Common IT Challenges - Shadow IT and More
IT always has its fair share of challenges, but are some of them preventable? Recently updated information shows that technological progress and cost or resource restraints are putting businesses at risk for data loss and possible data security issues. Organizations are struggling to effectively manage corporate data in light of rise of shadow IT, poorly implemented storage solutions and lack of employee know-how, all of which pose challenges that can lead to data loss.
Three Common IT Challenges
Rise of Shadow IT
Challenge: Organizations’ security policies are not keeping up with employee technology use. With inexpensive data storage and an increasingly tech-savvy and mobile workforce, IT teams are struggling to manage shadow IT – the IT systems and solutions built and used inside an organization without organizational knowledge or approval. As employees take it upon themselves to store business data outside of the corporate IT environment – on external hard drives, online email services, or even an off-the-record departmental NAS system – potentially critical data is not included in corporate backup and security practices, opening up the possibility of data loss.
Recommendation: Organizations should audit the use of IT solutions outside of company purview, maintain a register of all devices and external hard disks being utilized, and ensure these are included in the company’s security and backup protocols. Additionally, organizations should ensure that their data security policy outlines the parameters around including or excluding the use of external storage.
Poorly Implemented Server or Storage Solutions
Challenge: Even the most advanced high-end storage solutions require human intelligence to manage them, which at times can result in malfunction or failure. While built-in recovery functionalities help protect against data loss, Kroll Ontrack has seen a rise in data recovery cases where IT storage equipment was not properly set up by a third-party service provider. This can lead to data loss when the recovery or rebuild functions do not work as way they should.
Recommendation: When selecting a third-party vendor, ensure they are recommended or certified by the storage manufacturer. As part of system set up, test to ensure the system is functioning properly, including the restore functions, and make sure internal administrators are fully trained on any new system requirements.
Challenge: There is no doubt that managing today’s virtual IT environments and hyper-converged storage systems is complex and requires a very deep understanding of all the technologies behind these solutions. Further, small missteps can have large consequences; accidentally deleted data or disks removed in error can produce dangerous downstream data loss effects. Due to time and cost constraints, many companies lack an in-depth training program for their IT staff to fully understand and be able to effectively manage system nuances and procedures.
Recommendation: Considering the potential financial business continuity costs associated with enterprise data loss, companies should evaluate and invest in proper training and development of IT administrators responsible for handling server and storage systems storing sensitive and business critical data.
“In light of changing storage trends like shadow IT, today’s complex environments demand that IT teams have a good understanding of all the systems that support the business and the security protocols around the use of company devices,” said Todd Johnson, vice president of data and storage technologies, Kroll Ontrack. “It’s equally important for IT departments to work with their legal and information security teams to implement clear policies to manage data, and to invest in properly training IT personnel to provide the best chance of minimizing data loss should an organization experience a system challenge.”
IT Department Best Practices if Data Loss Occurs
To ensure the best chance for an effective resolution, Kroll Ontrack recommends IT departments adhere to these best practices if a data loss occurs:
Avoid panicking and rushing to action.
If data loss happens, do not restore data to the source volume from backup because this is where the data loss occurred in the first place. Do not create new data on the source volume, as it could be corrupt or damaged.
Be confident in skills and knowledge.
IT staff must help leadership avoid making decisions that do more harm than good. When specifically faced with a possible data loss event, take the volume offline quickly. Data is being overwritten at a rapid pace, and the volume should not be formatted to resolve corruption.
Have a plan.
Follow established ITIL processes and ensure data center documentation is complete and revisited often to ensure it is up to date. In particular, do not run volume utilities (CHKDSK/FSCK) or update firmware during a data loss event.
Know the environment (and the data).
Understand what the storage environments can handle and how quickly it can recover. Know what data is critical or irreplaceable, whether it can be re-entered or replaced, and the costs for getting that data up and running to a point of satisfaction. Weigh the costs and risks when determining what is most urgent – getting systems up and running quickly or protecting the data that is there.
When in doubt, call a data recovery company.
While the manufacturer or vendor may be a good starting point, the value of data and the potential for data loss when getting a system back up and running may not be top of mind. Consult a reputable data recovery company if concerns over data loss potential arise.
Call for Immediate Assistance!
- Crypto Currency (2)
- Data Backup (9)
- Data Erasure (8)
- Data Loss (15)
- Data Protection (11)
- Data Recovery (22)
- Data Recovery Software (2)
- Data Security (3)
- Data Storage (15)
- Degaussing (1)
- Deleted Data (5)
- Digital Photo (1)
- Disaster Recovery (6)
- Encryption (1)
- Expert Articles (5)
- Hard Drive (7)
- Laptop/Desktop (7)
- Memory Card (5)
- Mobile Device (13)
- Ontrack PowerControls (1)
- Raid (5)
- Ransomware & Cyber Incident Response (7)
- Server (6)
- SSD (14)
- Tape (17)
- Virtual Environment (8)