Posts

Simplify and Secure Your HR Management with HRIS Cloud

HR management

Simplify and Secure Your HR Management with HRIS Cloud

Adopting work from home model is one of the efforts for enterprises to survive during the pandemic or even for the long term. This situation forces enterprises to utilize digital technology, such as the HRIS cloud platform to optimize business management. By using HRIS cloud solution, you could elevate your HR performance and success in the organization also increases your business efficiency by cutting the operational cost.

In partnership with PT. System Design Center (Xpresso HRIS), join us to get more insight about HRIS Cloud on “Zettagrid e-TechDay: Simplify and Secure Your HR Management with HRIS Cloud”. Meet our guest speaker Hendri Janto as Director and Founder of PT. System Design Center and hear their customer experience from Agus Raya as Manager IT Service Operation RS Pondok Indah and Ricky Salim as Staff Fungsional lV IIIA-F HRIS RS Hermina Group.

 

Event Details

Day: Tuesday, 31 August 2021
Time: 02.00 – 04.00 PM
Link to register: bit.ly/etechdaysdc
Live from Zoom Meeting

 

Register now and get chance to win shopping voucher and FREE e-certificate at the end of the event.

Adopting Hybrid Cloud Approach, Where to Begin?

adopting hybrid cloud

Adopting Hybrid Cloud Approach, Where to Begin?

Adopting Hybrid Cloud approach is becoming more and more common in a business sector. According to a survey of IBM Institute For Business Value (IBV), Hybrid Cloud will grow to 47% in three years ahead and the average organization will implement around six hybrid clouds. With such of number, it is not a surprise anymore to see how large this technology could dominant enterprise solutions.

However, adopting Hybrid Cloud approach certainly is not just by snapping-fingers only. A plan and strategy are also needed for a successful deployment. Therefore, before business takes a step further about it, the organization needs to explore more for adopting Hybrid Cloud approach. Then, where to begin?

In Zettagrid e-Techday: Evolving Hybrid Cloud Infrastructure For Your Digital Business that was held on 12 August 2021, Teddi Suryadi as Cloud Consultant Zettagrid Indonesia had explained some strategies that business needs to take on Hybrid Cloud adoption. Curious to know how is it? Here’s the recap:

1. Determine the application that wants to be deployed on Hybrid Cloud

adopting hybrid cloud

(Source: ra2studio from Getty Images Pro)

Basically, any applications can be deployed on Hybrid Cloud. Depends on the organization’s policy and needs. So, if the organization wants its workload management to be deployed on cloud, then the provider will help and provide its cloud solution.

However, it is important to remember that business needs to determine what application that wants to be running on cloud and handled on the local premise. By separating workloads in two locations, the organization could achieve its IT business and cloud operation efficiency.

 2. Begins with the better infrastructure

adopting hybrid cloud

(Source: Jens Domschky from Getty Images)

After the organization determines what applications that want to be deployed on cloud, next it’s time to look for the right infrastructure such as software, hardware, services, and cloud spaces. But, why does business need these infrastructures for adopting Hybrid Cloud approach?

 These infrastructures enable business to secure consistent operations for business workloads across private and public cloud. Not only that, the right infrastructures will also deliver a complete solution for business Hybrid Cloud. Therefore, it is important for the organization to do this before adopting Hybrid Cloud approach.

3. Look out for the data security

adopting hybrid cloud

(Source: anyaberkut from Getty Images Pro)

In looking for Hybrid Cloud Providers, data security and compliance are often to be the main things that need to be concerned about. With the right data security and compliance, the cloud service provider can guarantee how secure your company and business data will be on cloud. 

In Zettagrid, we have data security and compliance such as PCI DSS certified and three-level of access (MyAccount portal access, vCloud Director access, and VM access). Not only that, but Zettagrid is also certified by ISO27001:2013 to secure your company data. Thus, you don’t have to worry more, because your data will be safe with our layered security system.

 

Those are the recap on adopting Hybrid Cloud approach. If you want to know or see the session further, you can watch it on our Youtube Channel here. And if you have any questions related to Hybrid Cloud solution, you can contact us here or at sales@zettagrid.id.

4 Reasons Why Many Businesses Adopt Hybrid Cloud

why hybrid cloud

4 Reasons Why Many Business Adopt Hybrid Cloud

Since the digital era began, many companies are relying on technology to automate their business. Ranging from scaling up IT capacity, collaborative work, data-sharing, and data storage, technology had helped business more efficient on their utility. No wonder many businesses now are on the race to digitally transform using technology. One of those such as Hybrid Cloud solutions.

As more organizations look to the public cloud to increase their data management capacity, hybrid cloud has often to be the solution of choice. With its agility and scalability, Hybrid Cloud offers enterprise efficient and flexible workloads. Therefore, it is not a surprise anymore to see this technology enables organizations to remain competitive while staying on budget.

Not only that, but this technology also brings a couple of things that can be another reasons for business to adopt. What are those? Read them below here:

1. The Hybrid Cloud Offers More Deployment For Business Needs

why hybrid cloud

(Source: NicoElNino from Getty Images Pro)

In maintaining IT environment, business storage certainly has its nuances. To operate better, business needs the operational flexibility to address them. But, no worries! Hybrid Cloud adoption can help business through the needs with more deployment options than other storage models.

As the comparison, for the on-premise component, business can only choose the options that range from zero-up-front cost software running on the business servers, to multi-petabyte turnkey system. Meanwhile, for the cloud component, a range of offerings could be long-term or short-term storage needs. Therefore, cloud storage enables business to mix and match the optimal solution. Whether it is for the rapid data access on-premises or long-term archival storage, these needs can be done by a common set of storage techniques and tools.

2. Hybrid Cloud offers better data protection strategy

why hybrid cloud

(Source: anyaberkut from Getty Images Pro)

Realize it or not, data protection is fundamental to every business storage. With the large data, applications, and systems it contained, business have to protect its storage so it could get off of the threats of data loss. Hybrid cloud storage model offers business of all sizes incredible data protection options, such as backup deployment.

With a hybrid configuration, you can backup data to object storage on premises, then automatically tier data to the cloud for long-term archive. 

In this way, business could have two optimal results: business have a copy of data on-site for rapid recovery and a low-cost, long-term archive offsite copy for disaster recovery.

3. Help business meet data governance rules 

why hybrid cloud

(Source: ipopba from Getty Images Pro)

Have you heard, external and internal data governance rules play a big part in data storage planning? According to Cloudian, business internal policy and external regulation required financial data and customer records management that subject to security, governance, and compliance rules. 

Luckily, Hybrid Cloud is here for us. With its model, business can more easily accommodate the changing needs. Not only that, but this technology can also set policies to ensure compliance tailoring migration and data protection rules to specific data types.

4. It delivers operational efficiency

 

(Source: designer491 from Getty Images)

Hybrid storage is one of the most scalable storage model for business needs. It combines local storage with cloud storage that is limitlessly scalable, for all practical purposes. Not only that, but its single-pool storage model reduces data silos, and simplifies management with a single namespace and a single view. Therefore, it is not surprising to see how hybrid can deliver business operational efficiency.

Those are four reasons why hybrid cloud adoption is implemented by many companies. But, how to adopt this solution for business?

Find out more of these tips on Zettagrid e-Techday: Evolving to Hybrid Cloud Infrastructure for your Digital Business. Meet our expert Teddi Suryadi as Cloud Consultant Zettagrid Indonesia and Andri Junardi Ahmad as Advisory Systems Engineer South East Asia CI/HCI Presales Specialist, Dell Technologies, to learn about Hybrid Cloud adoption for your business needs.

Don’t miss this chance, register now here and win OVO for the first 50 registrants.

 

Evolving to Hybrid Cloud Infrastructure For Your Digital Business

evolving hybridEvolving to Hybrid Cloud Infrastructure For Your Digital Business

The race to digitally transform is underway and hybrid cloud solutions are a key enabler bringing digital innovation within reach of companies of all sizes and industries. With its agility and scalability, hybrid cloud offers to accommodate enterprises’ complex and varying workloads. Hybrid cloud approach also can significantly reduce capital expenditure and enable organizations to remain competitive while staying on budget.

How do you adopt a hybrid cloud approach for your business? Find the answer on “Zettagrid e-TechDay: Evolving to Hybrid Cloud Infrastructure For Your Digital Business”. Collaborate with Dell Technologies, meet and learn directly from our expert Teddi Suryadi as Cloud Consultant Zettagrid Indonesia and Andri Junardi Ahmad as Advisory Systems Engineer South East Asia CI/HCI Presales Specialist, Dell Technologies.

Event Details

Day: 12 August 2021
Time: 02.00 – 04.00 PM
Link to register: bit.ly/zgdell1
Live from Zoom Meeting

Agenda:

  • The Fastest Path to Hybrid Cloud for your Digital Business – Andri Junardi Ahmad as Advisory Systems Engineer South East Asia CI/HCI Presales Specialist, Dell Technologies.
  • Evolving to Hybrid Cloud For Your Digital Business – Teddi Suryadi as Cloud Consultant Zettagrid Indonesia.

Register now! FREE e-certificate and win OVO for the first 50 valid register.

3 Kiat Melindungi Data Bisnis dari Risiko Bencana

melindungi data bisnis

3 Kiat Melindungi Data Bisnis dari Risiko Bencana

Mungkin pepatah “Sedia payung sebelum hujan” sudah banyak Anda dengar di mana-mana. Baik untuk mempersiapkan kebutuhan maupun kegiatan sehari-hari, pepatah tersebut sering disematkan agar kita lebih bersiap menghadapi risiko kedepannya. Begitu pula ketika Anda membangun bisnis, pepatah ini bisa jadi acuan agar bisnis bersiap menghadapi ancaman yang potensial, termasuk salah satunya bencana.

Baru-baru ini, kebakaran telah terjadi di Kantor Badan Pengawas Obat dan Makanan (BPOM). Dilansir dari kompas.com, kebakaran bermula ketika kantor BPOM sedang ada perbaikan panel listrik di lorong F timur dan F barat. Meskipun kebakaran terjadi karena arus aliran pendek, namun CNN menyebut satu ruangan yang memuat arsip dan standardisasi napza rusak oleh kobaran api. Akibatnya, BPOM pun mengalami kerugian hingga Rp. 600 juta.

Kasus di atas mungkin bisa menjadi gambaran bagi organisasi untuk menghadapi bencana. Dengan mempersiapkan strategi keamanan data dan pemulihan bencana yang baik, bisnis bisa meminimalisir risiko atau kerugian yang mungkin terjadi.

Artikel ini akan memberikan Anda tips mempersiapkan pemulihan bencana yang baik untuk sistem IT bisnis. Penasaran seperti apa? Simak selengkapnya di bawah ini:

1. Menjaga tata kelola yang baik sesuai anjuran pemerintah

melindungi data bisnis

(Source: cyano66 from Getty Images Pro)

Tips pertama untuk melindungi data bisnis dari potensi bencana adalah dengan menjaga tata kelola yang baik sesuai anjuran pemerintah. Ini berarti organisasi dapat menyesuaikan regulasi infrastruktur IT-nya sesuai peraturan pemerintah yang ada. 

Bila menyangkut tentang perlindungan data dari bencana, bisnis bisa melihat ketentuan hukum Indonesia PP Nomor 71 tahun 2019, yang mewajibkan organisasi memiliki Disaster Recovery Center di Indonesia. Dengan mengimplementasikan peraturan tersebut, organisasi memiliki komitmen atas tata kelola yang baik atau good governance

2. Persiapkan solusi Disaster Recovery

melindungi data bisnis

(Source: Umnat Seebuaphans)

Bencana memang tidak bisa diprediksi kapan datangnya. Bisa jadi ketika bisnis sedang berkembang pesat, bencana datang dan mengganggu sistem IT dan menyebabkan downtime hingga hilangnya data. Oleh sebab itu, solusi pun diperlukan agar bisnis bisa mempersiapkan risiko bencana yang mungkin terjadi.

Memiliki solusi Disaster Recovery berbasis cloud bisa menjadi pilihan untuk melindungi sistem IT dan data bisnis Anda. Kemampuannya yang bisa meningkatkan penyimpanan sistem dan data, memudahkan bisnis untuk memiliki akses terhadap sistem dan datanya ketika bencana terjadi. Oleh sebab itu, Anda tidak perlu lagi khawatir ketika potensi dan risiko bencana melanda bisnis Anda.

 3. Persiapkan strategi untuk hadapi potensi downtime ketika bencana terjadi

melindungi data bisnis

(Source: ilkercelik from Getty Images Pro)

Ketika bencana terjadi dan menghambat sistem IT, ini bisa menimbulkan downtime untuk organisasi. Akibatnya, tidak hanya sistem IT yang akan terkendala, tapi layanan dan operasional bisnis pun bisa terhenti karena bencana. Apabila bisnis tidak mampu mengatasi kendala downtime, tentu ini bisa mengakibatkan kerugian secara finansial.

Itulah mengapa, solusi Disaster Recovery sangat penting untuk dimiliki bisnis. Selain mempersiapkan bisnis dari potensi bencana, Disaster Recovery juga memudahkan bisnis untuk memiliki ketersediaan akses ke sistem dan datanya. Sehingga ketika bisnis dihadapkan oleh potensi downtime akibat bencana maupun hardware failure, Disaster Recovery bisa memulihkan Virtual Machine (VM) sesuai dengan skenario failover bisnis. Dengan demikian, bisnis bisa meminimalisir risiko dan kerugian yang mungkin terjadi.

Itulah beberapa tips yang bisa Anda ikuti untuk melindungi data bisnis dari risiko bencana. Bila Anda memiliki pertanyaan lebih lanjut tentang solusi Disaster Recovery, Anda bisa menghubungi kami di sini atau ke sales@zettagrid.id.   

 

Mengapa Vulnerability Assessment Penting untuk Keamanan Siber?

vulnerability assessment penting

Mengapa Vulnerability Assessment Penting untuk Keamanan Siber?

Di era digital seperti sekarang, keamanan siber sangat penting untuk diutamakan oleh berbagai organisasi. Selain karena untuk memenuhi regulasi kepatuhan data perusahaan, strategi keamanan siber juga penting untuk melindungi data dari ancaman peretasan sistem hingga serangan hacker. Oleh karena itu, organisasi perlu memikirkan ulang fitur keamanan yang bisa digunakan untuk melindungi sistem IT-nya. Salah satunya dengan menggunakan Vulnerability Assessment.

Menurut searchsecurity.techtarget.com, Vulnerability Assessment merupakan proses identifikasi risiko dan kerentanan pada sistem, jaringan komputer, aplikasi, atau bagian lain yang ada di ekosistem IT. Fitur ini berfungsi untuk membantu bisnis menunjukan kelemahan di sistem IT seperti coding bugs, security holes, dan lainnya. Dengan demikian, organisasi dapat dengan cepat menambal kelemahan paling berisiko tersebut sebelum hacker mengeksploitasinya.

Lalu, apa yang bisa didapat organisasi ketika menggunakan Vulnerability Assessment?

vulnerability assessment penting

(Source: ninitta from Getty Images)

Secara garis besar, terdapat beberapa alasan mengapa Vulnerability Assessment penting untuk digunakan oleh organisasi. Beberapa di antaranya, ialah:

  • Organisasi dapat mengidentifikasi ancaman atau kelemahan keamanan sistem sejak awal sebelum pelanggaran terjadi.
  • Organisasi dapat dengan mudah memahami kerentanan berdasarkan prioritas, urgensi, serta dampak yang dapat ditimbulkan.
  • Melindungi pelanggaran data dan akses tidak sah lainnya.
  • Membantu perusahaan untuk terhindar dari denda atau tuntutan hukum jika terjadi pelanggaran data. 

Hal rentan apa saja yang bisa diungkap oleh Vulnerability Assessment?

vulnerability assessment penting

(Source: Wpadington from Getty Images)

Selain menginformasikan adanya kesalahan konfigurasi pada sistem IT, Vulnerability Assessment juga penting untuk mengungkap berbagai masalah yang terjadi pada sistem hardware maupun software. Beberapa di antaranya, ialah:

  • Kata sandi default pada perangkat tertentu
  • Perangkat yang menjalankan layanan yang tidak perlu
  • Layanan web yang mengandung unknown vulnerabilities
  • Layanan yang tidak seharusnya dijalankan di beberapa perangkat
  • Aplikasi berbahaya, seperti aplikasi peer-to-peer
  • Aplikasi pihak ketiga

Selain itu, banyak Vulnerability Assessment juga penting untuk mengawasi tanda-tanda hacker berdasarkan perilaku komputer. Dengan mengetahui hal tersebut, ini dapat membantu organisasi meminimalisir terjadinya peretasan data.

7 kiat membangun Vulnerability Assessment yang efektif

1. Mengidentifikasi dan memahami proses bisnis

Langkah pertama membangun Vulnerability Assessment yang efektif, dimulai dengan berfokus pada proses yang paling kritis dan sensitif. Dalam hal ini organisasi bisa mulai dengan regulasi kepatuhan penyimpanan data, privasi pelanggan, dan posisi kompetitif manajemen. Latihan ini akan membutuhkan upaya kolaboratif antara tim IT dan unit bisnis lainnya agar Anda bisa memahami proses kerja bisnis.

2. Identifikasi aplikasi dan data yang mendukung proses bisnis

Beri peringkat untuk setiap proses dan aktivitas bisnis, lalu tandai aplikasi dan data yang bergantung pada proses tersebut. Misalnya, satu departemen mungkin benar-benar membutuhkan akses email untuk melakukan pekerjaan mereka, sedangkan departemen lain tidak begitu membutuhkan email untuk aktivitas kerjanya.

3. Identifikasi setiap sumber data yang tersimpan

Untuk membangun keamanan siber yang efektif dengan Vulnerability Assessment, Anda tidak boleh lupa untuk memperhitungkan perangkat seluler dan PC Desktop. Hal ini dilakukan karena perangkat keduanya memiliki kemungkinan besar berisi data organisasi paling terbaru dan sensitif.

Tak hanya itu, Anda juga perlu mengidentifikasi pengguna perangkat tersebut untuk mengakses dan berbagi aplikasi serta data perusahaan. Dengan demikian, Anda dapat memahami bagaimana data dibagikan di antara pengguna tersebut. 

4. Ketahui jenis hardware yang digunakan untuk aplikasi dan data 

Mengurangi lapisan infrastruktur bisa menjadi cara untuk mengetahui server mana yang menjalankan aplikasi penting. Selain itu, Anda juga perlu mengidentifikasi perangkat penyimpanan data yang menampung data sensitif dari aplikasi yang digunakan tersebut. Sehingga, Anda bisa menentukan akses mana yang perlu diidentifikasi oleh Vulnerability Assessment.

5. Petakan infrastruktur jaringan yang menghubungkan perangkat 

Untuk membangun Vulnerability Assessment yang efektif, organisasi perlu memetakan infrastruktur jaringan yang menghubungkan perangkat. Anda bisa mulai dengan memahami router dan perangkat jaringan yang digunakan hardware untuk menghasilkan kinerja Vulnerability Assessment yang cepat dan aman. 

6. Identifikasi sistem keamanan pada infrastruktur Anda

Fitur keamanan seperti kebijakan sistem, firewall, intrusion detection, dan Virtual Private Networks kerap kali digunakan untuk melindungi sistem IT dan data organisasi. Bila Anda menggunakan salah satunya, maka sangat penting bagi Anda untuk memahami kemampuan fitur tersebut dan kerentanan yang ditangani secara langsung. Dengan demikian, ini akan membantu Anda dalam membangun Vulnerability Assessment yang efektif.

7. Jalankan Vulnerability Scan

Setelah tim Anda berhasil memahami dan memetakan aplikasi, data, serta infrastruktur dan perlindungan jaringan, maka selanjutnya tim IT perlu menentukan kapan waktu yang tepat untuk menjalankan Vulnerability Scan.

Itulah beberapa cara yang bisa Anda jalankan untuk mencapai Vulnerability Assessment yang efektif. Bila Anda memiliki pertanyaan lebih lanjut tentang Vulnerability Assessment untuk memperkuat keamanan siber organisasi, Anda bisa menghubungi kami di sini atau ke sales@zettagrid.id.

5 Serangan Siber Yang Perlu Bisnis Waspadai

serangan siber

5 Serangan Siber Yang Perlu Bisnis Waspadai

Saat mengembangkan bisnis, Anda pastinya telah memprediksi segala jenis ancaman dan potensinya terhadap keberlangsungan perusahaan. Mulai dari bencana alam, human error, hingga serangan siber, ketiganya memiliki potensi bahaya terhadap operasional bisnis. Terutama bila dikaitkan dengan kehilangan data perusahaan.

Di masa pandemi COVID-19 seperti sekarang, serangan siber menjadi ancaman paling tinggi untuk berbagai organisasi. Seiring banyaknya pengguna yang bekerja dan belajar dari rumah secara daring, pelaku serangan siber pun semakin gencar untuk melancarkan aksinya. Bahkan Cisco Umbrella pun melaporkan setidaknya terjadi peningkatan sebesar 40% serangan siber pada pandemi tahun lalu.

Melihat kasus ini, tentunya bisnis tidak hanya harus melindungi datanya. Mengenal segala jenis serangan siber juga perlu dilakukan agar strategi perlindungan data dapat dieksekusi tim IT dengan maksimal. Lalu jenis serangan siber apa saja yang perlu diwaspadai bisnis?

1. The Corporate Spies

serangan siber

(Source: South_agency from Getty Images Signature)

Banyak perusahaan melanggengkan jenis serangan siber The Corporate Spies untuk menyusup atau meretas sistem IT para pesaingnya. Dengan menggunakan peretas untuk melakukan spionase pada para pesaing bisnis, perusahaan bisa mencuri data penting pesaingnya seperti rencana bisnis, hak paten, data keuangan, kontrak, dan lainnya. Salah satu contoh kasus yang bisa diambil dari serangan siber satu ini adalah Compulife – NAAIP. 

Pada tahun 2020, Compulife Software, Inc. menuduh pesaingnya melakukan spionase untuk meretas dan mencuri data miliknya. Bukti juga menegaskan bahwa NAAIP menyewa seorang peretas untuk spionase perusahaan. Meski pengadilan kelas bawah memutuskan bahwa spionase tersebut tidak terhitung  sebagai kejahatan, Pengadilan Sirkuit justru tidak setuju dengan putusan tersebut dan memvonis NAAIP bersalah.

2. Nation-State Hackers

serangan siber

(Source: Wpadington from Getty Images)

Menurut Search Security, jenis serangan siber satu ini sering digunakan oleh pemerintah untuk meretas sistem maupun melakukan tindakan kejahatan terhadap rivalnya. Pernyataan tersebut dapat didasari ketika melihat serangan Solarwinds yang menyebabkan pelanggaran jaringan besar-besaran, hingga memungkinkan peretas untuk membocorkan ribuan data organisasi secara global, termasuk data pemerintah Amerika Serikat.  Lalu, bagaimana ini bisa terjadi?

Pada serangan siber tersebut, peretas memasang malware mereka ke SolarWinds, sebuah perusahaan yang memproduksi platform pemantauan kinerja IT yang disebut Orion. Perlu diketahui, ribuan perusahaan di seluruh dunia menggunakan perangkat lunak yang diproduksi oleh SolarWinds tersebut. Karena telah disusupi oleh malware, semua perangkat lunak dari pelanggan SolarWinds akhirnya tercemar pada bulan Maret hingga Juni 2020.

AS meyakini bila peristiwa tersebut terjadi karena ulah rusia. Tapi itu tidak sepenuhnya benar, ada juga kelompok peretas yang diduga memiliki hubungan dengan pemerintah Korea Utara dan Iran. 

3.  Script-Kiddies

serangan siber

(Source: kaptnali from Getty Images)

Meskipun dianggap amatir karena banyak meretas demi kesenangan, tapi Anda tidak boleh menganggap remeh serangan siber jenis Script-Kiddies. Serangan jenis satu ini cukup dikenal setelah memaksa ratusan website offline pada Jumat 2016 lalu. Bahkan, para ahli juga mempercayai bahwa Script-Kiddies sering membantu penjahat serius melalui penyelidikan sembrono dan kompromi sistem mereka.

Maka dari itu, Anda perlu berhati-hati agar bisnis dapat terlindungi dari serangan siber satu ini. Tapi, bagaimana caranya agar sistem IT terhindar dari serangan Script-Kiddies? Berikut tipsnya:

  • Perbarui perangkat lunak keamanan Anda secara teratur.
  • Lacak lalu lintas situs Anda secara teratur.
  • Jangan gunakan kata sandi yang lemah.

4. Cryptojackers

(Source: stevanovicigor from Getty Images Pro)

Cryptojackers merupakan jenis serangan siber yang mencuri daya komputasi dan sumber daya pengguna untuk meraup cryptocurrency. Dilansir MUO, McAfee pernah mengalami peningkatan 4000 persen dalam malware penambangan kripto pada 2019 lalu. Yang paling menakutkan, peretas beralih dari mengkompromikan PC pengguna individu dan perangkat seluler hingga menyusup ke situs web populer dan menyebarkan malware ke siapapun yang mengunjunginya.

Melihat kasus tersebut, Anda tentu perlu berhati-hati dalam melindungi data dan perangkat perusahaan. Maka dari itu, untuk meminimalisir potensi serangan cryptojackers, Anda bisa mengikuti tips berikut:

  • Selalu waspada terhadap perubahan perilaku perangkat Anda.
  • Gunakan selalu plugin, aplikasi, dan add on yang Anda kenal dan terpercaya.
  • Sebelum mengunduh aplikasi apapun, pastikan itu ditinjau dengan baik, diperbarui secara berkala, dan memiliki unduhan yang cukup.

5. Ransomware Sewaan

(Source: Zephyr18 from Getty Images Pro)

Banyak kelompok peretas terkenal di seluruh dunia menyediakan ransomware untuk disewakan. Kelompok-kelompok tersebut biasanya mengikuti model Ransomware as a Service (RaaS), di mana mereka menyewakan ransomware seperti pengembang perangkat lunak menyewakan produk Software as a Service (SaaS).

Salah satu yang cukup populer dari kasus ini adalah grup ransomware Darkside. Peretas tersebut menyerang Colonial Pipeline, sistem pipa minyak Amerika yang membawa bahan bakar jet dan bensin di sekitar AS. Akibat dari serangan siber tersebut, seluruh manajemen mengalami kerugian lebih dari $15 miliar.

Sebagai pengusaha, Anda pasti tidak ingin bisnis tertimpa ransomware seperti di atas bukan? Maka dari itu, strategi perlindungan data sangat penting untuk dimiliki oleh perusahaan, sehingga risiko kehilangan data bisa diminimalisir semaksimal mungkin. Lalu, bagaimana caranya agar bisnis mencapai strategi perlindungan data yang efektif untuk menghindari serangan siber? Ketahui tips selengkapnya dengan mengunjungi artikel ini.

Zettagrid Indonesia merupakan salah satu penyedia layanan cloud di Indonesia yang menyediakan Infrastructure as a Service (IaaS) seperti Virtual Data Center (VDC), Virtual Private Server (VPS), Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS), dan lainnya. Bila Anda memiliki pertanyaan tentang solusi atau keamanan cloud, Anda dapat menghubungi kami di sini atau ke sales@zettagrid.id.

3 Reasons Why Business Needs VDC Backup

Business VDC Backup

3 Reasons Why Business Needs VDC Backup

The development of digital technology has indeed opened many opportunities for the industry. Ranging from education, lifestyle, healthcare, and other business is now digital as technology solutions arise. Therefore, it is not a surprise anymore to see many businesses automate and scale up their IT capacity to be agile to compete in this era. One of them even utilizing Virtual Data Center (VDC) for that need.

As it is stated in the article before, the role of VDC can replace the need for business to own and operate their own data center. Rather than relying on physical servers to protect business systems and applications, now you can have virtual servers in a private, public, or hybrid cloud environment.

However, using VDC only is not enough for business to manage its IT infrastructure. A data protection strategy like VDC Backup is also needed to secure its system and applications that run virtually. Thus, business can securely store their systems and applications in their VDC.

Then, is there any reason why business needs VDC backup to strengthen its system? Read them below here:

1. Data Loss Can Cost Serious Money

VDC Backup

(Source: DAPA Images from Canva)

Having a regular backups are an insurance policy for business. So much of the modern business supported by computer networks, a loss of your network data can have a crippling financial effect on business.

Ponemon Institute found that a major IT leaders have experienced that incidents led to data loss. With the global average cost that was a staggering $3.6 million, the enterprises approximately had lost $141 per data record.

Even small security breaches impacting a small number of files, it can still have a major impact. A report from Verizon found that small breaches, which involves the loss of fewer than 100 files, can cost business between $18,120 and $35,70. Rather than business throw that money at a preventable problem regularly, then it’s time to implement an effective Backup strategy like VDC Backup.

2. Ransomware

business VDC Backup

(Source: Tzogia Kappatou from Getty Images)

Besides natural disasters, business also needs to prepare for cyberattacks. As digital technology evolves, many challenges like cyber-threat might come and lead business to loss.

According to The Hacker News, new ransomware strains called NotPetya, Wormable DarkRadiation, REvil Ransomware, and so on are found and targets Linux OS and Docker Container. If this ransomware strikes your business, you must be careful as those will encrypt the business files/directories in the OS.

However, enterprise shouldn’t be worried about this. As long as it has VDC Backup for the solution of a ransomware attack, business will minimize the potential of data loss anytime it wants. Furthermore, VDC Backup like in Zettagrid Indonesia also offers business self-service backup and recovery options. Thus, business will experience the ease of a secure, native integration in the VMware vCloud Director.

3. Regulatory Compliance

business VDC backup

(Source: Relif from Getty Images)

Many companies are constantly challenged in meeting policy and regulations for data storage, digital transactions management, and disaster recovery. Regulations tend to be industry-specific and call for the confidentially, portability, and accessibility of information.

Data Backup and business continuity policies must be executed to achieve data compliance. With VDC Backup like in Zettagrid Indonesia, business can leverage its data protection and disaster recovery for regulatory compliance and provide consistent business value and customer satisfaction. 

Then, what is the right backup strategy?

  • Cloud Backups: This could be an essential part of a smart backup strategy. By implementing Cloud Backup like VDC Backup, it will ensure that if your business suffers a natural disaster, you are able to restore your data off-site.
  • Encryption of Data In-Transit: Before being Backed up, the data should be encrypted when in transit. If business passed this step, hackers can snoop on data. That’s why, a smart encryption plan is key to overall data protection across your network.
  • The 3-2-1 Strategy: The 3-2-1 strategy for backups can be effective to build data protection strategy. It involves three backups located in two locations, such as on-premise and cloud storage locations. Finally, you should produce these backups at least once a day for maximum protection.
  • 24/7 Support: When your network goes down or you suffer data loss, you want a partner that can quickly restore your system from a backup no matter what day or time it is. A 24/7 support team like at Zettagrid Indonesia, will help you to recover the data back. Therefore, enterprise does not have to be panic once it happened.
  • Testing Backups: It’s important you work with a provider that tests the integrity of backups, considering a backup report can let you know if any files failed to transfer or if any corruptions occurred. Therefore, testing your backup solution regularly is important to achieve the effective recovery.

Zettagrid Indonesia is a Cloud Service Provider from Indonesia that provides cloud Infrastructure as a Service (IaaS), such as Virtual Data Center (VDC), Virtual Private Server (VPS), VDC Backup, Disaster Recovery, and so on. If your business needs VDC Backup or other cloud solution, you can contact us here or at sales@zettagrid.id.

2 Things To Know About Red Hat Enterprise Linux Subscription

red hat subscription2 Things To Know About Red Hat Enterprise Linux Subscription

As the digital era begins, IT infrastructure becomes a core business differentiator. Even to support business initiatives, IT organizations must optimize their infrastructure first. Therefore, it is not a surprise anymore to see many enterprises look for IT solutions to transform their business into digital. One of them is by using open source software like Red Hat Enterprise Linux subscription.

As an intelligent operating foundation for modern IT, Red Hat Enterprise Linux delivers optimal benefits for your organization. Its consistency across infrastructure allows business to deploy applications, workloads, and services using the same tools, regardless of location. Furthermore, a Red Hat Enterprise Linux subscription provides access to the resources, tools, and technologies business needs to be successful. That’s why, this open source software is often to be the option whether for hybrid cloud deployment or local premise.

Then, what is the difference between Red Hat Enterprise Linux subscription through Cloud Service Provider (CSP) and Red Hat for Hybrid Cloud Deployment and On-Premise? in Zettagrid e-TechDay vol. 10, Muhammad Yunus as a Presales Engineer Manager at Zettagrid Indonesia and Wisa Prabowo as Solution Architect at Red Hat, have answered this question. Curious to know the recap? Read them below here:

Different Support Team Services

CSP does not only offers IT infrastructure, but service like support team is also available for its customers. Therefore, if your business plan to subscribe to Red Hat Enterprise Linux whether for Hybrid Cloud Deployment or On-Premise through CSP like Zettagrid, the support team services will also be available for it. 

However, the services will be different from the business subscription needs. If the business plan to subscribe the Open Sources for local premise through Zettagrid, its sub-support will be available for it. Then, if the business plan for implementing it on hybrid cloud deployment, the support team services will be available in premium. This means, its support team services will be available according to its SLA.

Same as CSP, Red Hat also provides Support Team as a service for Business’ Red Hat Enterprise Linux Subscription. With the standard service, its support team will be available for a year. So, if the business plan to subscribe to its open source through Red Hat, all services will be handled by Red Hat.

Cost and Flexibility

If your business ever explored CSP, management must have known the pay-per-use concept. Yes, with the pay-per-use, business could manage its cost for the cloud infrastructure. So is the Open Source like Red Hat Enterprise Linux subscription, business could have its pay-per-use if they subscribe it through CSP like Zettagrid Indonesia.

However, if your business plan to subscribe through Red Hat, pay-per-use is not available for it. Red Hat offers a subscription in standard and premium for business, and both are available for a year subscription only. 

Find out more about this session by watching the webinar again on our Youtube account. And if you are interested in our cloud solutions, you can contact us at sales@zettagrid.id or click here.

4 Reasons to Choose Red Hat Enterprise Linux for Hybrid Cloud

reasons to choose red hat4 Reasons to Choose Red Hat Enterprise Linux for Hybrid Cloud

As technology evolves in this modern era, IT managers face some challenging pressures in managing their IT environments. Especially in delivering operational efficiency on aspects such as security, performance, availability, and stability, while balancing available IT resources and skills as well as their costs. Not only that but IT team must also move the organization from a “first-aid” mode to one that focuses on delivering innovations that drive business advantages. So, organizations may need the right foundation and management solutions to face the challenge. One of them is by using Red Hat Enterprise Linux.

By offering a standard Open Sources (OS) to underly workloads, Red Hat Enterprise Linux enables you to easily move them across environments. Furthermore, it also gives the user a consistent, stable foundation across hybrid cloud deployments, along with built-in manageability and integration with the broader Red Hat management and automation portfolio. Hence, it could give IT flexible experience for the organization.

However, what Red Hat Enterprise Linux offers to help business achieve those advantage? Read them below here:

1. Lead Business Systems to Emerging Technologies

As the development of technology running now, the release of Red Hat Enterprise Linux 8 can be one the reasons to help tie organization’s systems that lead to emerging technologies. From containers to automation and even Artificial Intelligence (AI), Red Hat Enterprise Linux is created for innovators, developers, and operations engineered.

Its also designed for any enterprise and sets the steps for what they can do now. Thus, enterprise may begin their cloud journey now with the flexible OS like Red Hat Enterprise Linux.

2. A Great Start to Build Cloud Infrastructure

As cloud adoption increased 75% in 2020, it is not a surprise anymore to see the way organizations achieve their IT efficiency and flexibility now. With the automation and reliability, cloud has enabled enterprise to automate its business from day to day. But still, adopting cloud without any proper plan and infrastructure is not suggested for the industry. Therefore, OS like Red Hat Enterprise Linux can be an option to optimize cloud adoption.

Red Hat Enterprise Linux offers the flexibility of open source code and the innovation of open source communities, along with certifications from public cloud and service providers like Zettagrid Indonesia

3. Protect Business from the Vulnerabilities

Plan to build a secure data center? Get started with the best Open Sources first like Red Hat Enterprise Linux. This OS has built-in security features such as Security-Enhanced Linux (SELinux) and mandatory access controls (MAC) to help users combat intrusions and meet regulatory compliance. As well as being the first Linux container framework support to be a Common Criteria-certified (v7.1), Red Hat Enterprise Linux is also Common Criteria and FIPS 140-2 certified.

Not only that but using Red Hat Enterprise Linux also means that thousands of developers are monitoring millions of lines of code in the Linux kernel. Hence, the user may find flaws and developing fixes before vulnerabilities got attacked.

 4. A Long-Term Life Cycle Support

A Red Hat Enterprise also brings long-term advantages for its user, one of them is to maintain critical applications for 10 years or more with deployment choices of major. Besides that, Red Hat also has supported versions and a commitment to preserve app stability with each minor update. Therefore, those can be the reasons to choose Red Hat Enterprise Linux for business OS.

Then, how about the Red Hat operations, especially for cloud infrastructure?

Find the answer on Zettagrid e-TechDay Vol.10: Confidently Build Your Cloud With Red Hat Enterprise Linux, on Wednesday, 7 July 2021. Meet our expert Muhammad Yunus as Presales Engineer Zettagrid Indonesia and Wisa Prabowo as Solution Architect Red Hat Indonesia, to help you developed the IT system. Register here to join the event.