Computers are now a disposable commodity. The main goal most users and organizations should have regarding computer security is not to protect the actual computer, but to protect the data. A computer can be replaced in hours, sometimes minutes. The data that you or your users have created may take years to recreate. Some data, such as digital photographs maybe irreplaceable. So it is very important to learn that how to keep Data safe and secure.
Of course in certain scenarios computer systems themselves and not just the data are what need to be protected. For example, computers that control critical infrastructure such as power grids, medical systems and financial applications must be giving the highest protections possible.
Data loss can come in many flavors, not just malware infections. Critical data stored on a single hard drive is an imminent disaster waiting to happen. The hard disk drive found in most computers is typically a component with a high probability of failure. More recent drive technologies such as solid state disks have reduced the failure rate, but are not completely immune.
Back Up Your Data!
Do you want to tell your family members that you lost photos from a 1st birthday party? Do you want to tell your boss that files stored on your network were destroyed and are unrecoverable? In order to avoid these situations, it is always a good idea to keep a backup copy of your important documents, files, videos, photos and every other type of data that you can’t afford to lose.
Things to Remember…
The average home user or small business can use an external drive or an online service for backup. If using an external drive, I suggest encrypting the drive and keeping it at another location such as your home, office, or family member’s house. I’ve had great experience with Apricorn hardware encrypted drives. These drives require no additional software and work with all modern operating systems.
If you want a hands-off approach to backups, use an online service such as Crash Plan. There are others that do the same. Just be careful of who you trust. Depending on what is being backed up, you should care about where the data is stored, who has access, and what (if any) encryption methods are used.