1. Business Ideas
  2. Business Plans
  3. Startup Basics
  4. Startup Funding
  5. Franchising
  6. Success Stories
  7. Entrepreneurs
  1. Sales & Marketing
  2. Finances
  3. Your Team
  4. Technology
  5. Social Media
  6. Security
  1. Get the Job
  2. Get Ahead
  3. Office Life
  4. Work-Life Balance
  5. Home Office
  1. Leadership
  2. Women in Business
  3. Managing
  4. Strategy
  5. Personal Growth
  1. HR Solutions
  2. Financial Solutions
  3. Marketing Solutions
  4. Security Solutions
  5. Retail Solutions
  6. SMB Solutions
Product and service reviews are conducted independently by our editorial team, but we sometimes make money when you click on links. Learn more.
Grow Your Business Technology

5 IT Shortcuts That Put Your Company’s Data at Risk

5 IT Shortcuts That Put Your Company’s Data at Risk Credit: Walking tight rope image via Shutterstock

IT departments looking to save time and money shouldn’t be doing so at the expense of their data protection. A study from the University of Texas revealed that 43 percent of companies suffering from catastrophic data loss close and never reopen, and 51 percent close within two years.

Backup solutions provider Unitrends warns IT professionals about five common data protection shortcuts that could put their company's data — and even their job — at risk.

  • Ignoring hardware failures: Hardware failures are the leading cause of data loss. Though most IT professionals don't completely disregard hardware that is failing to back up company data and systems, many do often ignore the fact that certain backup mediums have high failure rates, such as tape or a SAN or NAS storage device that is used as both the source and target of a backup. To reduce the risk of hardware failures, move data from primary storage to a separate, secondary storage device. Disk-to-disk backup is the best approach, as it's more reliable than tape and still ensures a physically separate secondary storage set that can survive hardware and system failures.
  • Trusting co-workers to follow policies: The reality is that employees aren't always great at following company policies, and even when they do, mistakes still happen. The best defenses against human error are automation and retention. Automation enables automatic execution and strict enforcement of created policies and procedures, and retention enables data recovery, regardless of whether the data loss is noticed right away or weeks later.
  • Underestimating cybercriminals: By now, most companies have at least basic security solutions, such as firewalls and anti-virus software, in place to defend against malware. But cybercriminals are becoming very adept at breaking through traditional cyberdefenses. IT professionals shouldevaluate their infrastructure, identify areas of vulnerability and implement advanced security solutions to overcome them. These solutions include web monitoring software for safe Internet usage, end-point protection for bring-your-own-device management and a sandbox to fight targeted attacks. From a backup perspective, the best approach is to operate backup and disaster-recovery solutions on a non-Windows operating system. Windows has long been one of cybercriminals’ favorite targets, and running protection software on an operating system that is relentlessly under attack just doesn’t make sense. 
  • Playing the odds: Despite data-loss horror stories, many companies still don’t have a disaster-recovery plan in place to protect information from natural and man-made disasters. And many of the companies that do have a plan in place have just one general set of guidelines that apply to all disaster situations. A strong plan focuses on people, infrastructure and processes, and clearly outlines how each is affected in different disaster scenarios.
  • Failing to test disaster-recovery plans: Failure to test disaster-recovery plans, or testing them on an infrequent basis, can greatly increase the risk of data loss in the event of a disaster. Since IT infrastructure evolves daily, thorough testing must be done on a consistent schedule that allows it to be adopted as yet another standard business practice.

Follow Chad Brooks on Twitter @cbrooks76 or BusinessNewsDaily @BNDarticles. We're also on Facebook & Google+. This story originally published on BusinessNewsDaily.

Chad Brooks

Chad Brooks is a Chicago-based freelance writer who has nearly 15 years experience in the media business. A graduate of Indiana University, he spent nearly a decade as a staff reporter for the Daily Herald in suburban Chicago, covering a wide array of topics including, local and state government, crime, the legal system and education. Following his years at the newspaper Chad worked in public relations, helping promote small businesses throughout the U.S. Follow him on Twitter.

See All