We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Road Warrior Disaster Recovery

Formal Metadata

Title
Road Warrior Disaster Recovery
Subtitle
Secure, Synchronized, and Backed-Up
Title of Series
Number of Parts
34
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Many of us spend days and weeks planning, and implementing strategies for disaster recovery in the server room, whether corporate or personal. How many of us, however, can really say we're prepared to recover our primary computing system in the office ... or on the go? Or that it's secure enough that if it were lost, stolen, or seized we wouldn't lose important data, or lose sleep? In this talk we'll look at the various strategies available to us to ensure our laptops are secure, synchronized, backed up and ready to recover. Whether at the office or at home, we spend a lot of time ensuring our systems are secure and backed-up, ready to recover in case of disaster. When it comes to our workstations, which are often laptops, we've often done little more than enable full-disk encryption and perhaps the odd occasional rsync for backups. Full-disk encryption is usually adequate protection against data loss due to opportunistic theft or casual loss. 10 years ago that might have been enough. But the times have changed. Today our laptops carry more than just our working files. They often include the entire corporate code repository, passwords and authentication keys, as well as personal files and data. Are our portable computers hardened against directed attack? Are we prepared for border-patrol agents or other state officials demanding passwords or unfettered access to our computing systems ... or online accounts? We're also more mobile. We expect to work when we want and where. How many of us can honestly say we could recover all -- or enough -- of our computing environment from bare metal in a day, half-day, or hour to be productive ... halfway across the globe? In this talk we'll look at the risks to the vast amounts of data we so casually carry around. We'll review strategies and techniques to reduce or mitigate those risks, as well as prepare our systems for easier recovery, at rest or on the go. We'll look at: Risks Machine physical security Encryption Data synchronization options On-the-go backup solutions On-the-go recovery Preparing to cross international borders