Assess the Risk of Browser Extensions Installed in Your Browser. Add to Chrome.×
Home » Spin.AI Blog » SaaS Backup and Recovery » Cloud Data Recovery Strategies for SMB
July 13, 2022 | Updated on: April 11, 2024 | Reading time 7 minutes

Cloud Data Recovery Strategies for SMB

Author:
Avatar photo

Vice President of Product

Losing your corporate data stored in cloud solutions can be damaging to your business. In this article, we will talk about cloud data recovery strategies that will help your organization prepare for data loss and avoid major pitfalls of data restoration.

Cloud data loss and recovery

To build your cloud data recovery strategy, you need to understand how data is lost as well as what pitfalls you might come across when attempting to recover data.

Reasons for data loss in cloud solutions:

Cloud SaaS tools like Google Workspace or Microsoft Office 365 are usually well protected from data loss due to brute force attacks or physical damage. So, why is data lost in these cloud tools?

1. Human error

Employees can delete information in documents or files by mistake and never notice it until it is too late. The estimated percentage for human error as the reason for data loss is between 11% and 30%.

2. Man-in-the-middle attack

The deliberate deletion of information in cloud solutions by employees is less frequent. However, its impact can be more severe on business. 

3. Ransomware attack

Neither Google Workspace nor Microsoft Office 365 is protected from a ransomware attack. And this cyber event has the greatest effect on corporate data. Ransomware is capable of encrypting all the files stored on Drive, emails, contacts, and even calendar events of a business within a very short period of time.

4. Zero-day attacks

Employees use multiple OAuth applications to boost their productivity. However, these apps might have hidden vulnerabilities. Usually, cybercriminals exploit them to easily access and control your data through the permissions that users give to these applications.

5. Unauthorized access

Unauthorized access to cloud data can be done either through credentials theft or because your users set sharing permissions incorrectly. For example, a file containing sensitive data is available for public access and editing.

Key problems with cloud data recovery

There are several aspects of cloud data recovery that companies should consider before creating a strategy.

1. Limited time for restoration

If data has been soft-deleted, it will be still stored in the Recycle bin. However, the period of storage there is limited. It varies from 2 weeks to one month depending on the cloud solution.

2. Cloud tools don’t back up data

Some businesses perceive solutions like Google Workspace or Microsoft Office 365 as back up for their data stored on-prem. Unfortunately, these tools aren’t backups and they do not store copies of your data elsewhere for emergency recovery.

3. High prices for recovery

Some cloud services can restore your lost data at a price, for example, Salesforce. However, the price can start from $10,000. The catch is that they do not recover all the types of data. Furthermore, the process takes at least one week. Finally, the format of recovery is a CSV file, which isn’t very convenient for administrators.

4. API limits

More and more companies are now purchasing backup and recovery services for their cloud data. However, in case of a massive data loss (like due to a ransomware attack), the recovery can take days or even weeks. It’s because cloud tools connect with a third-party Google Workspace or Microsoft 365 backup via APIs. And every such tool has API limits. The more files you have the longer the process takes.

Summing up, a backup should the essential part of your recovery strategy but not the only one.

Cloud Data Recovery Strategy

In our opinion, a cloud data recovery strategy should be based on the prevention of multiple incidents that make data restoration impossible, extremely difficult, excessively expensive, or too long.

We suggest:

  • backup your data,
  • protect your cloud from ransomware,
  • set up DLP policies,
  • control data access,
  • monitor OAuth apps.

Let’s take a closer look at each of them.

Backup your data

We strongly recommend using third-party tools to back up and recover your data. Here are some features you should pay attention to:

  1. Possibility of automated and manual backup
  2. Places of data storage – look for reliable data centers like AWS, GCP or Azure
  3. Services that are backed up
  4. Versioning
  5. Possibility to make a granular recovery (of one piece of data from a particular point in time)
  6. Storage limits (some tools provide unlimited storage).
  7. Possibility to recover data to a different location. 

Acquire ransomware protection

As mentioned above, recovery from backups in case of a ransomware attack can take weeks. We suggest acquiring tools that proactively detect the attack and stop it immediately until it has encrypted your entire business data.

For example, SpinRDR ransomware protection doesn’t wait for the attack to finish. It defines the source of the attack, revokes its permissions to edit and access your data, and immediately begins recovery of damaged files. Usually, it takes minutes to detect, stop and recover.

Ransowmare Protection tools can become a part of Cloud Data Recovery Strategies
SpinRDR – AI-based Ransomware Detection

Example of ransomware protection tool – SpinOne

Monitor & control access to your cloud data

We suggest that businesses keep a close eye on unauthorized access to their data. It should be done by monitoring abnormal logins and detecting incorrect sharing settings. Obviously, assigning such tasks to humans in situations of limited resources can be overwhelming. You need to ‘read’ the logs of all user activities throughout the day.

Luckily tools like SpinOne are ‘trained’ to detect such events in the log flow and notify Admins immediately.

Set up DLP policies

Data loss prevention policies can prevent certain adverse cyber events. For example, you can create a policy that notifies users every time they try to publicly share a file. Or disable sharing outside the company at all for everyone except certain people or organizational units.

Unfortunately, some cloud tools have very limited DLPs, for example, Google. However, solutions like SpinOne enable Admins to create more types of policies and set up them more precisely.

Assess OAuth application risks

Detecting and assessing applications can save your business from a nasty cyber incident. However, similar to access monitoring it is a very time-consuming task. Again, there are tools that automate these processes. For example, SpinOne detects applications that have access to your Google Workspace or Microsoft Office 365. Furthermore, it assesses these apps based on 15+ criteria and notifies your Administrators.

Was this helpful?

Thanks for your feedback!
Avatar photo

Written by

Vice President of Product at Spin.AI

Davit Asatryan is the Vice President of Product at Spin.AI

He is responsible for executing product strategy by overseeing the entire product lifecycle, with a focus on developing cutting-edge solutions to address the evolving landscape of cybersecurity threats.

He has been with the company for over 5 years and specializes in SaaS Security, helping organizations battle Shadow IT, ransomware, and data leak issues.

Prior to joining Spin.AI, Davit gained experience by working in fintech startups and also received his Bachelor’s degree from UC Berkeley. In his spare time, Davit enjoys traveling, playing soccer and tennis with his friends, and watching sports of any kind.


Featured Work:
Webinar:

How Can You Maximize SaaS Security Benefits?

Let's get started with a live demo

Latest blog posts

Best CRXCavator Alternative for Browser Extension Risk Assessment

Of the 300,000 browser extensions used in enterprise environments, more than half (51%) could execute...

Avatar photo

Product Manager

Read more

The Ultimate Guide to SharePoint Cloud Backup: Securing Your Data

For businesses using Microsoft 365, SharePoint has become central to document management, team collaboration, and...

Avatar photo

CEO and Founder

Read more

How to Ensure that Your Google Chrome Extensions are Safe

Google Chrome is the world’s most popular internet browser, enjoying a global market share of...

Courtney Ostermann - Chief Marketing Officer Spin.AI

Chief Marketing Officer

Read more