Problem solve Get help with specific problems with your technologies, process and projects.

Data protection: Cover the right risks

Five risks to consider for effective data protection are outlined and explained.

What you will learn: Five risks to consider for effective data protection are outlined and explained.

We've all seen ads from insurance companies promising protection from an assortment of oddball circumstances for "just pennies a day." You can't beat the insurance industry for knowing the real odds and pricing its products accordingly. On the other hand, you don't buy insurance because it's cheap; you buy it to protect yourself against a given set of risks. If the right risks aren't addressed, then price is irrelevant.

More data protection information

Data protection -- The next generation
Putting together an effective data protection plan 

Archives and data protection: The important differences

UK Justice Ministry says: Breaching breaching data protection policies is criminal 

Like other IT functions, data protection has become much more specialized. This is the direct result of an expanded awareness of the variety of risks, increased levels of user expectations and the growing range of technology options available to address specific problems. As a result, the way we approach risk and risk-related services also needs to evolve. We need to think about the likelihood and impact of various risks and the kinds of "coverage" we need.

Consider a subset of the various types of data loss and availability risks that require data protection:


  • Detectable file deletion or corruption. In this scenario, data is accidentally deleted or overwritten, and there's an almost immediate (let's say less than a day) realization that an error has occurred. There are lots of ways this can occur, and the data loss can be logical or physical.
  • Latent (lingering) data deletion or corruption. This risk is rarely quantified, so there often aren't any policies to address it. It's when data is deleted or, more likely, logically corrupted in some way, but the loss can lay undiscovered for days, weeks or months.
  • Storage device failure. This is a type of physical loss, usually of a significant quantity of data.
  • Interdependency failure. This can be thought of as "effective" data loss due to lack of synchronization or data inconsistency across multiple application components. It's the "weakest link" effect. If one level of service is provided to a portion of an interdependent environment and a different level to another part, the overall protection level is only as good as the lesser of the two levels of service.
  • Compound failure. Similar to interdependency failure, this is the risk of any combination of the above data loss scenarios happening concurrently.
  • Site failure. Loss of a site, such as a data center, is usually considered a disaster and falls under the realm of disaster recovery (DR). It's yet another class of scenario that needs to be differentiated from more localized operational situations.
  • Check out the complete Storage magazine article, Are backups a waste of time?

    James Damoulakis is CTO of GlassHouse Technologies, an independent storage services firm with offices across the United States and in the UK.

Dig Deeper on Data backup security

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.