We haven’t had articles on this blog covering backup lately. We are also busy working on another good paper related to NAND flash data recovery and no one is eager to write. I found this one though.

This 2009 Backup Manual Still Apply

Today, small and middle-size business (SMB) management putting a lot of effort to protect their business from various threats: intrusion prevention systems scan packets for potential damaging contents, security systems check for viruses in email or document content, firewalls block unsolicited connections and file servers store your sensitive data. To stop onslaught of threats to corporate and government networks, a host of software and appliances are being deployed daily.

In general, these border police application are doing fairly decent job of stopping unauthorized intrusion at the door of your network as well as keeping your crucial data safe. But what about organizational insiders? What about sensitive data bent unprotected over the Internet to another provider? Add in the always changing regulatory environment, and security is unique challenge. All it takes is one misstep to compromise sensitive information. These are legitimate, authorizes users communicating in an above-board way – but potentially exposing sensitive data in the process or your file server has a malfunction and your sensitive data might be corrupted or even lost. This is the core of the immensely complex problem of data loss.

To address the data loss problem, organizations need to focus now on content filtering and blocking of electronic communications leaving the network – and not just email, but instant messaging, webmail, HTTP, FTP and VPN communications as well. All avenues of electronic communication need to be policed to prevent intellectual property, financial information, client information, personal data and variety of sensitive information depending on the business and the industry from falling into the wrong hands.

The data recovery industry around the world are doing hard job in order to recover and protect sensitive data. In the past 12 years businesses I associated with managed to develop policies to prevent data being exposed. We are implementing these policies to your business to keep your data safe and protected. The reason is simple, state-of-the art laboratory, procedures, know-how methods as well as experience in field of data recovery sometimes is not enough to recover all the data being stored on damaged media. On the other words less than 15% of all damaged media being processed in our laboratory is unrecoverable.

So what about those 15% of unrecoverable data? The question is simple. Are you going to take your chances? There is the other and much easier way! Backup your crucial data and implement backup policies and methodology and keep your data safe and protected. This was almost a full quote to a foreword I wrote in 2009 for the Cromino’s backup paper. Original Backup Manual is available to view and download as PDF.

Print Friendly, PDF & Email

2 thoughts on “Backup Manual

    1. It is a great paper. You should read it first! It goes to details about backup, data loss, strategies, disaster recovery, business continuity, etc. The project was done in Romania. This EU country has remarkable internet connection and it was a great place to do disaster recovery research project. I will submit NAND data recovery related article soon! 🙂

Comments are closed.