DR Module 3 Discussion Forum

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Module 3 Discussion Forum

Data backups to a company are immensely important. If the data are secure, the

company operates smoothly enough that the client believes in the organization. A business

takes many protection steps to ensure that the evidence is generated and that ordinary

precautions are carried out. The company is facing a few challenges mooring the backups on

the contrary. Data backup requires a data encryption layer. The security backup needs and

data from the rest of the world are key problems (Challagidad, 2019). The first challenge is

the storing of data. If the data are too comprehensive, it is imperative to store data in a storage

medium, affecting DRP and BCP.

Another colossal problem is the anchoring of data from around the globe or from delegates

directed at ruining the organization's credibility. Strengthening/backup media can be

anchored using different techniques. The data security procedures are the primary worry for

an enterprise and a vital protection system component. It is a backup process/facility in which

protections or applications outside the entity or the center IT environment are typically

stored. It is somewhat similar to a traditional backup technique except that it uses a computer

or storage medium and is not situated physically in the main facilities of the company

(Clarke, 2016). The data retention process's key focus, also referred to as offsite data backup,

is on ensuring an offsite data backup. The key aim of offsite backup is to protect the data

from malicious attacks and preserve duplicate reinforcing/backup data from the risk of the

site destroying or collapsing.

References
Challagidad, P. (2019). Efficient and Reliable Data Recovery Technique in Cloud

Computing. International Journal of Advanced Pervasive and Ubiquitous Computing,

19-33.

Clarke, R. (2016). Practicable Backup Arrangements for Small Organisations and

Individuals. Australasian Journal of Information Systems, 1-25.

You might also like