How to Mitigate the Risk of Data Loss and Disruption in 2016

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

Decide What Devices to Back Up

If your employees save most of their data on their workstations, a workstation backup will be most useful. If the company uses a central server or databases, you’ll also want to make sure that you have a server backup. Most people will opt to cover both – installing a backup solution for your workstations and then another on the server. Then, no matter where your data is stored, you can rest assured it’s protected.  

As we plan for 2016, IT professionals should reexamine and re-evaluate disaster recovery plans for their companies. Assessing current programs provides IT professionals the opportunity to enact proper best practices to deal with emergencies related to data loss and downtime. Preventing downtime is particularly crucial for small to midsize businesses (SMBs), which can suffer losses as great as $8,220 to $25,600 an hour, according to new research from IDC. The U.S. Small Business Administration even reports that 40 to 60 percent of small businesses fail to reopen after a disaster.

What can SMB IT pros do to prevent this data and financial loss heading into 2016? They must prepare their IT plans ahead of time. From human error to a power outage or an earthquake that disrupts databases and servers, man-made and natural disasters are unavoidable. Thankfully, SMBs have the ability to avoid the loss of important business-critical data in the face of such circumstances.

In this slideshow, David Raissipour, SVP of Engineering, Carbonite, has outlined the top five best practices to follow in order to mitigate the risk of data loss or disruption.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.