Data Protection: Ensuring Data Availability – 2nd Edition
Over the last year or so, I’ve been working on a project that’s very dear to me: creating an updated and expanded release of Data Protection: Ensuring Data Availability. I’m proud to say, the eBook was...
View ArticleBackup Administrators Should Stick to Their Knitting
How often do you hear the term “stick to your knitting!” these days? It seems whenever a celebrity or sportsperson says something like “Maybe we should do something about climate change”, there’s a...
View ArticleData Protection in 2020: Reflections
Or, the world is burning but data protection goes on. Did someone get the license plate of the year that… The post Data Protection in 2020: Reflections first appeared on Data Protection Hub.
View ArticleThe 9 Essential Properties of Backup
Introduction What goes into making a backup? What are the traits that essential in order for it to be something… The post The 9 Essential Properties of Backup first appeared on Data Protection Hub.
View ArticleWhy Data Classification in Backup is Pointless
You know that saying, “Data is the new oil”? If you work in IT and haven’t heard of it, I’d… The post Why Data Classification in Backup is Pointless first appeared on Data Protection Hub.
View ArticleBasics: Backup Lifecycle
In the various backup/data protection groups I hang around on, I periodically see the “I’m new to backup, what do… The post Basics: Backup Lifecycle first appeared on Data Protection Hub.
View ArticleIntroductory Considerations to Cyber Resiliency
It’s fair to say that a significant number of my customer conversations this year have been centred around cyber resiliency.… The post Introductory Considerations to Cyber Resiliency first appeared on...
View ArticleHow do you solve Protective Dissonance?
There’s a term in psychology you may have heard of – cognitive dissonance. It refers to having contradictory beliefs, or… The post How do you solve Protective Dissonance? first appeared on Data...
View Article28 Days Later – Managing the Challenges Posed by Long-Term Retention Backups
Long-term retention backups, if not managed correctly, can represent a bit of a horror situation for businesses — they can… The post 28 Days Later – Managing the Challenges Posed by Long-Term Retention...
View ArticleWhen do I invoke Cyber Recovery?
Introduction Here’s a question I get asked quite frequently: “If we have a vault, how will the vault team know… The post When do I invoke Cyber Recovery? first appeared on Data Protection Hub.
View Article
More Pages to Explore .....