Seven Shortcuts to Losing Your Data (and Probably Your Job)

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Seven Shortcuts to Losing Your Data (and Probably Your Job)-8 Next

Shortcut to Losing Your Data

Computer viruses range from the annoying to those that threaten not only the systems of your organization but your organization’s reputation as well. The easiest way to lose your data with respect to computer viruses is to not install a firewall and antivirus software. In addition, make sure that all of your systems operate using Windows - not just your PCs but your servers and your backup servers as well. That way, you insure 100 percent infection when a virus occurs.

Taking Another Path

In order to protect your data, you will of course have a firewall and install antivirus software. From a back up perspective, the important thing here is to operate your back up and disaster recovery software on a non-Windows platform.

Vendors ship their backup software on Windows platforms for one reason - they can make the most money with the least expense because Windows is so ubiquitous. If you take a step back and think about it, however, it just doesn’t make sense to run your “protection” software on the same operating system that is relentlessly under attack by malicious people.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.


Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.