Seven Shortcuts to Losing Your Data (and Probably Your Job)

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Seven Shortcuts to Losing Your Data (and Probably Your Job)-10 Next

Shortcut to Losing Your Data

All of the previous shortcuts we’ve discussed were derived from statistics that illustrated the most common reasons for data loss. However, this shortcut - concerning losing your data by taking recovery for granted - applies to all of those reasons for data loss. This one is pretty simple - simply assume recovery will work.

Taking Another Path

Don’t assume anything! Regardless of the technology that you use, it’s important that you periodically test your recovery. Don’t assume because you can write to tape that you can read from that tape. Don’t assume because a dashboard shows you a successful backup status that you can recover that backup. Be paranoid and test. And then test again.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.

 

Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.