Seven Shortcuts to Losing Your Data (and Probably Your Job)

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Seven Shortcuts to Losing Your Data (and Probably Your Job)-4 Next

Shortcut to Losing Your Data

Human error is the second leading cause of data loss. Human error ranges from accidental deletion of files and records to ignoring policies regarding data to rebooting systems without proper shutdown procedures. Blind belief and trust in your fellow coworkers to not only follow policy but to not make any mistakes at all are fundamental to using this shortcut to its fullest potential in losing your data.

Taking Another Path

There are two fundamental reasons for human error: ignorance and arrogance. Attempting to change human nature is the height of arrogance. People have a tendency to be incredibly poor at following policy. Thus, specifying that all “important” data will be stored only on centralized corporate servers and storage tends to fail as soon as a C-level executive loses the data on their notebook. But even when people try their best to follow policy, accidents such as file and record deletion will occur.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.


Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.