-
Essay / Steps Businesses Should Take to Prevent...
IT system outages can be classified as unintentional threats, not to mention intentional threats, computer attacks, targeted attacks and botnets. This results from poor manufacturing, faulty materials, and outdated or poorly maintained networks. Unintentional malfunctions can also occur for other reasons, ranging from lack of experience to inadequate testing. There is a way to prevent this unintended threat from happening. The most common of all prevention measures is to create a backup, test your backup, keep your virus protection up to date, use a firewall, purchase and install a UPS power supply, use data encryption on your wireless network. Creating a backup is more than just a backup. . Depending on the size of your data, there may be many ways to back up your data. Your best security policy is to perform frequent backups. Most external drives available today come with inexpensive, easy-to-use backup software. Don't get caught without your backups. For a large company or businesses, they usually used centralized backup, which was expensive compared to the common type of backup. Some of the centralized backups include database module, encryption modules, disaster recovery option, and offsite storage. Database module. This software is added to the central backup system so that these databases can be backed up online. Most vendors offer database modules for Oracle, Sybase, Informix, Microsoft SQL, and Microsoft Exchange. These modules tend to work with the utilities included with the databases. For example, a central backup software module for Oracle will normally interface with the Oracle RMAN utility to capture an online backup. Encryption modules provide additional security for your backups. Both the client and the server have... middle of paper ...... all have a wireless network router, it is usually not configured to encrypt your data transmissions by default. A smart hacker can see everything you do. Configure your router to use WPA encryption and set the password so that it cannot be easily guessed. Works cited by Efraim Turban, Linda Volonino. (November 2011). Information technology management, 8th edition international student version. United States: Canisius College Michael J. Gallagher. (July 1, 2001). Centralized backup. Available at http://www.sans.org/reading-room/whitepapers/backup/centralized-backups-513 Retrieved December 20, 2013Garret System. (February 2, 2011). How to protect yourself against computer failures. Available at http://www.garrettsystems.com/index.php?option=com_content&view=article&id=51:how-to-protect-against-computer-failure&catid=31:general&Itemid=46 Retrieved December 19 2013