Powered By Blogger

Data Loss Prevention & Protection Strategies

 

Data Loss Prevention & Protection Strategies



Data loss & Data Loss Prevention are generally characterized by one or more of the following reasons:

  • The inability to access data from a backup or previously running computer system
  • Accidental deletion of files or overwriting of data control structures
  • Files damaged or inaccessible due to damage or abnormal device operation

Among other causes, data loss can be attributed to human or system error, harsh environmental conditions, and device failure:

  • Human causes of data loss include intentional or accidental deletion or overwriting of files.
  • Damage from viruses, bugs in the operating system or application software, or failure to update can also cause data loss.
  • Common physical causes of data loss include power failures or short circuits, overheating, electrostatic discharge, and any type of physical damage to the storage device or media.

General tips for preventing data loss

Software and Hardware

  • Document the original systems and keep copies of your software in a safe place.
  • Back up your files frequently; then test and verify that the backup is a complete copy of the original. External drives are an excellent choice for this task.
  • Never update software or hardware without a full, verified backup available in case you need to restore data.
  • If you are using Microsoft Windows, set system restore points before making any significant changes to your system.
  • Write an emergency plan and restore your data in case of problems. Your emergency plan should include, at a minimum:
    • The location of all available backups, including backup types and dates.
    • The listing and location of all original software packages, detailing updates since the original installation.
    • The location and preparation of an alternative team.
  • Implement firewalls and virus protection.
  • Delete files and apps that you don't use.

Environment

  • Make sure that the environmental conditions are suitable (stable temperature, humidity and cleanliness) and that you carry out correct handling to avoid static discharges and accidental falls.
  • Physically protect systems from intruders.
  • Prepare for physical disasters, including using external storage for backups.

Data recovery

Because notebook computers are often exposed to different environmental factors such as heat, water, and dust, they are more prone to data loss than office desktops. Their portability makes these sophisticated and essential devices prime candidates for data loss.

Mechanical and electrical failures, software damage, and human error all play a role in data loss. Here are some of the more obvious signs of data loss and data accessibility issues:

  • Laptop that falls down and won't turn on again
  • Inaccessible drives and partitions
  • Applications that cannot run or load data
  • Corrupted data
  • Virus attacks
  • Hard drive component failure
  • Hard drive bumps
  • Fire or liquid damage
  • Damage or contamination of the media surface
  • Accidental reformatting of partitions
  • Accidental deletion of data
  • In database systems:
    • Backup files not recognizable by the database engine
    • Database locked due to a 'problem' preventing access
    • Tables deleted or deleted
    • Accidentally deleted records
    • Damaged database files and devices
    • Damaged individual data pages
    • Accidentally Overwritten Database Files and Devices

Backup and restore

A backup, backup copy or backup (its name in English) in information technology and computing is a copy of the original data that is made in order to have a means to recover it in case of loss. Backups are useful for different events and uses: recovering computer systems and data from a computer disaster, natural or attack; restore a small number of files that may have been accidentally deleted, corrupted, infected by a computer virus or other causes; save historical information more economically than hard drives and also allowing the transfer to locations other than the original data; etc.

The backup process is complemented by another known as data restoration (in English restore), which is the action of reading and writing the required data to the original location or another alternative.

Data loss is very common, and hence Data Loss Prevention is much needed strategy where 66% of Internet users have suffered a serious data loss at some point.

Since backup systems contain at least one copy of all data worth saving, storage requirements must be considered. Organizing storage space and managing the backup process are complicated tasks. To provide a storage structure it is convenient to use a data storage model. There are many different types of data storage devices that are useful for backing up, each with its own advantages and disadvantages to consider when choosing them, such as duplication, data security, and portability.

Backup software

There is software on the market to make backup copies. It is important to define the specific requirements in advance to determine the appropriate software. There is infinity of programs adapted to each need.

For the adaptation to the LOPD of files with high-level personal data (health, sexual life, religion, etc.), the regulation requires that the backup copies of said data be stored encrypted and in a location other than the place of origin .

The backup is the best method of protecting important data, but there is always the possibility that the data copy has not worked correctly and in case of need to restore the data we cannot do it since the information of the copy Security can be corrupted for various reasons:

  • The media on which the copy was made is damaged.
  • The copy automatisms have not been executed correctly.
  • Many other reasons that can cause our backups to be incorrect, and therefore useless.

To avoid this problem it is very important that we make sure that we make the copies correctly and that we verify that we are able to restore the backup copy to its original location, thus verifying that the copy is correct and that we are able to restore it and that we know the method of restoration, since in case of critical need the nerves surface and we can ruin our copy work by taking a wrong step when restoring the data.

In the hypothetical case that we cannot restore our information, there is a last alternative, since there are data recovery applications on the market that can help us in the event that we cannot restore our backup copy. There are also data recovery methods via the web.

Finally, and in extreme cases such as damaged drives, we would only have to resort to a laboratory specialized in data recovery.

 

No comments:

Post a Comment

Necessity of a Secure Data Wipe

  Necessity of a Secure Data Wipe According to projections from  The Radicati Group , in 2021 we will be sending 320,000 million emails pe...