Seven Shortcuts to Losing Your Data (and Probably Your Job)

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Seven Shortcuts to Losing Your Data (and Probably Your Job)-9 Next

Shortcut to Losing Your Data

Disasters are not a leading cause of data loss by any means. Data loss due to disasters occurs no more than one to three percent of the time. In order to take the shortcut to losing your data, you should focus on the relative rarity of disasters and ignore the severe consequences when a disaster strikes.

Taking Another Path

Why don’t people walk around outside in thunderstorms? The odds of getting struck by lightning are pretty low. The National Weather Service estimates that the odds in any given year are 1 in 500,000. The reason, of course, is that the consequences of being struck by lightning are very high. The odds of death are 1 in 10; the odds of disability approach 9 in 10.

The odds of data loss due to a natural disaster are relatively low; however, the consequences are severe. In order to safeguard your data, you need to have a disaster recovery plan for your environment. A major part of that disaster recovery plan is protecting your data. There are two basic schemes for this: tape-based rotational archiving and electronic-based replication of data to an off-premise site.

Unitrends advises looking at vendors that support an integrated D2D2x approach, whereby you can use disk, tape or electronic replication concurrently to optimize your overall spending in support of true disaster recovery.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.

 

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.