SlideShare a Scribd company logo
Data Security, a Growing Concern among SMEs
“Be paranoid about data. You can buy new boxes, rebuild the systems, reinstall software etc., but
you cannot rebuild lost data” – Steve Burrows, IT director of Vanilla Group state in a column for
Computer Weekly.

Any small to medium enterprise that is not willing to invest in data backup is at risk of losing
their data. Losing important information can be catastrophic for your business. Remember that
data is the second important asset after the employees and it is the lifeline of any organization.

It is a myth that SMEs do not generate the same amount of data as large companies; hence there
is no need for data security. Keep in mind that whether your enterprise is small, medium or big,
it needs the same kind of data security to ensure that all the important business data are
recovered in time. A survey conducted by London Chamber of Commerce reports that the 90
percent of the enterprises that are careless about their data are out of business within couple of
years.

China launched its very first cloud-based distributed data center, Zhengzhou Hi-tech Zone, on
April 27, 2010. Currently, they have around 3,000 companies and more than 90 percent of which
are SMEs. The data bank at the Hi-tech Zone provides online data storage and recovery
management not only for small businesses, but also for individual players. In China, the
emerging cloud computing technology is playing a key role in small to medium enterprises and
also among the individual users.

Free Document Sharing made easy through Apptivo.

Are SMBs liberal enough in spending on IT solutions to secure their data?

One of the mistakes made by most of the SMEs is that they think their data is safe and things
cannot go bad. They are simply not willing to look beyond the horizon. Many of the firms still




© 2011 Apptivo Inc. All rights reserved.
use the archaic methods of data backup and they assume that the data is safe in case of data
disaster. However, the truth is that your data is not 100 percent secure unless it encrypted.

Many SMEs do not invest in data backup because they feel it is an unnecessary expenditure that
they cannot afford. In a recent survey, conducted by a disaster recovery company Acronis,
revealed that one-third of SMEs do not have offsite backup and disaster recovery strategy. The
survey also reported that 71 percent of the enterprises which have virtual servers do not take
pains to backup the data as often as their physical servers. However, David Blackman, the GM at
Acronis is optimistic that small to medium enterprises will work on their data disaster
management as cloud computing becomes prominent in that sector.

Glendon Lee, Head of Campaigns at the Business Continuity Institute reminds the SMEs that
they should stick to their data recovery plans while migrating to the cloud data backup. SMEs
should ask their cloud vendor how secure is their data, where their data would be stored and what
would happen to their data in case the vendor closes down his service. He also mentioned that
“It’s important that small businesses ask them what their business continuity arrangements are,
and where their business would be in its queue of priorities.”

Is Data De-duplication a Remedy for Protecting Business Data?

Deduplication is a technique of identifying redundant data in a data repository and substituting
the reference pointers for these data for storage capacity optimization. For instance, if a 5MB
PowerPoint presentation is copied to 100 users it will take 500MB of storage space on an
Exchange server. Imagine what would be the situation if every week 500MB of data is backed up
and this continues for a year. Don’t you think it is a waste of storage space? Deduplication
storage systems are used for data backup and disaster recovery. Here we look at how data
deduplication benefits the SMEs.

        Reduction in backup storage capacity requirements – Introducing data deduplication
        will drastically reduce the cumulative backend storage by 98 percent.




© 2011 Apptivo Inc. All rights reserved.
Increase in Data Integrity – data deduplication reduces the overall cost of data
        protection. The retrieval of the data also becomes easier and faster.

        Reduced Bandwidth Usage – Data deduplication will reduce the bandwidth required to
        send data over networks by approximately 90 percent.

Many SMEs were reluctant to use data deduplication because they felt it cannot be included in
their data protection strategy due to cost factor. However, of late, cost of proprietary hardware
deduplication products are priced keeping mind the SMES/SMBs. Today there are many
software only deduplication that allow the work station data to be deduplicated, thus making it
attractive to organization of all sizes.

One of the biggest assets of any business is its information and no business would want to fail
due to data breach. Therefore, it would be wise to invest in data backup and restoration
strategies.

Maya Pillai is passionate about helping small businesses and professionals. She is a blogger for
Apptivo's Small Business University




© 2011 Apptivo Inc. All rights reserved.

More Related Content

What's hot

Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
Denodo
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
Mudit Mangal
 
BRIDGING DATA SILOS USING BIG DATA INTEGRATION
BRIDGING DATA SILOS USING BIG DATA INTEGRATIONBRIDGING DATA SILOS USING BIG DATA INTEGRATION
BRIDGING DATA SILOS USING BIG DATA INTEGRATION
ijmnct
 
The data ecosystem
The data ecosystemThe data ecosystem
The data ecosystem
WGroup
 
Data Disruption for Insurance - Perspective from th
Data Disruption for Insurance - Perspective from thData Disruption for Insurance - Perspective from th
Data Disruption for Insurance - Perspective from thDataiku
 
How to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics WebinarHow to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics Webinar
Datameer
 
Analytical thinking 16 - October 2012
Analytical thinking 16 - October 2012Analytical thinking 16 - October 2012
Analytical thinking 16 - October 2012
Charlotte Skornik
 
The Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre ConsolidationThe Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre Consolidation
DAYWATCHER.COM
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework Perspective
Rob Gerbrandt CD, PMP
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
IT Support Engineer
 
Managed Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | SymmetryManaged Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | Symmetry
Symmetry™
 
Practical analytics john enoch white paper
Practical analytics john enoch white paperPractical analytics john enoch white paper
Practical analytics john enoch white paperJohn Enoch
 
Objective Benchmarking for Improved Analytics Health and Effectiveness
Objective Benchmarking for Improved Analytics Health and EffectivenessObjective Benchmarking for Improved Analytics Health and Effectiveness
Objective Benchmarking for Improved Analytics Health and Effectiveness
PersonifyMarketing
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leoguiabusinessmedia
 
6 Reasons to Use Data Analytics
6 Reasons to Use Data Analytics6 Reasons to Use Data Analytics
6 Reasons to Use Data Analytics
Ray Business Technologies
 
Analytics Service Framework
Analytics Service Framework Analytics Service Framework
Analytics Service Framework
Vishwanath Ramdas
 
Infrastructure Matters
Infrastructure MattersInfrastructure Matters
Infrastructure Matters
IBM Innovation Center Silicon Valley
 
Analytics 3.0: Opportunities for Healthcare
Analytics 3.0: Opportunities for HealthcareAnalytics 3.0: Opportunities for Healthcare
Analytics 3.0: Opportunities for Healthcare
International Institute for Analytics
 

What's hot (20)

Data Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data StrategyData Virtualization Accelerating Your Data Strategy
Data Virtualization Accelerating Your Data Strategy
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Analytics3.0 e book
Analytics3.0 e bookAnalytics3.0 e book
Analytics3.0 e book
 
BRIDGING DATA SILOS USING BIG DATA INTEGRATION
BRIDGING DATA SILOS USING BIG DATA INTEGRATIONBRIDGING DATA SILOS USING BIG DATA INTEGRATION
BRIDGING DATA SILOS USING BIG DATA INTEGRATION
 
The data ecosystem
The data ecosystemThe data ecosystem
The data ecosystem
 
Data Disruption for Insurance - Perspective from th
Data Disruption for Insurance - Perspective from thData Disruption for Insurance - Perspective from th
Data Disruption for Insurance - Perspective from th
 
How to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics WebinarHow to Avoid Pitfalls in Big Data Analytics Webinar
How to Avoid Pitfalls in Big Data Analytics Webinar
 
Analytical thinking 16 - October 2012
Analytical thinking 16 - October 2012Analytical thinking 16 - October 2012
Analytical thinking 16 - October 2012
 
The Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre ConsolidationThe Advantages and Pitfalls of Data Centre Consolidation
The Advantages and Pitfalls of Data Centre Consolidation
 
Big data
Big dataBig data
Big data
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework Perspective
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
Managed Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | SymmetryManaged Hosting Buyer’s Checklist | Symmetry
Managed Hosting Buyer’s Checklist | Symmetry
 
Practical analytics john enoch white paper
Practical analytics john enoch white paperPractical analytics john enoch white paper
Practical analytics john enoch white paper
 
Objective Benchmarking for Improved Analytics Health and Effectiveness
Objective Benchmarking for Improved Analytics Health and EffectivenessObjective Benchmarking for Improved Analytics Health and Effectiveness
Objective Benchmarking for Improved Analytics Health and Effectiveness
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo
 
6 Reasons to Use Data Analytics
6 Reasons to Use Data Analytics6 Reasons to Use Data Analytics
6 Reasons to Use Data Analytics
 
Analytics Service Framework
Analytics Service Framework Analytics Service Framework
Analytics Service Framework
 
Infrastructure Matters
Infrastructure MattersInfrastructure Matters
Infrastructure Matters
 
Analytics 3.0: Opportunities for Healthcare
Analytics 3.0: Opportunities for HealthcareAnalytics 3.0: Opportunities for Healthcare
Analytics 3.0: Opportunities for Healthcare
 

Viewers also liked

해외카지노 사이트 『OX600』。『COM』바카라룰 사이트
해외카지노 사이트 『OX600』。『COM』바카라룰 사이트해외카지노 사이트 『OX600』。『COM』바카라룰 사이트
해외카지노 사이트 『OX600』。『COM』바카라룰 사이트
ghsiduh
 
Interacció administrativa entre la Generalitat i l’Administració local en els...
Interacció administrativa entre la Generalitat i l’Administració local en els...Interacció administrativa entre la Generalitat i l’Administració local en els...
Interacció administrativa entre la Generalitat i l’Administració local en els...
Medi Ambient. Generalitat de Catalunya
 
Analisys of Selection Sort and Bubble Sort
Analisys of Selection Sort and Bubble SortAnalisys of Selection Sort and Bubble Sort
Analisys of Selection Sort and Bubble Sort
Humano Terricola
 
Kosa
KosaKosa
Kosa
hudakana
 
Costumes and props
Costumes and propsCostumes and props
Costumes and props
joshmacqueen2
 
태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트
태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트
태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트
ghsiduh
 
Odprta koda v informacijski družbi
Odprta koda v informacijski družbiOdprta koda v informacijski družbi
Odprta koda v informacijski družbi
Nino Vranešič
 
라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트
라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트
라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트
gjsokdfjl
 
curriculum vitae of sinem bayraktar.
curriculum vitae of sinem bayraktar.curriculum vitae of sinem bayraktar.
curriculum vitae of sinem bayraktar.Sinem Bayraktar
 
모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트
모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트
모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트
gjsokdfjl
 
레드9카지노 ''SX797.COM'' 로또전략
레드9카지노 ''SX797.COM'' 로또전략레드9카지노 ''SX797.COM'' 로또전략
레드9카지노 ''SX797.COM'' 로또전략
gjsokdfjl
 
Delincuencia en Venezuela
Delincuencia en VenezuelaDelincuencia en Venezuela
Delincuencia en Venezuela
Fátima De Sá
 
Ecosistemas
EcosistemasEcosistemas
Ecosistemas
sebastianq531
 
Unit ix graph
Unit   ix    graph Unit   ix    graph
Unit ix graph
Tribhuvan University
 
Digital Signage in Corporate Communications webinar featuring Rolls-Royce
Digital Signage in Corporate Communications webinar featuring Rolls-RoyceDigital Signage in Corporate Communications webinar featuring Rolls-Royce
Digital Signage in Corporate Communications webinar featuring Rolls-Royce
Chuck Gose
 
Deontological Ethics Christine Wandolo
Deontological Ethics   Christine WandoloDeontological Ethics   Christine Wandolo
Deontological Ethics Christine Wandolo
Christine Wandolo
 
Ga ma32 cc4-specification- www.ttbvs.com
Ga ma32 cc4-specification- www.ttbvs.comGa ma32 cc4-specification- www.ttbvs.com
Ga ma32 cc4-specification- www.ttbvs.com
TTBVS
 
Natural Sugar Solutions For Diabetics – Estevia Supplements
Natural Sugar Solutions For Diabetics – Estevia SupplementsNatural Sugar Solutions For Diabetics – Estevia Supplements
Natural Sugar Solutions For Diabetics – Estevia Supplements
EsteviaSupplements
 
Benefits of Digital Signage for Internal Communications
Benefits of Digital Signage for Internal CommunicationsBenefits of Digital Signage for Internal Communications
Benefits of Digital Signage for Internal Communications
Colin Bovet
 

Viewers also liked (19)

해외카지노 사이트 『OX600』。『COM』바카라룰 사이트
해외카지노 사이트 『OX600』。『COM』바카라룰 사이트해외카지노 사이트 『OX600』。『COM』바카라룰 사이트
해외카지노 사이트 『OX600』。『COM』바카라룰 사이트
 
Interacció administrativa entre la Generalitat i l’Administració local en els...
Interacció administrativa entre la Generalitat i l’Administració local en els...Interacció administrativa entre la Generalitat i l’Administració local en els...
Interacció administrativa entre la Generalitat i l’Administració local en els...
 
Analisys of Selection Sort and Bubble Sort
Analisys of Selection Sort and Bubble SortAnalisys of Selection Sort and Bubble Sort
Analisys of Selection Sort and Bubble Sort
 
Kosa
KosaKosa
Kosa
 
Costumes and props
Costumes and propsCostumes and props
Costumes and props
 
태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트
태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트
태산카지노 사이트 『OX600』。『COM』바둑이카페 사이트
 
Odprta koda v informacijski družbi
Odprta koda v informacijski družbiOdprta koda v informacijski družbi
Odprta koda v informacijski družbi
 
라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트
라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트
라스베가스카지노 싸이트 『OX600』。『COM』슬롯하는곳 사이트
 
curriculum vitae of sinem bayraktar.
curriculum vitae of sinem bayraktar.curriculum vitae of sinem bayraktar.
curriculum vitae of sinem bayraktar.
 
모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트
모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트
모바일바카라\\【OPT。ASIA】\\라이브카지노 사이트
 
레드9카지노 ''SX797.COM'' 로또전략
레드9카지노 ''SX797.COM'' 로또전략레드9카지노 ''SX797.COM'' 로또전략
레드9카지노 ''SX797.COM'' 로또전략
 
Delincuencia en Venezuela
Delincuencia en VenezuelaDelincuencia en Venezuela
Delincuencia en Venezuela
 
Ecosistemas
EcosistemasEcosistemas
Ecosistemas
 
Unit ix graph
Unit   ix    graph Unit   ix    graph
Unit ix graph
 
Digital Signage in Corporate Communications webinar featuring Rolls-Royce
Digital Signage in Corporate Communications webinar featuring Rolls-RoyceDigital Signage in Corporate Communications webinar featuring Rolls-Royce
Digital Signage in Corporate Communications webinar featuring Rolls-Royce
 
Deontological Ethics Christine Wandolo
Deontological Ethics   Christine WandoloDeontological Ethics   Christine Wandolo
Deontological Ethics Christine Wandolo
 
Ga ma32 cc4-specification- www.ttbvs.com
Ga ma32 cc4-specification- www.ttbvs.comGa ma32 cc4-specification- www.ttbvs.com
Ga ma32 cc4-specification- www.ttbvs.com
 
Natural Sugar Solutions For Diabetics – Estevia Supplements
Natural Sugar Solutions For Diabetics – Estevia SupplementsNatural Sugar Solutions For Diabetics – Estevia Supplements
Natural Sugar Solutions For Diabetics – Estevia Supplements
 
Benefits of Digital Signage for Internal Communications
Benefits of Digital Signage for Internal CommunicationsBenefits of Digital Signage for Internal Communications
Benefits of Digital Signage for Internal Communications
 

Similar to Data security, a growing concern among sme

Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
GFI Software
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
CloudMask inc.
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
Brooke Bordelon
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
BillyHosking
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosion
Vodafone Business
 
Data Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeData Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | Sysfore
Sysfore Technologies
 
The Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfThe Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdf
aNumak & Company
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
Fuji Xerox Asia Pacific
 
Should business move to the cloud
Should business move to the cloudShould business move to the cloud
Should business move to the cloud
szarinammd
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
at MicroFocus Italy ❖✔
 
E guide weathering the storm at your business
E guide weathering the storm at your businessE guide weathering the storm at your business
E guide weathering the storm at your business
Soma Technology Group
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s s
matele41
 
The 05 Best Backup Solution Providers to Watch in 2022.pdf
The 05 Best Backup Solution Providers to Watch in 2022.pdfThe 05 Best Backup Solution Providers to Watch in 2022.pdf
The 05 Best Backup Solution Providers to Watch in 2022.pdf
InsightsSuccess4
 
Management information system Case 5.1 5.2 6,1 6.2
Management information system Case 5.1 5.2 6,1 6.2Management information system Case 5.1 5.2 6,1 6.2
Management information system Case 5.1 5.2 6,1 6.2
Mominul Haque bhuiyan
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
curwenmichaela
 
Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and Directors
Lucy Denver
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
Cover Story_IT Var News
Cover Story_IT Var NewsCover Story_IT Var News
Cover Story_IT Var NewsGarima Rai
 
Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...
Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...
Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...
Vasu S
 

Similar to Data security, a growing concern among sme (20)

Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
The cost of downtime
The cost of downtimeThe cost of downtime
The cost of downtime
 
Taking control of the big data explosion
Taking control of the big data explosionTaking control of the big data explosion
Taking control of the big data explosion
 
Data Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | SysforeData Minimization in the age of Big Data | Sysfore
Data Minimization in the age of Big Data | Sysfore
 
The Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdfThe Challenges Of Multi-cloud Management.pdf
The Challenges Of Multi-cloud Management.pdf
 
The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?The Insider Threats - Are You at Risk?
The Insider Threats - Are You at Risk?
 
Should business move to the cloud
Should business move to the cloudShould business move to the cloud
Should business move to the cloud
 
Business Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your BusinessBusiness Risk: Effective Technology Protecting Your Business
Business Risk: Effective Technology Protecting Your Business
 
E guide weathering the storm at your business
E guide weathering the storm at your businessE guide weathering the storm at your business
E guide weathering the storm at your business
 
P r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s sP r o t e c t i n g y o u r b u s i n e s s
P r o t e c t i n g y o u r b u s i n e s s
 
The 05 Best Backup Solution Providers to Watch in 2022.pdf
The 05 Best Backup Solution Providers to Watch in 2022.pdfThe 05 Best Backup Solution Providers to Watch in 2022.pdf
The 05 Best Backup Solution Providers to Watch in 2022.pdf
 
Management information system Case 5.1 5.2 6,1 6.2
Management information system Case 5.1 5.2 6,1 6.2Management information system Case 5.1 5.2 6,1 6.2
Management information system Case 5.1 5.2 6,1 6.2
 
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docxNFRASTRUCTURE MODERNIZATION REVIEW                      Analyz.docx
NFRASTRUCTURE MODERNIZATION REVIEW Analyz.docx
 
Backup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and DirectorsBackup and Disaster Recovery for Business Owners and Directors
Backup and Disaster Recovery for Business Owners and Directors
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Story_On_Data_Back_Up
Story_On_Data_Back_UpStory_On_Data_Back_Up
Story_On_Data_Back_Up
 
Cover Story_IT Var News
Cover Story_IT Var NewsCover Story_IT Var News
Cover Story_IT Var News
 
Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...
Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...
Activating Big Data: The Key To Success with Machine Learning Advanced Analyt...
 

More from Puneet Yamparala

Tax extension just in case
Tax extension just in caseTax extension just in case
Tax extension just in case
Puneet Yamparala
 
Upcoming small business events
Upcoming small business eventsUpcoming small business events
Upcoming small business eventsPuneet Yamparala
 
How mobile apps help boost your business
How mobile apps help boost your businessHow mobile apps help boost your business
How mobile apps help boost your businessPuneet Yamparala
 
5 ways to grow sales through renewed channels
5 ways to grow sales through renewed channels5 ways to grow sales through renewed channels
5 ways to grow sales through renewed channelsPuneet Yamparala
 
Creating a simplified business plan
Creating a simplified business planCreating a simplified business plan
Creating a simplified business planPuneet Yamparala
 
5 tips for selling a business
5 tips for selling a business5 tips for selling a business
5 tips for selling a businessPuneet Yamparala
 
Staying one step ahead of the competition
Staying one step ahead of the competitionStaying one step ahead of the competition
Staying one step ahead of the competitionPuneet Yamparala
 
How to determine the geographic market area of your business
How to determine the geographic market area of your businessHow to determine the geographic market area of your business
How to determine the geographic market area of your businessPuneet Yamparala
 
5 things to consider to ensure you are choosing legitimate suppliers
5 things to consider to ensure you are choosing legitimate suppliers5 things to consider to ensure you are choosing legitimate suppliers
5 things to consider to ensure you are choosing legitimate suppliersPuneet Yamparala
 
10 ways to motivate your employees
10 ways to motivate your employees10 ways to motivate your employees
10 ways to motivate your employeesPuneet Yamparala
 
Creating a simplified business plan
Creating a simplified business planCreating a simplified business plan
Creating a simplified business planPuneet Yamparala
 
Apptivo Project Apps Milestone
Apptivo Project Apps MilestoneApptivo Project Apps Milestone
Apptivo Project Apps Milestone
Puneet Yamparala
 
Apptivo project app
Apptivo project appApptivo project app
Apptivo project app
Puneet Yamparala
 
5 innovative businesses launched by veterans
5 innovative businesses launched by veterans5 innovative businesses launched by veterans
5 innovative businesses launched by veteransPuneet Yamparala
 
Why small businesses, consultants and freelancer need project management
Why small businesses, consultants and freelancer need project managementWhy small businesses, consultants and freelancer need project management
Why small businesses, consultants and freelancer need project managementPuneet Yamparala
 
12 questions to ask before requesting a guest blogger
12 questions to ask before requesting a guest blogger12 questions to ask before requesting a guest blogger
12 questions to ask before requesting a guest bloggerPuneet Yamparala
 
Cloud computing and its risks
Cloud computing and its risksCloud computing and its risks
Cloud computing and its risksPuneet Yamparala
 
When entering a new market knowledge is power
When entering a new market knowledge is powerWhen entering a new market knowledge is power
When entering a new market knowledge is powerPuneet Yamparala
 

More from Puneet Yamparala (20)

Tax extension just in case
Tax extension just in caseTax extension just in case
Tax extension just in case
 
Upcoming small business events
Upcoming small business eventsUpcoming small business events
Upcoming small business events
 
How mobile apps help boost your business
How mobile apps help boost your businessHow mobile apps help boost your business
How mobile apps help boost your business
 
5 ways to grow sales through renewed channels
5 ways to grow sales through renewed channels5 ways to grow sales through renewed channels
5 ways to grow sales through renewed channels
 
Creating a simplified business plan
Creating a simplified business planCreating a simplified business plan
Creating a simplified business plan
 
5 tips for selling a business
5 tips for selling a business5 tips for selling a business
5 tips for selling a business
 
Staying one step ahead of the competition
Staying one step ahead of the competitionStaying one step ahead of the competition
Staying one step ahead of the competition
 
Small business profile
Small business profileSmall business profile
Small business profile
 
How to determine the geographic market area of your business
How to determine the geographic market area of your businessHow to determine the geographic market area of your business
How to determine the geographic market area of your business
 
Google
GoogleGoogle
Google
 
5 things to consider to ensure you are choosing legitimate suppliers
5 things to consider to ensure you are choosing legitimate suppliers5 things to consider to ensure you are choosing legitimate suppliers
5 things to consider to ensure you are choosing legitimate suppliers
 
10 ways to motivate your employees
10 ways to motivate your employees10 ways to motivate your employees
10 ways to motivate your employees
 
Creating a simplified business plan
Creating a simplified business planCreating a simplified business plan
Creating a simplified business plan
 
Apptivo Project Apps Milestone
Apptivo Project Apps MilestoneApptivo Project Apps Milestone
Apptivo Project Apps Milestone
 
Apptivo project app
Apptivo project appApptivo project app
Apptivo project app
 
5 innovative businesses launched by veterans
5 innovative businesses launched by veterans5 innovative businesses launched by veterans
5 innovative businesses launched by veterans
 
Why small businesses, consultants and freelancer need project management
Why small businesses, consultants and freelancer need project managementWhy small businesses, consultants and freelancer need project management
Why small businesses, consultants and freelancer need project management
 
12 questions to ask before requesting a guest blogger
12 questions to ask before requesting a guest blogger12 questions to ask before requesting a guest blogger
12 questions to ask before requesting a guest blogger
 
Cloud computing and its risks
Cloud computing and its risksCloud computing and its risks
Cloud computing and its risks
 
When entering a new market knowledge is power
When entering a new market knowledge is powerWhen entering a new market knowledge is power
When entering a new market knowledge is power
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Data security, a growing concern among sme

  • 1. Data Security, a Growing Concern among SMEs “Be paranoid about data. You can buy new boxes, rebuild the systems, reinstall software etc., but you cannot rebuild lost data” – Steve Burrows, IT director of Vanilla Group state in a column for Computer Weekly. Any small to medium enterprise that is not willing to invest in data backup is at risk of losing their data. Losing important information can be catastrophic for your business. Remember that data is the second important asset after the employees and it is the lifeline of any organization. It is a myth that SMEs do not generate the same amount of data as large companies; hence there is no need for data security. Keep in mind that whether your enterprise is small, medium or big, it needs the same kind of data security to ensure that all the important business data are recovered in time. A survey conducted by London Chamber of Commerce reports that the 90 percent of the enterprises that are careless about their data are out of business within couple of years. China launched its very first cloud-based distributed data center, Zhengzhou Hi-tech Zone, on April 27, 2010. Currently, they have around 3,000 companies and more than 90 percent of which are SMEs. The data bank at the Hi-tech Zone provides online data storage and recovery management not only for small businesses, but also for individual players. In China, the emerging cloud computing technology is playing a key role in small to medium enterprises and also among the individual users. Free Document Sharing made easy through Apptivo. Are SMBs liberal enough in spending on IT solutions to secure their data? One of the mistakes made by most of the SMEs is that they think their data is safe and things cannot go bad. They are simply not willing to look beyond the horizon. Many of the firms still © 2011 Apptivo Inc. All rights reserved.
  • 2. use the archaic methods of data backup and they assume that the data is safe in case of data disaster. However, the truth is that your data is not 100 percent secure unless it encrypted. Many SMEs do not invest in data backup because they feel it is an unnecessary expenditure that they cannot afford. In a recent survey, conducted by a disaster recovery company Acronis, revealed that one-third of SMEs do not have offsite backup and disaster recovery strategy. The survey also reported that 71 percent of the enterprises which have virtual servers do not take pains to backup the data as often as their physical servers. However, David Blackman, the GM at Acronis is optimistic that small to medium enterprises will work on their data disaster management as cloud computing becomes prominent in that sector. Glendon Lee, Head of Campaigns at the Business Continuity Institute reminds the SMEs that they should stick to their data recovery plans while migrating to the cloud data backup. SMEs should ask their cloud vendor how secure is their data, where their data would be stored and what would happen to their data in case the vendor closes down his service. He also mentioned that “It’s important that small businesses ask them what their business continuity arrangements are, and where their business would be in its queue of priorities.” Is Data De-duplication a Remedy for Protecting Business Data? Deduplication is a technique of identifying redundant data in a data repository and substituting the reference pointers for these data for storage capacity optimization. For instance, if a 5MB PowerPoint presentation is copied to 100 users it will take 500MB of storage space on an Exchange server. Imagine what would be the situation if every week 500MB of data is backed up and this continues for a year. Don’t you think it is a waste of storage space? Deduplication storage systems are used for data backup and disaster recovery. Here we look at how data deduplication benefits the SMEs. Reduction in backup storage capacity requirements – Introducing data deduplication will drastically reduce the cumulative backend storage by 98 percent. © 2011 Apptivo Inc. All rights reserved.
  • 3. Increase in Data Integrity – data deduplication reduces the overall cost of data protection. The retrieval of the data also becomes easier and faster. Reduced Bandwidth Usage – Data deduplication will reduce the bandwidth required to send data over networks by approximately 90 percent. Many SMEs were reluctant to use data deduplication because they felt it cannot be included in their data protection strategy due to cost factor. However, of late, cost of proprietary hardware deduplication products are priced keeping mind the SMES/SMBs. Today there are many software only deduplication that allow the work station data to be deduplicated, thus making it attractive to organization of all sizes. One of the biggest assets of any business is its information and no business would want to fail due to data breach. Therefore, it would be wise to invest in data backup and restoration strategies. Maya Pillai is passionate about helping small businesses and professionals. She is a blogger for Apptivo's Small Business University © 2011 Apptivo Inc. All rights reserved.