NetWorthy Systems Blog

NetWorthy Systems has been serving the Beaumont area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Secure Are Your Virtual Servers?

b2ap3_thumbnail_hosted_server_400.jpgIn today's technology world, a lot of businesses are opting to take advantage of virtualized servers. These offer various benefits, including the ability to consolidate your servers into a neat, controlled package. But according to a recent study by Symantec, virtual servers might not be as secure as once thought. In fact, they might not be any more secure than a physical server.

The well-known security company stated in its most recent report, entitled "Threats to Virtual Environments," that "virtual machine hosting servers are not any [more] secure than any other type of server. They are just as vulnerable to malware and targeted attacks." Additionally, there are a number of cloud-based threats that are exclusive to virtual servers. While some security companies beg to differ, hypervisor attacks can potentially occur. The hypervisor is what creates and runs the virtual machine. While it is certainly possible, the payoff for hackers isn't the best incentive, considering the level of expertise it takes to perform such a feat.

Other threats, however, are very real. Malware and targeted attacks against virtual servers are just as effective as they are against physical servers. Malware can potentially attack virtual server snapshots during the data backup process, and the infection can spread through a virtual network. To make matters worse, these attacks have happened and can continue to occur. One example is the Crisis malware, which can steal information from a system in a variety of ways (it was initially thought to be created for law enforcement and espionage).

In order to keep your virtual servers as secure as possible, Symantec offers some tips. NetWorthy Systems has picked the ones we feel are most important:

  • Crack down on security. Only allow trusted applications access to your network and systems. NetWorthy Systems can help your business put together a blacklist and whitelist of apps that can or cannot access your network. This keeps untrusted entities from accessing your precious data.
  • Use advanced security tactics. Against particularly nasty threats, you need particularly strong antivirus and malware protection. You need an advanced solution that can protect you from most variants of threats out there. A powerful solution like a Unified Threat Management device (UTM) from NetWorthy Systems is a comprehensive combination of firewalls, antivirus, web filtering, and much more, that keeps your network as safe as can be.
  • Take control. Administrators need to take proper measures to keep unauthorized users from accessing the virtual server interface. Integrate two-factor authentication and log both successful and failed attempts to access the system. Ask NetWorthy Systems for further details on how to integrate more powerful security solutions into your business technology.
  • Have a disaster recovery plan intact. This goes without saying, but every business should have a solid backup and recovery solution in case the worst happens. You don't want to be caught unprepared in the face of disaster. NetWorthy Systems offers a powerful Backup and Disaster Recovery (BDR) solution which keeps your information backed up safe and secure off-site. In the event of a disaster, you can recover your data quickly and efficiently with minimum downtime.

NetWorthy Systems offers managed IT services for those who want to concentrate on what's most important to your business - the business itself, and the clients who keep your company alive. We provide a number of technology solutions that make doing business easier than ever before. If you want to keep your virtual servers and your entire company safe, give us a call at 877-760-7310.

Did You Know? Data Backup and Disaster Recovery Ar...
People are the X Factor for a Successful Technolog...

Mobile? Grab this Article!

QR-Code dieser Seite