The 5 layers of data protection – what businesses need to know

Digital data has become central to businesses from the largest multi-national organisations to the smallest family run start-ups – they all now store the majority of their data in bytes instead of boxes. 

Current estimates are that there is now up to five zettabytes (the equivalent of one trillion gigabytes) of information on the planet and it could be ten times that by the end of the decade.

Many people blissfully assume that the data they store electronically will be eternally safe. However, the real world is fraught with potential data disasters. 

The data loss scenarios painted in the media may focus on cyber attacks or natural disasters, but often it is the everyday occurrences such as accidental file deletion, an overnight waterpipe breakage or spilling a hot drink on a piece of hardware that can cause the biggest disruption to a business if data is not properly stored and backed up.

>See also: How to comply with the new EU Data Protection Regulation

Given the unprecedented growth and reliance on digital data, it is key for businesses to understand the complex issue of storage and the variety of solutions available to ensure core data and processes remain safe – regardless of what’s thrown at them.

So, how can businesses ensure they remain protected against traditional threats but also the more silent forms of data corruption? There are five layers of data protection that all businesses need to consider.

1. Protection against disk failure

Data should be written across multiple drives for RAID protection to protect against the inevitable risk of hardware disk failure.

2. Protection against bit rot

Data should be automatically protected against the phenomenon of bit rot, where data is actually corrupted at the very lowest level – the bits. This slow deterioration in the integrity of data stored on storage media can result in anything from pixel errors in JPEGs to a corrupted database.

3. Protection during normal business operations

Data should be continuously protected during normal business operations, allowing for easy restoration of data from virtually any point in time. Snapshot technology provides point-in-time recovery when a disaster strikes or files are deleted.

4. Protection against viruses and malware

Data must be secured adequately in real-time against viruses and malware through up-to-date security solutions – not only at the firewall but also on the storage device itself in case someone brings malware stored on a USB drive straight into the office.

5. Disaster recovery

A second copy of data – and operating system images etc. – should always be stored at a secure offsite location for disaster recovery. In today’s world, this is most elegantly and cost-effectively achieved with a sophisticated and automated replication solution, but could also be via a USB drive, traditional tape or backup in the cloud.

>See also: Data protection is not just a concern for internet natives: all businesses need education

In today’s ever-connected environment, data is growing exponentially – but its importance is arguably growing even faster. Whether it’s architectural drawings, customer databases office files and documents or family photos, protecting information is critical.

Playing Russian roulette with data, which is often the intellectual property and customer data core of a modern business, is dangerous – not to mention could contravene data protection laws in many industries.

The more layers of protection a business employs, the less of a risk they face – whether it be the potential loss of revenue, regulatory fines or disaster recovery outages.

Yet, historically, most SMB storage solutions typically address only two or three of the layers outlined above. This, coupled with the fact that many businesses don’t have the time or resources to dedicate to complicated backup and recovery processes, leaves them exposed to potentially catastrophic outcomes.

Many businesses are still either not aware of the five layers of data protection or presume they are only available within expensive and complex enterprise solutions. However, a lot has happened in storage technology and there are now affordable solutions available that fit the bill by adhering to this.

 

Sourced Peter Hannah, Netgear

Avatar photo

Ben Rossi

Ben was Vitesse Media's editorial director, leading content creation and editorial strategy across all Vitesse products, including its market-leading B2B and consumer magazines, websites, research and...

Related Topics

Data
Data Breach
Malware