Data backup involves copying and moving data from its primary location to a secondary location from which it can later be retrieved in case the primary data storage location experiences some kind of failure or disaster.
To learn more, read our Backup and Recovery Buyer's Guide (Updated: August 2023).
Additionally, the data backup process can be used to recover copies of older data that were deleted.
Data recovery is typically a software-based process that makes it possible for an organization to restore data that cannot be easily accessed by conventional methods because it has been deleted or corrupted. This process returns the recovered data to the device where it was originally stored or to a new device if the old device proves to be too damaged to hold it. The typical recovery method calls for an organization to restore a backed-up copy from another location.
Snapshots are still not backups but the nature of data storage means care must be taken to determine data retention requirements. In this episode of the On-Premise IT Podcast, Brian Knudtson, Matt Tyrer, and Richard Kenyan discuss the nature of data protection and recovery point objectives.
The rapid pace of cloud storage growth as well as the shift toward using microservices and serverless computing have added additional challenges to the definition of data that needs to be backed up. In addition, the terminology changes with major companies in the space have created confusion in features.
CISOs rely on information from across the organization about security, particularly from the various IT departments. Unfortunately, the information being fed to CISOs about the state of cybersecurity risk is incomplete.
There is a blind spot present - a gaping hole. Data about the security posture of their storage and backup systems is either woefully deficient or missing entirely.
That is one of the reasons why CISOs set strategy and approve the procurement of solutions to keep data and systems safe, yet the organization continues to suffer from breaches and attacks. Despite implementing vulnerability management, extended detection and response (XDR), threat monitoring, security information and event management (SIEM), and other technologies, they always seem to be one step behind the cybercriminal fraternity. That state of affairs is likely to remain until the inherent risk posed by vulnerable storage and backup systems is addressed.
See all Archived IT News - Backup articles
See all articles from this issue