Seven Shortcuts to Losing Your Data (and Probably Your Job)

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Seven Shortcuts to Losing Your Data (and Probably Your Job)-5 Next

The best defenses against human error are automation and retention. Automation allows policies and procedures to be created and automatically executed. Retention allows recovery of data even when the data loss isn’t noticed for some period of time.

Retention is one of the fundamental differentiations between backup and simple high availability (which is typically achieved with some type of replication) - high availability handles hardware failure well but does a poor job of handling logical failures such as those caused by human error - because logical failure is simply replicated in highly available systems. Of course, protecting against hardware failure using high availability and against all types of failure using backup is a common technique for protecting data and systems.

Previously, we described why D2D is such an important component of protecting your system. When we discuss any type of logical failure, including human error, another important concept is to protect your data using a superset of D2D called D2D2x (Disk-to-Disk-to-Any). D2D2x simply means that you have longer-term strategies for backups to either on-premise rotational archiving media (disk or tape - although tape has the risks we’ve discussed previously) or to a private or public cloud.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.

 

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.