Quantcast
Channel: Backup theory | Data Protection Hub
Browsing latest articles
Browse All 67 View Live

Data Protection: Ensuring Data Availability – 2nd Edition

Over the last year or so, I’ve been working on a project that’s very dear to me: creating an updated and expanded release of Data Protection: Ensuring Data Availability. I’m proud to say, the eBook was...

View Article



Backup Administrators Should Stick to Their Knitting

How often do you hear the term “stick to your knitting!” these days? It seems whenever a celebrity or sportsperson says something like “Maybe we should do something about climate change”, there’s a...

View Article

Data Protection in 2020: Reflections

Or, the world is burning but data protection goes on. Did someone get the license plate of the year that… The post Data Protection in 2020: Reflections first appeared on Data Protection Hub.

View Article

The 9 Essential Properties of Backup

Introduction What goes into making a backup? What are the traits that essential in order for it to be something… The post The 9 Essential Properties of Backup first appeared on Data Protection Hub.

View Article

Why Data Classification in Backup is Pointless

You know that saying, “Data is the new oil”? If you work in IT and haven’t heard of it, I’d… The post Why Data Classification in Backup is Pointless first appeared on Data Protection Hub.

View Article


Basics: Backup Lifecycle

In the various backup/data protection groups I hang around on, I periodically see the “I’m new to backup, what do… The post Basics: Backup Lifecycle first appeared on Data Protection Hub.

View Article

Introductory Considerations to Cyber Resiliency

It’s fair to say that a significant number of my customer conversations this year have been centred around cyber resiliency.… The post Introductory Considerations to Cyber Resiliency first appeared on...

View Article

How do you solve Protective Dissonance?

There’s a term in psychology you may have heard of – cognitive dissonance. It refers to having contradictory beliefs, or… The post How do you solve Protective Dissonance? first appeared on Data...

View Article


28 Days Later – Managing the Challenges Posed by Long-Term Retention Backups

Long-term retention backups, if not managed correctly, can represent a bit of a horror situation for businesses — they can… The post 28 Days Later – Managing the Challenges Posed by Long-Term Retention...

View Article


When do I invoke Cyber Recovery?

Introduction Here’s a question I get asked quite frequently: “If we have a vault, how will the vault team know… The post When do I invoke Cyber Recovery? first appeared on Data Protection Hub.

View Article
Browsing latest articles
Browse All 67 View Live




Latest Images