As one might expect, there are many reasons why an organization might lose important data. Broadly, they can be broken into the following categories:
- Security breaches
- Accidents or unintended user action
- System failure
Some data protection techniques can be applied to all these causes of data loss; others are better used for specific categories. Today lets look at security breaches.
When an intruder breaches the network, server, or storage defenses of a company, he usually has one of three goals: to look at information he shouldn’t look at, to deny the company the use of its data, or to damage and destroy data. Because the harm is intentional, an intruder can do more selective damage aimed at long-term harm.
Intruders come in two types: insiders and outsiders. The press tends to accentuate the problem of outsiders, yet insiders are as big a problem. Insiders can do more damage because they already have access to vital systems (and don’t have to work as hard to get at important data) and know what type of damage can do the most harm. Insiders also have the advantage of less scrutiny. Most IT departments have sophisticated methods of detecting outsiders trying to break in. Fewer companies monitor activity inside their network. For this reason, insiders can go undetected until they do damage, whereas outsiders are often stopped at the network perimeter.
Security concerns affect data protection strategies in two ways. First, it is important to keep backups or copies of data, in case a security breach results in damage or destruction of critical data. Second, part of the data protection strategy needs to be securing vital data and information assets against harm.I believe that your data is as important as any other corporate asset in your company and protecting it is necessary to ensure the value of the asset and prevent its loss.
The future undoubtedly belongs to organizations that truly understand the game-changing potential of business cloud computing.