What is YOUR Data Worth???. “Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22.

Slides:



Advertisements
Similar presentations
1 Remote Off-Site Backup BE PREPARED! Dont let a loss of data shutdown your business!
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Data Storage & Security Dr Alastair F. Brown Head of Computing MRC Human Genetics Unit MRC Institute of Genetics and Molecular Medicine The University.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Using CD-R and CD-RW media to backup SIGNZ data. Step One … a bit of preparation.
SQL Server Disaster Recovery Chris Shaw Sr. SQL Server DBA, Xtivia Inc.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
Computer Security!!! By Katie Sawyer 8P Viruses! Viruses are horrible things created by horrible people! They make your computer behave in a different.
Basic Data Safety Practices That Can Prevent Malpractice Claims & Ethics Violations Grant County Bar Association June 14, 2011 Kim J. Brand PresidentFounder.
File Transfer Methods : A Security Perspective. What is FTP FTP refers to the File Transfer Protocol, one of the protocols within the TCP/IP protocol.
Back Up and Recovery Sue Kayton February 2013.
Computer Backup Fred Marshall Coastal Computers & Networks.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
Backing up data By Alicia stewart.
November 2009 Network Disaster Recovery October 2014.
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Electronic Public Record What is it, and Where Can Agency Lawyers Find It?
Why Copy , Attachments and other files to CD or DVD? Backup mail & files in case of computer failure or disaster. Archive old messages & files before.
Back to content Final Presentation Mr. Phay Sok Thea, class “2B”, group 3, Networking Topic: Mail Client “Outlook Express” *At the end of the presentation.
Essential CCHS Computing Information Computer Applications September 2009.
Cambridge University Library Back-up, Storage and Sharing Helping you put into practice what you know you ought to be doing… Cambridge University Library.
Dr.Backup Online Backup Service (888) (toll free)
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
Chapter 18: Windows Server 2008 R2 and Active Directory Backup and Maintenance BAI617.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
BACKUPS What is your plan???. Plan in Writing “A goal without a plan is just a wish.” Antoine de Saint-Exupéry.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
January Backing Up Your PC’s Hard Drive Dr. Michael Stachiw.
We bring cloud computing to life! Powered by yourcompany We will be right with you – this webinar will begin shortly! Pause for audio.
11 BACKING UP AND RESTORING SYSTEMS AND DATA Chapter 15.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Continuous Backup for Business CrashPlan PRO offers a paradigm of backup that includes a single solution for on-site and off-site backups that is more.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Computer security By Isabelle Cooper.
GOTBACKUP THE BEST BACKUP SOLUTIONS. SIGN UP TODAY! CLICK HERECLICK HERE.
HalFILE 2.1 Network Protection & Disaster Recovery.
Understanding Backup and Recovery Methods Lesson 8.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Disaster RECOVERY It’s about the connections. Goals for this session Administrators recognize their role in the decision-making process associated with.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Protecting Your Data With Just Get Backup, LLC. Agenda How important is your data – Acknowledging worst-case scenarios. Understanding that data backup.
Managing Data & Information Procedures & Techniques.
Chapter 6 Discovering Computers Fundamentals Storage.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
Product Training 1 JetFlash Software Application.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Windows xp Microsoft Windows XPWindows XP Windows XP Metro Redesign V2 Designed and Developed By: Alex Apple Website: aacompware.com YouTube: /missouri.musician.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Basic Guide to Computer Backups Eric Moore Computer Users Group of Greeley September 13, 2008.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Information Technology Acceptable Use An Overview
Basic Guide to Computer Backups
The importance of computer backups
Integrating Disk into Backup for Faster Restores
Firstly you need to get “Get the Anniversary Update now” and then the file will start downloading automatically. After it completes its process, run.
Internet Protocol Mr. Paulk.
Cloud system.
Back Up and Recovery Sue Kayton October 2015.
Prepared by Jaroslav makovski
Have you seen this screen?
Computer communications
Vertika Jain Convert OST to PST. What is OST File? OST file is the offline storage table. It works in offline mode. All the modification done in offline.
Presentation transcript:

What is YOUR Data Worth???

“Just because you're paranoid doesn't mean they aren't after you.” Joseph Heller, Catch-22

BIG DATA 2.5 Exabyte’s of data are created each day (2015) 25,000,000,000 Average (1TB) hard drives 5,319,148,936,170 DVD’s

What About Me? Photos, calls, and txt Logging into a website s Social Media Paying a bill Doctors visit Driving

Types Of Data Temporary Personal Archival Sensitive Business

Personal Data Check your office’s acceptable use policy to see what you are allowed/not allowed Verify this with your office administrator on what is ok/not ok These are YOUR responsibility to back up Photos, music, documents, files, etc. Keep it separate

Business Data What you need for the office to function Major part of your disaster recovery plan Still need to classify data types YOU need to be confident that YOUR data is safe.

Disaster Recovery Have a plan Information is key Plan broken out in stages Plans from ground up to daily operations Test it out Hope you NEVER have to use it

Basic Backup Information Who runs the backup? Who swaps out the media? What program do you use? What did the last log say? When do they take place? Where is your backup stored? How long does it take to run a backup? How large is your backup?

Backups Use To Be Hard

Computers were not networked Internet? What Internet? Floppy Disk Tape Drives Had to be done manually Media was fragile

Backups Today Everything is connected LOTS of storage Backups happen automatically Check to make sure they are backed up

3-2-1 Backup 3 - Copies of data 2 - Different types of media 1 - Copy off site (minimum)

Cloud??? Cloud backups are great They should NOT be your only backup Depend on your internet connection Can take a LONG time to complete You still need to check them Review your features and settings

Restore Have you restored a backup? Can you restore just one file? How long would a full restore take? Who can restore files?

Balance Security VS convenience What to backup VS Cost Time VS Money Time VS piece of mind

What is your Data Worth? The bad guys have figured this out

What is your Data Worth? The bad guys have figured this out Target personal files Count on them NOT being backed up Feed off of fear and intimidation

What Is Encryption? Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Secret Decoder Ring, Enigma, Truecrypt. RSA, Diffie-Helman, 128, 256, 2048, 4048 Bit.

What Do You Do? Be smart – DON’T CLICK ON THINGS!! THINK before you open Contact the sender HAVE A GOOD BACKUP!!!

It’s YOUR data, keep it that way.