dcsimg

Seven Shortcuts to Losing Your Data (and Probably Your Job)

  • Seven Shortcuts to Losing Your Data (and Probably Your Job)-

    Shortcut to Losing Your Data

    Theft is another cause of data loss. Theft manifests itself either via a “data spill,” in which data isn’t lost but instead made available to third parties for whom the data wasn’t intended, or in outright destruction. For the purposes of this slideshow, we’re going to limit our discussion to outright destruction of data.

    The destruction of data is rarely performed by a relatively disinterested “hacker.” Instead, it is most often performed by a disgruntled employee or ex-employee. It is incredibly difficult to prevent, although precautions should be and most often are taken particularly around the involuntary termination of employees.

    Taking Another Path

    The first step to avoid malicious destruction is to create policies that make your primary data more difficult to destroy. These include strict policies and procedures associated with not only involuntary but voluntary termination as well as taking steps to secure your environment from external access.

    From the perspective of data protection, theft is largely indistinguishable from human error in terms of the tools and techniques that must be used to protect your data - the only difference between the two is motive, and motive isn’t really a factor in this type of logical failure. Automation and retention again are the most important strategies for ensuring that you can survive this type of threat.

1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11

Seven Shortcuts to Losing Your Data (and Probably Your Job)

  • 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
  • Seven Shortcuts to Losing Your Data (and Probably Your Job)-7

    Shortcut to Losing Your Data

    Theft is another cause of data loss. Theft manifests itself either via a “data spill,” in which data isn’t lost but instead made available to third parties for whom the data wasn’t intended, or in outright destruction. For the purposes of this slideshow, we’re going to limit our discussion to outright destruction of data.

    The destruction of data is rarely performed by a relatively disinterested “hacker.” Instead, it is most often performed by a disgruntled employee or ex-employee. It is incredibly difficult to prevent, although precautions should be and most often are taken particularly around the involuntary termination of employees.

    Taking Another Path

    The first step to avoid malicious destruction is to create policies that make your primary data more difficult to destroy. These include strict policies and procedures associated with not only involuntary but voluntary termination as well as taking steps to secure your environment from external access.

    From the perspective of data protection, theft is largely indistinguishable from human error in terms of the tools and techniques that must be used to protect your data - the only difference between the two is motive, and motive isn’t really a factor in this type of logical failure. Automation and retention again are the most important strategies for ensuring that you can survive this type of threat.

This tongue-in-cheek slideshow, provided by Unitrends, explores data loss from a contrarian point of view - exploring the top seven shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.