10 PC Office Data Storage Recommendations
-
@DustinB3403 said:
So if it's storage, you don't want to backup to another unit sitting right next to it.
Offsite is likely the best option. Maybe a few external drives that get rotated weekly?
At least not ONLY to a device sitting right next to it. That plus something else is fine.
-
I think this device can mirror itself to an offsite device of the same type, right?
That's what I was thinking of.
They also support cloud backup of the device.
-
@BRRABill said:
@scottalanmiller said:
How could it be DOABLE, though?
The device supports it?
Everything "supports" it but no one uses it because it's not useful. Picture the scenario....
If the NAS itself is encrypted, how will people access it? Will they need to log into the NAS every time it reboots and unencrypt everything before they use it? What doctor or law office could handle that task?
The problem with encryption is that it is so immensely impractical to use that it is useless. Generally speaking.
How do you make it so that they have to unencrypt things while still making it encrypt enough to protect against something real?
-
@BRRABill said:
I think this device can mirror itself to an offsite device of the same type, right?
Mirroring is replication, not backup. A deletion or corruption gets copied.
It is only a backup if it is decoupled.
-
@scottalanmiller said:
@BRRABill said:
I think this device can mirror itself to an offsite device of the same type, right?
Mirroring is replication, not backup. A deletion or corruption gets copied.
It is only a backup if it is decoupled.
The device also does versioning.
I see what you mean though, that if the whole thing was corrupted, it would be an issue.
-
@BRRABill said:
@scottalanmiller said:
@BRRABill said:
I think this device can mirror itself to an offsite device of the same type, right?
Mirroring is replication, not backup. A deletion or corruption gets copied.
It is only a backup if it is decoupled.
The device also does versioning.
I see what you mean though, that if the whole thing was corrupted, it would be an issue.
If you have something like RSnapshots as a backup process, that would be fine. but just mirroring isn't useful.
-
@scottalanmiller said:
If the NAS itself is encrypted, how will people access it? Will they need to log into the NAS every time it reboots and unencrypt everything before they use it? What doctor or law office could handle that task?
Key on removable USB drive?
Places like doctor offices need the data at rest to be encrypted. How could you NOT do something?
-
@scottalanmiller said:
If you have something like RSnapshots as a backup process, that would be fine. but just mirroring isn't useful.
That's what I am looking to find out. I know a few people here are using this box and OS so hopefully they will chime in.
-
@BRRABill said:
Key on removable USB drive?
So.... not encrypted for all intents and purposes? How would this not be the same as taping the password to the front? In fact it would be worse, a thief wouldn't even figure out that it was encrypted.
-
@BRRABill said:
Places like doctor offices need the data at rest to be encrypted. How could you NOT do something?
No they don't. Not legally and not practically. There is no reason to be encrypting that data. And there is no reasonable means of doing it until they are large enough to have full time IT staff handling all of this stuff. No doctor's office is doing this unless they are completely hosted or have full time IT and even then... basically none do it.
-
@BRRABill said:
@scottalanmiller said:
If you have something like RSnapshots as a backup process, that would be fine. but just mirroring isn't useful.
That's what I am looking to find out. I know a few people here are using this box and OS so hopefully they will chime in.
The majority use it as a backup target.
-
Taking a backup of a NAS is pretty easy if it is not large. You can just make a tarball and copy it off with a simple script.
-
@scottalanmiller said:
So.... not encrypted for all intents and purposes? How would this not be the same as taping the password to the front? In fact it would be worse, a thief wouldn't even figure out that it was encrypted.
You boot with it in and remove after it boots. That's not crazy difficult.
-
@scottalanmiller said:
basically none do it.
That I agree with. Doesn't mean it right.
So you are telling me if a 10 employee doctor office came to you and said "I was told we needed to encrypt our data" you would say "fuggetaboutit"?
-
@BRRABill said:
You boot with it in and remove after it boots. That's not crazy difficult.
You've never met a doctor. Literally never met a doctor who could or would do this. Never, ever. You'd have to train them to power down, find their USB stick, plug in, power up, wait, verify, unplug, hide and secure the USB stick.
Ha. Will never happen. Never.
And no NAS supports this either, that I know of, it's so impractical that no one is making the tools for this process. But it is moot, no doctor or attorney will consider it.
-
@BRRABill said:
So you are telling me if a 10 employee doctor office came to you and said "I was told we needed to encrypt our data" you would say "fuggetaboutit"?
Of course. My job is to protect them from themselves. Doctors have no idea what they need. They should never be making technology decisions. Any doctor demanding that kind of control is going to be dangerous. You need doctors asking about security, not determining how to secure things.
-
Doctors want it immediately. If it doesn't happen in about 10 seconds it's taken too long.
-
@johnhooks said:
Doctors want it immediately. If it doesn't happen in about 10 seconds it's taken too long.
Immediately and with no intervention from them.
-
@scottalanmiller said:
You've never met a doctor. Literally never met a doctor who could or would do this. Never, ever. You'd have to train them to power down, find their USB stick, plug in, power up, wait, verify, unplug, hide and secure the USB stick.
They won't but their staff will. I work with a doctors who would have their staff do this.
It's a bit of a reach, yes, I will agree.
-
@BRRABill said:
They won't but their staff will. I work with a doctors who would have their staff do this.
Now picture this.... this has to be done EVERY time that the system restarts. Whether a reboot or power loss or whatever. Even just a software reboot.
The USB stick has to be stored somewhere. Someone has to find it. Someone has to reboot the system with it in. This takes time.
How many times will this problem come up before the USB stick is discretely left in place, accidentally left in place or things go down and no one can figure out what to do?
Realistically, it doesn't work. And there is no legal or practical reason for doing it. Why even have the discussion? Instead, why don't they just lock up the NAS?