NAS Piergiorgio Venuti

Alternative to the NAS

NAS

Network Attached Storage (NAS) is a great low-cost tool for storing your data like backups (single files / folders or entire operating system images). Thanks to its connection (ethernet or wifi) with the local network (LAN) it is possible to easily copy the contents from your PC or server to the NAS using manual and / or automatic systems.

So why is not the NAS the reliable solution for storing my backups?

Although it is cheap and very easy to install, configuring it and using it presents some critical issues that do not make it ideal in professional work environments where data is a critical component and the backup and restore process must be absolutely guaranteed. Let’s see some examples together:

DISADVANTAGES OF BACKUP ON NAS

  ♦ Theft: typically the NAS are physically located inside the company (office, CED, etc.), in the same building where the data are stored that they keep the backup therefore in case a company should suffer the theft of the equipment the latter would lose both the original data present in the computers / servers and their backup contained in the NAS;

  ♦ Damages: Catastrophic events (earthquakes, tsunamis, tsumamis, floods, fires, etc) could damage the company’s computer equipment, destroying both the original data and the backups stored on the NAS;

  ♦ Ransomware: the latest variants of ransomware are able to encrypt the content of the data stored in the NAS, which makes this tool ineffective because the backup would be in turn compromised and its data not usable.

 

Do not limit yourself to the NAS to save your data, save them in the Cloud with the BaaS services (Backup as a Service)

What are the countermeasures to protect your data?

ADVANTAGES OF THE BACKUP ON CLOUD

   ♦ Physical protection: keeping your backups on the Cloud means relying on Cloud Providers who, thanks to their Datacenter, are able to guarantee the physical security of the data, also in compliance with the ISO certifications;
   ♦ Cloud: The Cloud by its nature allows to segregate data in order to protect the backups from ransomware viruses and all those activities (voluntary or involuntary cancellations) that constitute a threat to the data;
   ♦ Scalability: the size reserved for backup can easily be increased to adapt to continuous business changes.

[btnsx id=”2931″]

Useful links:

New Cloud Server video – Create your Public Cloud

VPS Metered – Cloud location

BaaS | Veeam Cloud Connect

New Acronis Cloud Backup model for end users and new reseller plan

Stay in control of your fast-moving, quick-shifting data

Subscription business model – Basics

A Hybrid Cloud Backup Solution for System Integrator and reseller

ownCloud

New templates for VPS

BaaS | Cloud Backup | Backup as a Service

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • Defense in depth -- the Microsoft way (part 89): user group policies don't deserve tamper protection June 3, 2025
    Posted by Stefan Kanthak on Jun 03Hi @ll, user group policies are stored in DACL-protected registry keys [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies] respectively [HKEY_CURRENT_USER\Software\Policies] and below, where only the SYSTEM account and members of the "Administrators" user group are granted write access. At logon the user's registry hive "%USERPROFILE%\ntuser.dat" is loaded with exclusive (read, write and...
  • CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 June 3, 2025
    Posted by Sanjay Singh on Jun 03Hello Full Disclosure list, I am sharing details of a newly assigned CVE affecting an open-source educational software project: ------------------------------------------------------------------------ CVE-2025-45542: Time-Based Blind SQL Injection in CloudClassroom PHP Project v1.0 ------------------------------------------------------------------------ Product: CloudClassroom PHP Project Vendor:...
  • ERPNext v15.53.1 Stored XSS in bio Field Allows Arbitrary Script Execution in Profile Page June 3, 2025
    Posted by Ron E on Jun 03An authenticated attacker can inject JavaScript into the bio field of their user profile. When the profile is viewed by another user, the injected script executes. *Proof of Concept:* POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 Host: --host-- profile_info={"bio":"\">"}
  • ERPNext v15.53.1 Stored XSS in user_image Field Allows Script Execution via Injected Image Path June 3, 2025
    Posted by Ron E on Jun 03An authenticated user can inject malicious JavaScript into the user_image field of the profile page using an XSS payload within the file path or HTML context. This field is rendered without sufficient sanitization, allowing stored script execution in the context of other authenticated users. *Proof of Concept:*POST /api/method/frappe.desk.page.user_profile.user_profile.update_profile_info HTTP/2 […]
  • Local information disclosure in apport and systemd-coredump June 3, 2025
    Posted by Qualys Security Advisory via Fulldisclosure on Jun 03Qualys Security Advisory Local information disclosure in apport and systemd-coredump (CVE-2025-5054 and CVE-2025-4598) ======================================================================== Contents ======================================================================== Summary Mitigation Local information disclosure in apport (CVE-2025-5054) - Background - Analysis - Proof of concept Local information disclosure in systemd-coredump...
  • Stored XSS via File Upload - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Stored XSS via File Upload - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS via File Upload #1: Steps to Reproduce: 1. Login with low privilege user and visit "Profile" > "Edit […]
  • IDOR "Change Password" Functionality - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: IDOR "Change Password" Functionality - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ IDOR "Change Password" Functionality #1: Steps to Reproduce: 1. Login as user with low privilege and visit profile page 2. Select […]
  • Stored XSS "Send Message" Functionality - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Stored XSS "Send Message" Functionality - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS "Send Message" Functionality #1: Steps to Reproduce: 1. Login as normal user and visit "Profile" > "Message" > […]
  • Authenticated File Upload to RCE - adaptcmsv3.0.3 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Authenticated File Upload to RCE - adaptcmsv3.0.3 # Date: 06/2025 # Exploit Author: Andrey Stoykov # Version: 3.0.3 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Authenticated File Upload to RCE #1: Steps to Reproduce: 1. Login as admin user and visit "System" > "Appearance" > […]
  • Stored XSS in "Description" Functionality - cubecartv6.5.9 June 3, 2025
    Posted by Andrey Stoykov on Jun 03# Exploit Title: Stored XSS in "Description" Functionality - cubecartv6.5.9 # Date: 05/2025 # Exploit Author: Andrey Stoykov # Version: 6.5.9 # Tested on: Debian 12 # Blog: https://msecureltd.blogspot.com/ Stored XSS #1: Steps to Reproduce: 1. Visit "Account" > "Address Book" and choose "Edit" 2. In the "Description" parameter […]

Customers

Newsletter

{subscription_form_1}