UK didn’t have stock of the iPad mini or the basic iPad for months.

But now comes perhaps the sector that has defended the problem of silicon, chips, semiconductors and all their ancestors the most: the world of gamers. Because the universe can be sunk with a single click of Thanos but the difficulties to get the brand new PlayStation 5 or the Xbox Series X is inexcusable. Indeed, Sony had it hard. Forced, even, to stop the production of its flagship product, the PS5, because the hundreds of chips that make it up are too difficult to obtain. The same thing happened with the giant Nintendo, which warned, distressed, that they were in serious trouble. They couldn’t keep up with the demand for their new console. Meanwhile, high-end graphics cards for PC gaming are still hard to find. If things continue like this, at any moment gaming lovers will leave the controls of Call of Duty, come out of their burrow and go themselves refine the silicon.

Moving on to the aesthetic spectrum, we note that if you’re bald you might not have noticed, but the Supersonic hair dryer and Airwrap hair styler have been missing for months as tech giant Dyson continues to beg for chips among the few supplies that work selling them worldwide.

Conclusion: What will happen in the near future?

Yes, things are very bad regarding the supply of chips and semiconductor materials. Although, don’t worry, experts warn that the effects of the shortage will only take a year to subside. There will be gradual improvements, although all the demand will probably not be met before 2023.

Many companies, such as Intel, have decided to create new chip factories in Europe, America and Asia to avoid another shortage on such a scale. In the meantime, meditate, exercise, read our articles, check your security system, or try to bring back tug-of-war as an Olympic sport.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

What Do Partners Have To Say About Safetica?

Hard Disk Types

Hard disk types: Get to know the main ones!

Do you need to buy hard disks? All right, we all have needs in life.

Are you clear about what you need them for? Great, that’s where it starts.

Don’t you have a clear choice of hard disk types? Maybe we can give you some clues…

The choice of hard disks depends, specially, on the use you are going to make of them. You may need them for servers or databases, or for high-performance environments. But it is also possible that you only want them to save on your home computer Petabytes of videos of the dancing parrot.

In this article we are going to know the main types of hard disk that exist nowadays. Let’s go!

Hard disk types. A brief introduction

Before going into greater depths we have to say that hard disks are basically divided into 2 categories: HDD and SSD.

When distinguishing between classes of hard disks, these can also be distinguished depending on the type of connectors they use. Thus, we talk about modalities such as SATA, SCSI or SAS, among others.

In fact, we could even use other criteria to classify the types of hard disk, such as where they are (internal or external) or even what they are used for, but in this article we are going to keep the first two.

Next we will see what each type of hard disk consists of. However, one thing to keep in mind is that both HDDs and SSDs will be able to use different types of connectors.

Hard Disk Types: HDD and SSD

HDD Hard Disks

We know by HDD (Hard Drive Disk) the traditional mechanical hard disks that record information magnetically on one or several platters. HDDs are made up of mechanical parts; they basically consist of one or more hard disks that rotate at high speed (thousands of RPMs) around an axle, inside a box. On each disc, a head reads or records data on each of its faces.

So that you can visualize it simply, it would be something like a small turntable stored inside a box (saving distances).

HDDs have been the most widely used discs in recent decades. More economical, durable, and with ever-increasing storage capacities, HDDs have reigned as storage devices for decades, and even though they have been a tough competitor in SSDs, they are still widely accepted.

Solid State Disks (SSD)

They are a recent novelty, and every day they have more followers. Actually, when we talk about SSD (Solid State Drive), we’re not talking about a “hard drive” as such. However, since they share their primary purpose, which is to store data, they are also often called “hard drives”.

The structure of SSD devices has little or nothing to do with the classic HDD, so they are only called “hard drives” because they are dedicated to similar functions. SSDs are not, in fact, disks, and lack mechanical parts; on the contrary, they have their own microprocessor (called a “controller”) that takes care of data reading/writing tasks, and stores the data in microchips that have interconnected flash memories.

For the last few years SSD hard drives have been very successful thanks to their higher speed. However, they also have some disadvantages, such as their price and lower storage capacity. So some people go for the solution of using an SSD hard drive to run the operating system and use an HDD for data storage.

Types of hard disk according to their connectors

Serial ATA (SATA) hard disks

In its different versions, the most current is version III, these are the most common hard drives in home computers, if you are accessing this article through a laptop or desktop computer is likely to be the type of hard drive that is working in your computer.

The Serial ATA uses a serial connector for data transmission and in its version III reaches speeds of about 600 Mb/s.

As we said, these are the hard drive connectors that have been most popular in recent years. Both their price and their data transmission speed have made them very popular.

SCSI or SAS hard disks

These are professional hard drive connectors that are typically found in high performance environments.

They are usually installed in RAID and are inside racks or blades.

One of their main features is that they are able to replace other similar hard disks (which, for example, have broken down), without having to shut down the computer, which will help the service to continue operating without an interruption.

Let’s get monitoring!

And now that we’ve seen some of the main hard disk types out there, how about taking a few minutes to discover something as important as system monitoring?

Monitoring systems are responsible for monitoring computer systems (hardware, networks and communications, operating systems or applications, for example) in order to analyse their operation and performance, and to detect and warn of possible errors.

And if we talk about monitoring, of course, we should talk about Pandora FMS. Pandora FMS is a flexible monitoring software, capable of monitoring devices, infrastructures, applications, services and business processes.

Of course, one of the things that Pandora FMS can monitor are the hard disks of your computers.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.

ESET named a ‘Strategic Leader’ in 2021 AV-Comparatives’ Endpoint Prevention and Response Test

BRATISLAVA — January 20, 2022 — ESET, a global leader in cybersecurity, has been named a Strategic Leader in the 2021 Endpoint Prevention and Response (EPR) Comparative Report, one of the most comprehensive tests of endpoint detection and response (EDR) solutions and endpoint security products ever performed by AV-Comparatives. The ESET PROTECT Enterprise bundle, which includes the ESET PROTECT management console, ESET Endpoint Security, ESET Enterprise Inspector and ESET Dynamic Threat Defense, version 8.1, was tested in the report.

AV-Comparatives, a leading independent testing organization, well known for offering innovative real-world environment testing, subjected the products of 10 vendors to a set of 50 targeted attacks, each deployed by a variety of techniques and tactics.

Based on this in-depth testing, AV-Comparatives developed an Enterprise EPR CyberRisk Quadrant™ that “factors in the effectiveness of each product at preventing breaches, the calculated savings resulting from this, the purchase costs of the product, and the product’s accuracy costs (incurred due to false positives).” ESET and its solutions were named a Strategic Leader in the quadrant — the highest certification in the quadrant. Strategic Leaders are defined as “EPR products that have a very high return on investment, and provide very low total cost of ownership… due to exceptional technical capabilities, combined with reasonable costs.” Furthermore, Strategic Leaders “develop ground-breaking ideas and implement these impressively in their products.”

ESET achieved high scores in the categories of active prevention, passive response, and combined prevention/response capabilities, scoring 96%, 100%, and 98%, respectively.

As stated in the report, ESET PROTECT Enterprise did exceptionally well when facing the 50 separate attack scenarios and demonstrated that it is an outstanding enterprise product. The easy-to-use intuitive console was praised, as well as the contextual data provided in order for security analysts to prioritize, mitigate, and further investigate threats.

Righard Zwienenberg, senior research fellow at ESET, noted, “We are very proud yet again to see ESET and ESET PROTECT Enterprise being recognized as a Strategic Leader. This attests that our prevention and response capabilities are effective and that SOC analysts are provided useful contextual data to properly assess and prioritize observed threats.”

Andreas Clementi, CEO and founder of AV-Comparatives, commented, “ESET not only achieved a high combined prevention and response score in the test, but also demonstrated outstanding overall detection and reporting capabilities. The test results contributed to ESET’s low total cost of ownership and ensured ESET’s position once more as a Strategic Leader in the second edition of this test by AV-Comparatives.”

To learn more about ESET’s award-winning solutions, click here.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Network Authentication is Just One Piece of the Network Security Puzzle

Establishing an Effective Network Security Posture Requires the Unification of Access Control, Risk Mitigation & Endpoint Remediation Capabilities

There’s a movement underway in cybersecurity today to adopt tools for enterprise network authentication. This trend makes sense. After all, authentication is just a fancy way of saying identity verification. Proving one’s identity has been a way of granting one’s access to something since time immemorial. From the secret passwords used to enter Chicago’s famed speakeasies to the retinal scanners used to clear you through airport security today – proving identity ensures trustworthiness and minimizes risk. 

Today, there are three primary methods that organizations rely on for network and application authentication: 

  • Password-Based Authentication – Passwords are the most common methods of authentication. Passwords can be in the form of a string of letters, numbers, or special characters. To protect yourself you need to create strong passwords that include a combination of all possible options. Of course, humans are lazy and tend to stick to what they know…meaning the same password gets used almost universally 
  • Multi-Factor Authentication –  MFA authentication methods and technologies increase the confidence of users by adding multiple layers of security. MFA may be a good defense against most account hacks, but it has its own pitfalls. 
  • Certificate-Based Authentication –  Certificate-based authentication technologies identify users or devices by using digital certificates. A digital certificate is an electronic document based on the idea of a driver’s license or a passport. This is perhaps the strongest means of authentication. 

Now,  Mission Impossible fans might say  hey, wait a minute, biometric authentication is missing off this list.  They’re not wrong, but frankly we’re not really focused on physically breaching CIA headquarters at Langley to get our hands on the coveted NOC list here. Rather, let’s focus on the day-to-day use of authentication techniques adopted by employees during business hours. 

I’m On the Network: Great, Now What?

The efficacy of the network authentication methods above can be debated to no end. That’s not why we’re here. Once a person’s device is authenticated to a corporate network, there are several security considerations that pure-play authentication tools can’t address. 

For example: 

  • Is the connected user an employee, guest, or contractor? 
  • What’s the user’s role within the organization (i.e. seniority or department)? 
  • What can the user access on the network? 
  • What’s stopping the user from accessing resources that shouldn’t be available to them? 
  • How do you monitor the risk posture of the connected device? 
  • How do you know if that user’s device becomes infected with malware? 
  • Can you prevent that infected device from moving across the network? 
  • Is there a way to return a non-compliant device back to a healthy state? 

Inside that medley of questions are a grab bag of other more detailed and technically intricate considerations that network security administrators may worry about. The point is this: once a user authenticates their device to the network, how can you prevent that device from posing a risk to the organization, even if unintentional? If you’re solely relying on authentication methods for network security, the answer is: you can’t. 

Closing the Gap on Network Security Blind Spots

The list of considerations above boils down to needing three primary capabilities on top of network authentication when it comes to network security. Without these, you’re essentially flying blind, unable to determine the true security posture of your network.  

These capabilities include: 

  • Access Control –  If authentication is the first step, employing access control is the second. Here, you’re aiming to dictate who can access what across your network. For example, you may not want Marketing to access Accounting’s VLAN. Why? Because Accounting’s VLAN holds sensitive financial information that has no bearing or relevancy to the day-to-day operations of Marketing. 
  • Endpoint Risk Posture Assessment –  The ability to continually monitor the risk threshold of each endpoint connected to your network means knowing how vulnerable you are to compromise. N etwork administrators will typically define a risk assessment policy, which assigns a risk score to each device. This score will indicate the level of risk posed by the device, taking into consideration the status of the device’s firewall, antivirus, applications in use and more. 
  • Proactive Device Remediation –  In some instances, the network security team may define a series of remediation policies. Essentially, a remediation policy consists of unattended corrective and preventive actions (CAPA), automatically applied to devices upon every transmission or on a recurring basis. A remediation policy can be used to reduce devices’ risk scores and increase compliance levels for network access. 

Unifying these Security Essentials With NAC

There is only one type of cybersecurity technology that brings together network authentication, access control, risk monitoring and remediation. That’s network access contro l (NAC). NAC, such as  Portnox CLEAR NAC-as-a-Service , unifies these network and endpoint security essentials in a single platform, and helps you fill in these critical gaps that an authentication-only approach fails to cover: 

  • Device profiling for contextual understanding 
  • Role-based and location-based access control 
  • Segmentation through dynamic VLAN assignment upon authorization 
  • Risk mitigation through device posture monitoring 
  • Device quarantining based on risk score policies 
  • Automated device remediation of non-compliant devices 
  • …the list goes on… 

Ultimately, anything less than complete network security coverage enforced through a NAC system that brings together these essential capabilities isn’t “network security” – it’s holding on to a hope and a prayer. Rely on standalone authentication tools at your own peril – we’ll just have to say we told you so.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

ESET Research discovers DazzleSpy: macOS malware spying on visitors of Hong Kong pro-democracy news site

  • A watering hole attack compromised a Hong Kong pro-democracy radio station news website.
  • The attackers served a Safari exploit that installed cyberespionage malware DazzleSpy on site visitors’ Macs.
  • Targets are likely to be politically active, pro-democracy individuals in Hong Kong.
  • The vulnerability could also have been exploited on iOS, even on devices such as the iPhone XS and newer. In fact, this campaign has similarities with one from 2020 where LightSpy iOS malware was distributed the same way.
  • The payload – DazzleSpy – is capable of a wide variety of cyberespionage actions.
  • ESET Research can conclude that the group behind this operation has strong technical capabilities.
  • The malware uses China Standard Time and contains a number of internal messages in Chinese.

BRATISLAVA, MONTREAL — January 25, 2022 — ESET researchers have discovered that the news website of Hong Kong pro-democracy radio station D100 was recently compromised to serve a Safari exploit that installed cyberespionage malware on site visitors’ Macs. The watering-hole operations the attackers have pursued show that the targets are likely to be politically active, pro-democracy individuals in Hong Kong. The malware delivered to vulnerable visitors of the site was new macOS malware ESET has named DazzleSpy. The malicious code is capable of collecting a wide variety of sensitive and personal information.

The first report about the watering-hole attacks leading to exploits for the Safari web browser running on macOS was published by Google last November. ESET researchers were investigating the attacks at the same time as Google and have uncovered additional details about both the targets and malware used to compromise the victims. ESET has confirmed that the patch identified by the Google team fixes the Safari vulnerability used in the attacks.

“The exploit used to gain code execution in the browser is quite complex and had more than 1,000 lines of code. It’s interesting to note that some code suggests the vulnerability could also have been exploited on iOS, even on devices such as the iPhone XS and newer,” says Marc-Étienne Léveillé, who investigated the watering-hole attack.

This campaign has similarities with one from 2020 where LightSpy iOS malware was distributed the same way, using iframe injection on websites for Hong Kong citizens leading to a WebKit exploit.

The payload – DazzleSpy – is capable of a wide variety of cyberespionage actions. It can collect information about the compromised computer; search for specified files; scan files in Desktop, Downloads, and Documents folders; execute the supplied shell commands; start or end a remote screen session; and write a supplied file to disk. 

Given the complexity of the exploits used in this campaign, ESET Research can conclude that the group behind this operation has strong technical capabilities. It’s also interesting that end-to-end encryption is enforced in DazzleSpy meaning it won’t communicate with its command and control (C&C) server if anyone tries to eavesdrop on the unencrypted transmission.

Among other interesting findings about this threat actor is that once the malware obtains the current date and time on a compromised computer, it converts the obtained date to the Asia/Shanghai time zone (aka China Standard Time), before sending it to the C&C server. In addition, the DazzleSpy malware contains a number of internal messages in Chinese.

For more technical details about this watering-hole attack and the DazzleSpy malware, read the blogpost “Watering hole deploys new macOS malware, DazzleSpy, in Asia”  on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research. 

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

Invest in disaster recovery strategies and avoid damages to your company

Failures in the IT infrastructure can compromise the continuity of a business. For this reason, organizations must have a disaster recovery strategy to avoid losses.

This solution is useful to circumvent problems that can have different origins: natural disasters such as fires, human error, and cyberattacks are some examples. 

In this article, we go into more detail about disaster recovery and its importance for the security of institutions. We have broken down our text into the following topics:

  • What is Disaster Recovery and What Is Its Importance?
  • Emergence of Disaster Recovery
  • What are the Main Obstacles Faced by Disaster Recovery?
  • Threats to Cybersecurity in Organizations
  • Top Disaster Recovery Methods
  • What is the Best Disaster Recovery Method for my Organization?
  • Building a Disaster Recovery Plan
  • Understand RPO and RTO 
  • Synchronous Replication: Excellent Method for Companies that Cannot Tolerate High RPO from Data to Disaster Recovery
  • Asynchronous and Mixed Replication

Enjoy the read!

1. What is Disaster Recovery and What Is Its Importance?

As we suggested in the introduction to this article, disaster recovery is important to ensure the continuity of a business. 

This is because it is designed to avoid data loss and enable the company’s operations again whenever there is an interruption generated by unforeseen events, such as natural phenomena, cyberattacks. or system failure.

Thus, it is possible to prevent these inconveniences from negatively impacting the organization’s image in the eyes of its customers and causing great damage to the company.

2. Emergence of Disaster Recovery

 Disaster recovery came on the scene in the early 1970s. Before that, companies were less dependent on computer-based operations. 

In the following decade, American banks had to adapt to a government requirement: according to the determination, they would have to present a backup plan that could be tested. As a result, companies in other areas had adopted the same strategy in order to avoid long pauses in operations. 

In the 2000s, the dependence on network services was greater among companies, which began to capture and store a large amount of data, making disaster recovery a highly complex solution. 

This was simplified after 2010 with cloud computing and disaster recovery services, or “data recovery as a service” (DRaaS).

With the evolution of malicious actor tactics in virtual environments, adopting a disaster recovery plan has become imperative. After all, cyberattacks can affect a company’s work to the point of destroying its credibility, in addition to the immediate financial impacts.

3. What are the Main Obstacles Faced by Disaster Recovery?

In this topic, we cover some inconveniences that can be avoided or tackled by a disaster recovery plan. Check it out:

  • Human Error

People are subject to failures, which can result in incalculable damage if not properly addressed. These errors can occur on purpose or accidentally.

In the case of professionals who deal with computer equipment, any error can jeopardize data and operations and bring great financial impacts to companies. 

  • Equipment Problems

Machines can have faults that generate great inconvenience. This could be associated with software crashes, slow equipment. or system crash. 

This type of failure causes loss of productivity or even downtime when it is necessary to send the equipment for repair. Inevitably, this generates losses for organizations. 

  • Natural Phenomena

While not a frequent issue, natural disasters can occur and be devastating for companies that do not have a disaster recovery plan in place. 

A storm, for example, can destroy a company’s headquarters and computer equipment. For this reason, one needs to be prepared for such situations. 

  • Power Outages

Outages in electricity supply occur much more frequently than a natural disaster and also have a great potential to interrupt the activities of organizations, causing incalculable damage.

This type of unforeseen event can damage IT equipment and cause data loss, which is a major inconvenience. That is, the possibility of having a power outage is one more reason to adhere to a disaster recovery plan.

  • Equipment Theft

Having the equipment stolen creates problems that go beyond the initial scare and the damage caused by the need to replace the machines.

Besides the devices, it is possible to lose customer data and information about the business itself, which can even affect the company’s credibility. 

In this sense, it is advisable to have resources that allow you to recover lost data and keep operations in full swing to avoid damage.

  • Cybercrimes

With the evolution of technology and the action of hackers, organizations are increasingly vulnerable to cybercrimes. 

Cyber intrusions can occur for different purposes: demanding a ransom or appropriating data relating to that business.

Thus, it is essential to have a disaster recovery plan to recover information and files that may eventually be lost.


4. Threats to Cybersecurity in Organizations

Cyberattacks are increasingly sophisticated, which requires security solutions and, often, disaster recovery. Here are some threats:

  • Phishing: This is a social engineering attack (it is based on the manipulation of victims). Its most common methods include links that copy websites of trusted companies used to collect information to steal bank accounts, among other malicious actions.
  • Ransomware: In this type of malware, malicious actors demand payment of ransom to give victims back access to systems and files lost in traps such as spam.
  • Backdoor Attack: A backdoor allows an administrator to access a certain system in order to solve a problem. However, this mechanism can represent a loophole for hackers.
  • DoS and DDoS Attacks: DoS is a malicious action that overloads a server, making access to a website unavailable. In turn, DDoS affects multiple machines, flooding them with false requests and undermining real demands.


5. Top Disaster Recovery Methods

Currently, there are several disaster recovery strategies and organizations often use more than one to ensure their security. Check out the main resources used:

  • Cold Site

Here, the disaster recovery strategy works as follows: the institution has a second facility so that employees can continue to perform their duties even if incidents such as storms or fires occur.

This solution prevents business downtime, but does not enable data recovery. For this reason, we strongly recommend that it be paired with other disaster recovery tools.

  • Hot Site

This feature is very efficient when it comes to avoiding downtime. That’s because it copies data frequently, keeping it always up to date. However, their setup takes a long time and they are not among the most cost-effective solutions.

  • DRaaS

This solution ensures that computer processing is transferred to a cloud infrastructure. In this way, the company can carry out its activities even if the servers are down. 

You can access DRaaS plans through subscription or pay-per-use.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Senhasegura
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

Every programmer deserves a Vagrant File

Vagrant File: Working with virtual IDE’s

An Integrated Development Environment is like the personal office of every software programmer, because we have all the components in order to focus on the task. Today everything is oriented towards web applications and in a previous article we mentioned how large companies have taken advantage to offer such services quickly, in what have become known as “Architecture without server”, euphemistically. For these cases we tell you that a Vagrant File could be developed to simulate this environment without a server to perform tests, saving time and money before hiring these services and creating our web application.

In this article we will show you how the field of programming has evolved, always with concise narratives and additional links.

In the 20th century…

Computers were expensive, even more than today; so many of us didn’t have computers at home. Those were simpler times, and mobile phones were only used by our bosses, so when we left the office we were really disconnected and could get by without Internet. But when we turned on our computer to program we had already placed all the variables -and programs- necessary to begin our work. We had to have the whole programming environment set up and ready.

In those days, going to the office physically was common, but now, it’s not.

In this 21st century

Now programmers can work remotely and for several clients or companies from anywhere, but such flexibility brings the dreaded thing of “it works on my machine”, but not on that of other developers who work with us. Virtual machines have solved, in part, this problem and even its complexity has increased exponentially with the networks defined by software.

As we said, each application is unique and its components can become very unique or specific. All of the above may not fully meet our needs, but it is not yet time to say goodbye to our personal computers, at least not in our profession.

Vagrant File

vagrant file

vagrant file logo

Continuous Software Release and Continuous Integration have taken the demands much further to meet deadlines and goals: we must copy from the repositories the algorithms we are working on, to make very specific modifications and then return them to the common cause. Whether we are in America or Europe we must always be ready for any work, and this is where the Vagrant File comes in.

A Vagrant File describes both an operating system and the provisioning and also configuration of a development environment. For the programmers it is a complete and rather tedious work: it takes away our energy to program. With a Vagrant File created and adapted by all the members of the team, not only will we have a development environment, we will also have an environment identical to the one used in production, a task that we will do in a single opportunity in the device where we usually work.

Installing Vagrant

To install any Vagrant File we will first need to have VirtualBox installed, and in our case we use Debian/Ubuntu. Once we have installed this hypervisor we can proceed to install Vagrant. In a GNU/Linux environment it is common to use apt-get install vagrant or for CentOS and related yum install vagrant, but if you have a problem it is better to download the installation packages directly from the official site rather than the default repositories of your operating system. At the time of writing this post the supported platforms are as follows:

  • Linux (64 bits, package in AppImage format, which is very appreciated by Linus Torvalds, creator of Linux, who explains how it works)
  • Debian (32-bit and 64-bit, package in .deb format)
  • Microsoft Windows® (32-bit and 64-bit)
  • CentOS® (32-bit and 64-bit, .rpm package)
  • macOS® (32-bit and 64-bit, .dmg package)
  • ArchLinux (64 bits, package in .tar.xz format)

First steps

The first thing we run is the vagrant -v command in a terminal window, to see which version we have installed (2.1.2, to date). Then we will be able to choose the operating system we are going to use; in Pandora FMS the selected one is CentOS 7, so we will create in our user documents a folder called vagrant-home:

# mkdir ~/vagrant-home 
# cd ~/vagrant-home 
# vagrant init centos/7

This is where we need to be patient: we proceed to download an image of the desired provider, in this case a Content Delivery Network (CDN) from vagrantcloud.com:

“vagrant init centos/7” and “vagrant up”

It is fair to say at this time that many companies have collaborated by publishing each by their own means an image file for different hypervisors. In the case of CentOS we have for Microsoft Hyper-V®, Libvirt, VMWare Fusion® and, of course, for VirtualBox.

vagrant file

Vagrant images supported by CentOS for different hypervisors

Do we need a Percona database? We can search VagrantUp for a Vagrant Archive that suits our needs, or we can create our own Vagrant Archives and share them!

Finally using a Vagrant File

Now we will do all our work of server configuration management with a Vagrant File and we will start by reviewing the one we just created… When? Well, when we issued the vagrant up order in our vagrant-home folder:

Vagrant File

The famous Vagrant File, file in plain text

All the lines are commented, except the one that describes the virtual machine; there we can quickly change anything we need (IP address, listening ports to connect via SSH, etc.). For now we’ll use the vagrant halt order to shut down our machine.

The “mantra” of Vagrant

The idea is, by means of a Vagrant File that we get to download a virtual machine and, in addition, with additional instructions to carry out the provisioning and configuration of a development environment (or of production). This way we will have our own machine, we will turn on and off, and if at a certain moment we want to restart and start again we will use vagrant destroy.

Remember to save OUTSIDE the virtual machine all your work, or if you use Git apply the command git push; in Pandora FMS we use GitHub to store the source code since 2014.

Working with Vagrant

How do we connect to our Vagrant File (as we saw, this file is the core of the matter)? Because always located in our folder to that effect created, we introduce vagrant ssh and we will be connected to begin our work.

Do we want to connect in a “normal” way, as we have always done? The only change human beings like is the diaper change; if we want to connect with the command, ssh, first we must run vagrant ssh-config to know the configuration we will use.

vagrant file

“vagrant ssh” and “vagrant ssh-config”

Monitoring Vagrant

From the SSH connection we can add the parameter “-o LogLevel=VERBOSE” to know what happens with our connection (by default it is configured to “FATAL”, the other possible values are QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2 and DEBUG3). Also for logs, if we use VirtualBox, they are located at
“~/VirtualBox VMs/vagrant-nombre_de_nuestra_carpeta_default_XXX/Logs/VBox.log” in a very particular format… But before going deeper into that, we tell you that it is just the tip of the iceberg, because it only shows us the record of SSH connections and perhaps we should aim higher.

To keep track of the boot of our virtual machines we must use the parameter “–debug”to be able to get all the details of each boot and shutdown:

vagrant file

Result of the command “vagrant up –debug”

Note: always “VBox.log” will contain the last record, the previous ones will be listed and kept and if we want to monitor we must automate so that it always reads the record after a “vagrant halt” or “vagrant destroy”. The other possible values are: info, warn and error. If we want to save absolutely all the startup record we must send all the output to a file in the same folder where we run: “vagrant up –debug &> nuestro_registro.log” (the debug parameter has two dashes as prefix).

Any information we send you to register may contain personal information and/or sensitive data of the device where you are running Vagrant. Be careful.

Using Pandora FMS as a monitoring tool

We saw that Vagrant has a very particular way of keeping records. Therefore, the default option we have to monitor with Pandora FMS is like any other device, either installing a Software Agent or performing a Remote Monitoring, having the foresight to provide an IP address to the Vagrant virtual machine to communicate with the Pandora FMS server, central or satellite.

A few steps beyond

Once we have experienced working with third party Vagrant Files, it will be time to create our own well-customized virtual machines to share with our colleagues. To do this, we must use Packer, a tool specially designed for such tasks.

When we are very experienced we can even review the logs without having to connect via SSH through a very elaborate artifice called codeyourinfra, which consists of an Apache web server with Jenkins, which will allow us reading access.

Don’t hesitate to contact us in Pandora FMS to start working in your company or office. We have years of experience and a well-qualified team at an international level.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About PandoraFMS
Pandora FMS is a flexible monitoring system, capable of monitoring devices, infrastructures, applications, services and business processes.
Of course, one of the things that Pandora FMS can control is the hard disks of your computers.