How to Ensure Appropriate Data Protection

Computers & Technology

  • Author Mark Palmer
  • Published March 7, 2012
  • Word count 595

Data is at the heart of any business or organisation, and protecting that data is essential. From mission-critical transaction-based application data, to inactive & legacy data, it all needs to be protected. So how can you ensure that you are taking the necessary steps to protect your data?

First and foremost, all primary data needs to be analysed in order to ascertain the following information;

The volume of the data

The type and age of the data

Historical data growth

Data creation, access and modification dates

Identification of any duplicate data

Biggest servers, users and files

Sort the data by level of importance

A typical business or organisation will have four different types of data, with varying degrees of importance. Each of these four categories will require a different level of protection through varying levels of automated backups.

Mission-critical data – This is the most important data which is typically transaction-based application data, which if lost would have a severe impact on a business. Mission-critical data needs to be backed up or replicated throughout the day, 365 days a year.

The type of data that falls into this category could comprise information from fast-changing applications and databases to business email accounts. In order to back up this data without impacting the servers on which the data resides, the data should be replicated every time it is modified, or new data is created.

Data replication can significantly reduce recovery time objectives (RTO) and recovery point objectives (RPO) as well as securing fast recovery for business continuity purposes.

Important data - Important data refers to other types of application and file data which has been created or accessed during the last 90 days. This type of data should ideally be backed up once a day and retained for an appropriate retention period.

All critical data should be backed up off-site, safe from system failures, power outages and physical server damage.

Inactive and legacy data - This is the data that is no longer important but still requires protecting for operational or compliance reasons. Inactive & legacy data typically sits on the mail server or local mail stores on file servers.

Although this data may not have been accessed for a long time, it should still be archived in order to reduce strain on the primary server, cut management and backup costs and improve recovery times.

Duplicate and non-business data - Any data that does not serve business requirements, such as data out of its retention date or users’ personal files (such as music or photos) should be deleted during the archiving process. Eradicating this non-business-critical data will reduce storage costs and management overheads.

Make data accessible to its owners

End users should be able to access the data they need it, when and where they need it. Whether it’s mission-critical data residing on primary servers, or inactive data stored on archive servers, it should be easily accessible to the owners without the need for assistance from IT administrators or IT help desks.

Regularly test mission-critical and important data recovery

One of the biggest challenges for IT departments is disaster recovery (DR) testing. However, if a DR plan is tested regularly to application level, it can significantly improve recovery times and reduce potential problems. Although a potential disruption to the daily work load, DR testing should be standard procedure in every organisation.

Businesses or organisations that manage their data archiving in the correct way, though regular testing and analysis, will enjoy potentially huge rewards in the form of improved data recovery speeds and reduced management costs. Are you protecting your data properly?

Article submitted by Mark Palmer, Online Marketing Manager at InTechnology - one of the UK’s leading data management providers, delivering data backup services, data archiving and data replication. To find out more about data management visit http://www.intechnology.co.uk.

Article source: https://articlebiz.com
This article has been viewed 753 times.

Rate article

Article comments

There are no posted comments.

Related articles