Measures Companies Need to Take in Order to Prevent Computers System Failure

757 Words2 Pages

Computer system failure can be classified to unintentional threats, not to mention intentional threat, IT attacks, targeted attacks, and botnets. It occurs as the result of poor manufacturing, defective materials, and outdated or poorly maintained networks. Unintentional malfunctions can also happen for other reasons, ranging from lack of experience to inadequate testing.
There’s way to prevent this unintentional threat from happening. The most common of all prevention is, create backup, test your backup, keep your virus protection up to date, use firewall, purchase and install UPS power supply, use data encryption on your wireless network.
Creating backup, it’s not just a simple backup. Depending on how large your data is, it could be a lot of ways of backing up your data. Your best security policy is to do frequent backups. Most External drives available today come with backup software that is economical and easy to use. Don't get caught without your backups.
For a large company or enterprises, they usually used centralized backup, which were expensive compare to common type of backup. Some of the centralized backup is, Database Module, Encryption Modules, and Disaster Recovery Option, and Off-Site Storage.
Database Module, This software is added to the central backup system so those databases can be backed up while online. Most vendors offer database modules for Oracle, Sybase, Informix, Microsoft SQL, and Microsoft exchange. These modules tend to work with utilities included with the databases. For example, a central backup software module for Oracle will normally interface with the Oracle RMAN utility to capture an online backup.
Encryption Modules, provides addition security for you backups. Both the client and server have...

... middle of paper ...

...all a wireless network router, it usually isn’t set up to encrypt your data transmissions by default. A smart computer hacker can see everything you are doing. Set up your router to use WPA encryption and set the password so that it can’t be easily guessed.

Works Cited

Efraim Turban, Linda Volonino. (November 2011). Information Technology Management, 8th Edition International Student Version. United States: Canisius College

Michael J. Gallagher. (1st July 2001). Centralized Backup. Available at http://www.sans.org/reading-room/whitepapers/backup/centralized-backups-513 Retrieve at December 20th 2013
Garret System. (February 2nd 2011). How to protect against Computer Failure. Available at http://www.garrettsystems.com/index.php?option=com_content&view=article&id=51:how-to-protect-against-computer-failure&catid=31:general&Itemid=46 Retrieve at December 19th 2013

More about Measures Companies Need to Take in Order to Prevent Computers System Failure

Open Document