Tag: data protection

author:

Security

Data Tampering: The Quiet Threat


For decades, data tampering has been limited to relatively simple attacks, like data corruption (which is immediately noticeable) or “cooking the books” to hide embezzlement or other financial failings. Of late, however, data tampering has been done with far more serious intent, such as redirecting shipments at …



author:

Database

Seven SQL Server Signs the Illuminati Exist


The signs that the Illuminati exist are all around us. You can find their marking on our buildings, on our currency, and even in our music videos. The Illuminati thrive by spreading fear, uncertainty, and doubt (FUD). They’ve been using FUD for centuries to …



author:

Database

No, You Don’t Need a Blockchain


The hype around blockchain technology is reaching a fever pitch these days. Visit any tech conference and you’ll find more than a handful of vendors offering it in one form or another. This includes Microsoft, IBM, and AWS. Each of those companies offers a …


author:

Database

Don’t Get Bitten by Schrödinger’s Backup


There are two sayings you can find in virtually every article about data protection: “If your data doesn’t exist in at least two places, then it doesn’t exist,” and “If you can’t restore your data, then it doesn’t exist.” This is for good reason. …


author:

Database

Do You Need an On-Prem Storage Vault?


Data protection has traditionally involved an on-prem storage vault, but as data protection solutions evolve, this requirement is becoming increasingly optional. On-prem storage vaults exist because if you do away with them, you eliminate cost and complexity while creating risk. Understanding how “cloud-first” data …


author:

Database Security

Data Protection: Culture, Tools, People, and Roles


In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture.  In this post, I’ll be going over the data protection tools, people, and roles I recommend to successful organizations. Tools Given the volume and …


author:

Database

The Hidden Costs of Backup Software


The focus of data protection has changed. Backups and data recovery used to exist primarily to protect against human error or natural disaster. The focus was on recovering from an accidental deletion or salvaging company data after a data center burned down. Today, data …


author:

Database

Culture of Data Protection: What Your Customers Expect


We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering.  Today, we’ll be considering the culture of protection the actual owners of the data (customers, employees, vendors, financial partners, etc.) expect from your …


1

2