×
Cyber Incident at Bir Group Holdings

Technical Breakdown of the Incident

The incident at Bier Group Holdings highlights several critical cybersecurity and IT management failures.

  • Public-facing Server Without VPN: Exposing the server directly to the internet with a real IP address without any VPN or firewall created a massive security vulnerability. It's like leaving the front door of your house wide open for anyone to walk in. VPNs and firewalls act as essential security barriers, filtering out malicious traffic and preventing unauthorized access.

  • Use of Cracked Windows: Using a cracked version of Windows is incredibly risky. These versions often lack the latest security patches and updates from Microsoft, leaving the system vulnerable to known exploits and malware. Additionally, the cracking software itself can contain viruses or backdoors.

  • Lack of Regular Backups: Relying solely on RAID (Redundant Array of Independent Disks) as a backup solution is a common and dangerous misconception. RAID provides data redundancy to protect against a single disk failure, but it does not protect against data corruption, accidental deletion, or cyberattacks like ransomware. If the data on the primary drives gets corrupted or encrypted, the corrupted data is instantly mirrored across all drives in the array.

  • Disregard for Warnings: The GM's dismissal of your concerns shows a lack of understanding of modern IT security practices. This is a common issue in many organizations where traditional management ignores expert advice, leading to disastrous consequences.


Lessons Learned and Best Practices

This experience offers valuable insights for anyone in an IT role.

  • Prioritize Security: Your action of setting up Tally ERP on a secure cloud was the right move. Cloud services typically have robust security measures, regular updates, and built-in backup solutions that are far superior to a single, unsecured local server.

  • Establish a Proper Backup Strategy: A comprehensive backup plan should follow the 3-2-1 rule: at least three copies of your data, stored on two different types of media, with one copy off-site. This ensures that even if a catastrophic event occurs, you can still recover your data.

  • Advocate for Best Practices: As an IT professional, it's your responsibility to advocate for best practices and proper budgeting for security. While challenging, your experience demonstrates why this advocacy is crucial.

  • Document Everything: In situations like this, it's important to document your warnings and recommendations. This not only protects you professionally but also serves as a record of the risks that were ignored.

  • Client
    Shabbir A. Agha
  • Budget
    BDT 1000000
  • Duration
    36 Months

Have Query ?

×

চাকুরি নিয়ে চিন্তিত?

৫ মিনিটে আপনার স্বপ্নের পোর্টফোলিও তৈরি করুন!,কোডিং-এর ঝামেলা বাদ দিন। আমাদের অটোমেটিক বিল্ডার ব্যবহার করে দ্রুত, পেশাদার এবং ইমপ্রেসিভ পোর্টফোলিও তৈরি করে ক্লায়েন্ট/চাকরিদাতাদের মুগ্ধ করুন। এখনই শুরু করুন এবং আপনার কাজকে কথা বলতে দিন!