How to Ensure Appropriate Data Protection
- Author Mark Palmer
- Published March 7, 2012
- Word count 595
Data is at the heart of any business or organisation, and protecting that data is essential. From mission-critical transaction-based application data, to inactive & legacy data, it all needs to be protected. So how can you ensure that you are taking the necessary steps to protect your data?
First and foremost, all primary data needs to be analysed in order to ascertain the following information;
The volume of the data
The type and age of the data
Historical data growth
Data creation, access and modification dates
Identification of any duplicate data
Biggest servers, users and files
Sort the data by level of importance
A typical business or organisation will have four different types of data, with varying degrees of importance. Each of these four categories will require a different level of protection through varying levels of automated backups.
Mission-critical data – This is the most important data which is typically transaction-based application data, which if lost would have a severe impact on a business. Mission-critical data needs to be backed up or replicated throughout the day, 365 days a year.
The type of data that falls into this category could comprise information from fast-changing applications and databases to business email accounts. In order to back up this data without impacting the servers on which the data resides, the data should be replicated every time it is modified, or new data is created.
Data replication can significantly reduce recovery time objectives (RTO) and recovery point objectives (RPO) as well as securing fast recovery for business continuity purposes.
Important data - Important data refers to other types of application and file data which has been created or accessed during the last 90 days. This type of data should ideally be backed up once a day and retained for an appropriate retention period.
All critical data should be backed up off-site, safe from system failures, power outages and physical server damage.
Inactive and legacy data - This is the data that is no longer important but still requires protecting for operational or compliance reasons. Inactive & legacy data typically sits on the mail server or local mail stores on file servers.
Although this data may not have been accessed for a long time, it should still be archived in order to reduce strain on the primary server, cut management and backup costs and improve recovery times.
Duplicate and non-business data - Any data that does not serve business requirements, such as data out of its retention date or users’ personal files (such as music or photos) should be deleted during the archiving process. Eradicating this non-business-critical data will reduce storage costs and management overheads.
Make data accessible to its owners
End users should be able to access the data they need it, when and where they need it. Whether it’s mission-critical data residing on primary servers, or inactive data stored on archive servers, it should be easily accessible to the owners without the need for assistance from IT administrators or IT help desks.
Regularly test mission-critical and important data recovery
One of the biggest challenges for IT departments is disaster recovery (DR) testing. However, if a DR plan is tested regularly to application level, it can significantly improve recovery times and reduce potential problems. Although a potential disruption to the daily work load, DR testing should be standard procedure in every organisation.
Businesses or organisations that manage their data archiving in the correct way, though regular testing and analysis, will enjoy potentially huge rewards in the form of improved data recovery speeds and reduced management costs. Are you protecting your data properly?
Article submitted by Mark Palmer, Online Marketing Manager at InTechnology - one of the UK’s leading data management providers, delivering data backup services, data archiving and data replication. To find out more about data management visit http://www.intechnology.co.uk.
Article source: https://articlebiz.comRate article
Article comments
There are no posted comments.
Related articles
- IQ Tests: History, Uses, and Choosing a Reliable Resource
- 8 Great Ways To Teach Kids About Oral Hygiene
- App Development as a Catalyst for Business Growth
- Costs of arranging a Mortgage in Spain
- TikTok and Instagram: Ways you will grow and learn.
- Mustang GT: Ford Motor Company is a Rising Force!
- 10 Ways to Transform Production Scheduling in Business Central
- Elevating Your Home with Bold Decor and Vintage Carved Doors
- The Ultimate Skin Care Guide for Every Weather
- Do I Need Insurance When I Rent a Boat?
- Casino Bonuses: How to Maximize Your Rewards and Enhance Your Gameplay
- Was Joseph Stalin a good or bad leader of the Soviet Union?
- Top 5 Slots with the Highest RTP: A Winning Guarantee or a Myth?
- The Thrill of the Hunt Discovering the World of Location-Based Entertainment
- How Much Is the Hermès Cleaning Fee?
- Does Hermès Offer Free Repairs?
- The history of gun control in Australia
- Digital Marketing
- How to Mix and Match: Tips for Building Versatile Outfits from Your Wardrobe
- The Significance of Commercial Cleaning Services in Auckland: A Key Element of the Modern Cleaning Industry
- How RTP Impacts Online Casino Gaming: A Guide for Players and Operators
- How Authentic Employee Reviews Boost Employer Branding
- How to Choose the Best Online Casino: 5 Simple Steps
- Guaranteed Auto Financing
- Transform The Mudroom for The Festive Season
- Rustic Thanksgiving Ambiance with Farmhouse-inspired Doors
- Master the Art of Gamification with Our Engaging App
- Some reflections about leveraging GenAI at scale within IT departments
- Why SureSIM Global is a Revolution in the Business Travel Industry
- How RTP Impacts Online Casino Gaming: A Guide for Players and Operators