One of my colleagues likes to say that “DOWN is a four-letter word.” Delta provided an object lesson of that concept earlier this week, only a month after a similar outage at Southwest Airlines. Ensuring uptime is a multifaceted challenge, including security against intentional threats, policies and procedures to prevent unintentional damage, redundancies to mitigate the impact of equipment failures or programming glitches and disaster recovery planning to get back up and running ASAP when something gets past all of your preventive measures.
Glass Core can be a part of the solution, but since this is my weekly news roundup, I’ll start with sharing a few relevant articles:
Petri IT Knowledgebase | Brad Sams wrote the first article I found on Monday tying the Delta outage to the need for disaster recovery – which was the first topic that sprang to mind when I read about it! How could they be brought so low by a simple power outage?
I’ve heard speculation that the power failure was just a PR line to cover for a hacking attack, but there are also persuasive arguments for this vulnerability being inherent in an industry that relies on 24/7/365 uptime but where IT isn’t visible enough to be a top priority. There’s no “good” time to bring systems down for upgrades or maintenance, and definitely no “good” time for a live test of redundant systems or disaster recovery plans. But, as I’m reminded every time I back up our company website, “an untested backup is no backup at all.”
CloudTech | Security isn’t the only element of ensuring uptime, but it can be one of the most difficult. Yoav Shay Daniely takes a look at some key strategies for security officers to meet the challenges introduced by cloud infrastructure, SDN and rapid provisioning of new applications within the organization: creating dynamic security policies, API scoping and security management consolidation.
Virtualization Review | As a virtualization administrator, Trevor Pott shares his frighteningly plausible nightmare scenario: a ransomware-infected hypervisor. Hyper-V, Windows Server, Linux, Android, iOS and macOS systems are all vulnerable to existing variants of ransomware, and the access methods can be surprisingly indirect – all it takes is an infected device with access to the right IP address. What do you do to avoid this nightmare? He advises making sure that backups infrastructure is completely separated from production infrastructure, so that it can’t be infected by the same attack.
I said at the beginning of this post that Fiber Mountain’s Glass Core can be a part of the uptime solution. While we’re still building out additional use cases, I'd like to point you to the following blog post about network monitoring, which explains how the Optical Path Exchange (OPX) provides new capabilities for building a dynamic layer 1 to enable integrated network monitoring. Click the button below or this link to learn more!