Seven Shortcuts to Losing Your Data (and Probably Your Job)

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Seven Shortcuts to Losing Your Data (and Probably Your Job)-3 Next

Taking Another Path

To protect yourself from hardware failure, you have to move your data from primary storage to a completely separate secondary storage. That secondary storage can be (and should be) less expensive than your primary storage, but it has to have RAS (Reliability, Availability, Serviceability) characteristics that are as good or better than your primary storage. Those requirements rule out tape as well as ruling out partitioned primary storage (SAN or NAS) - although SAN and NAS snapshotting may be used between primary backup protection. The best approach is some type of D2D (Disk-to-Disk) back up. The advantage to D2D back up is that you are using secondary media with higher reliability characteristics than tape while still insuring that you have a physically separate secondary storage set so that you can survive hardware and system failure.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.

 

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

 
More Slideshows

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.