Seven Shortcuts to Losing Your Data (and Probably Your Job)

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Next Seven Shortcuts to Losing Your Data (and Probably Your Job)-2 Next

Shortcut to Losing Your Data

Hardware failure is the leading cause of data loss; thus, ignoring hardware failure is the most important shortcut you can take in order to lose data. You have several choices with respect to taking this shortcut. The most straightforward technique to lose your data is to simply ignore that hardware failure can occur and simply not back up your systems and data. Of course, that’s a bit crass - there are more subtle ways to ensure data loss.

Another age-old option to help you lose your data is to use tape as your backup medium. With the high failure rates associated with tape, sooner or later you’re assured that you’re going to need to recover your data and not be able to do so.

A creative technique to ensure you will eventually lose your data is to use your SAN or NAS storage device as both the source of the backup and the target of a backup. Note that we're not referring to snapshots in between physical transfers of data off the SAN or NAS; we're talking about using your SAN and NAS for primary storage and for backup storage exclusively.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.


Related Topics : Security Breaches, Vulnerabilities and Patches, Application Security, Spyware, Pharming

More Slideshows

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

Subscribe Daily Edge Newsletters

Sign up now and get the best business technology insights direct to your inbox.