|By Jamie Brenzel||
|November 26, 2012 08:00 AM EST||
Imagine it as if it's actually happened - your network has crashed and all your organization's critical applications and associated data have vanished. This worst-case scenario is one every business owner fears. Whether it's due to a storm, a break-in or the crash of your hard drive, the loss of your company data can cripple your business, leaving you stranded and holding the proverbial bag.
Business owners often assume that they don't have time to think about data backup procedures, much less the recovery process involved in the event of a system failure. They are focused instead on the business at hand. Unfortunately, what many don't realize is that the stalwart back-up methods of the past such as tape, CD or memory stick have become painfully antiquated in today's data-centric world.
While many small-to-mid-sized businesses (SMBs) think all of their data is being captured and stored in a safe place, the reality is that most SMBs are operating under a false assumption. Your business depends on mission-critical applications and their associated data. The deep dark secret is that many of these programs are not being backed up because, when left open, they are outside the parameters of standard backup procedures.
The question all business owners should ask themselves is simple: "If my computer disappeared tomorrow, could my business survive without past emails, contacts, work schedules and accounting data?" If the answer is no, then it's time to take a closer look at your backup and data recovery procedures.
The Ongoing Dilemma
Many critical non-standard databases, such as Outlook and QuickBooks along with other accounting software and legacy applications, as well as databases such as MS Access and MySQL, are not VSS-aware, meaning they lack the standard that allows files or databases to be backed up when in use. This lack of functionality leaves many IT managers and SMBs empty-handed in the event of a disaster or system failure.
Outlook and QuickBooks user/company data is notorious for being left out of standard backup routine practices. The ongoing dilemma of backing up this critical data continues to be the fact that most of us forget to shut down these programs when we leave for the day. Unless you take special precautions, it is likely that when attempting to restore these critical data files you may find that they are outdated... or worse, corrupted. This is true of many mission-critical programs that keep your business running.
Take Outlook for example; a critical application for businesses of all sizes. If Outlook is not closed, many backup tools are unable to backup the ever-important .PST file, leaving your company open to potential disaster should the program crash. The .PST contains all of your Outlook data, including emails, calendar events, contacts, schedules and notes; and the backup of this file doesn't necessarily happen automatically. Backing up the .PST file is critical for restoring your most recent data.
Additionally, for those of us who are email hoarders, keeping all email correspondence in Outlook over the past year can cause the .PST to reach gigabyte proportions very quickly. These large and unruly files can produce unexpected problems when backing them up. Many backup systems can "time out" or even worse, demand an extra tape or CD to complete the backup routine when your office is closed and employees are gone for the day.
A good starting point is to look for a Microsoft Certified backup vendor that follows the best practices set by Microsoft. Selecting back up software that doesn't conflict with Windows or other low-level drivers, such as antivirus programs and software firewalls, should be a key element in identifying a backup vendor.
When it comes to ranking important data, most people place their financial records near the top of the list. This is especially true for business owners. QuickBooks, the popular accounting software, is another application many SMBs can't do without. The absence of an Application Programming Interface (API) presents additional challenges for protecting corporate financial data. An API allows third-party companies to integrate special functions, such as requests for a data dump for easy backup. Currently, there is no safe method to programmatically dump your QuickBooks data to a safe place for easy backup at the end of the day, and without an API, developers can't create one for QuickBooks.
Intuit recommends scheduling QuickBooks to back up automatically to a specific folder, which allows your data to be verified regularly, and from there, scheduling your third party backup software to back up to that folder. This ensures that QuickBooks is in a good state before your backup software runs. Not following these best practices could lead to a corrupted QuickBooks database file.
Listed below are the QuickBooks files that your company must make sure are backed up:
.QBW = quickbooks Primary Data File
.QBB = quickbooks Backup File
.QBA = quickbooks Accountant's Copy File
(May also be a .AIF [Accountant's Import File])
.QBA.TLG = Transaction log file (for the accountant's review copy)
.QBM = quickbooks Portable Company File (for version 2006 and above).
.QBI = quickbooks Crash Roll Back File
.QBX = quickbooks Accountant Transfer File
.QDT = quickbooks United Kingdom Accountant Data File
The backup challenges of these programs are unique, so take the time to consider alternatives that address this lack of functionality. Some data backup companies provide solutions that include the ability to continuously back up your programs and data, no matter where that device is located and even while the programs are open and in use.
How Confident Are You? - Not Sure? Test It!
Not sure if your data is secure? Just like a fire drill, the best way to make sure is to put your backup method to the test. If possible, locate a spare computer, wipe the drive and attempt to do a complete restore of your company applications and associated data. Then ask yourself the following questions:
- Are you able to restore your backup files in one simple step?
- Do you need to re-install all of your applications individually?
- Do you have easy access to those applications and have you kept track of the associated upgrades?
- Does your Outlook, QuickBooks and other proprietary data install easily?
- Do you end up with the most current data when you have completed the restoration?
Most important, keep track of the time it takes you to complete the restoration from beginning to end, then multiply that by the number of computers you have within your organization. Many SMBs are unaware that the "dirty little secret" of data recovery is the time it takes to restore data, which is governed by your company's bandwidth restrictions. When your computers are down, every minute counts.
Data backup should be as important to your business as an insurance policy. Computers can be replaced if lost in a disaster, or stolen during a break-in. But if you don't have a reliable, secure method of restoring your data, all the money in the world isn't going to bring back those missing files. It is crucial to find a method that protects every level of your data.
In a perfect world, there would be no need to back up your company's data; computers and hard drives would last forever, outside threats like malicious hackers and natural disasters would be non-existent and employees would never forget to save a file, or close a program. Unfortunately this perfect world does not exist. For this reason, businesses of all types and sizes know that keeping their data backed up and protected at all times must be of the utmost priority if they wish to remain in business after the fact.
The speed of product development has increased massively in the past 10 years. At the same time our formal secure development and SDL methodologies have fallen behind. This forces product developers to choose between rapid release times and security. In his session at DevOps Summit, Michael Murray, Director of Cyber Security Consulting and Assessment at GE Healthcare, examined the problems and presented some solutions for moving security into the DevOps lifecycle to ensure that we get fast AND ...
Mar. 6, 2015 06:00 AM EST Reads: 2,934
The Workspace-as-a-Service (WaaS) market will grow to $6.4B by 2018. In his session at 16th Cloud Expo, Seth Bostock, CEO of IndependenceIT, will begin by walking the audience through the evolution of Workspace as-a-Service, where it is now vs. where it going. To look beyond the desktop we must understand exactly what WaaS is, who the users are, and where it is going in the future. IT departments, ISVs and service providers must look to workflow and automation capabilities to adapt to growing ...
Mar. 6, 2015 04:00 AM EST Reads: 1,233
Docker is becoming very popular--we are seeing every major private and public cloud vendor racing to adopt it. It promises portability and interoperability, and is quickly becoming the currency of the Cloud. In his session at DevOps Summit, Bart Copeland, CEO of ActiveState, discussed why Docker is so important to the future of the cloud, but will also take a step back and show that Docker is actually only one piece of the puzzle. Copeland will outline the bigger picture of where Docker fits a...
Mar. 6, 2015 04:00 AM EST Reads: 3,375
Since 2008 and for the first time in history, more than half of humans live in urban areas, urging cities to become “smart.” Today, cities can leverage the wide availability of smartphones combined with new technologies such as Beacons or NFC to connect their urban furniture and environment to create citizen-first services that improve transportation, way-finding and information delivery. In her session at @ThingsExpo, Laetitia Gazel-Anthoine, CEO of Connecthings, will focus on successful use c...
Mar. 6, 2015 04:00 AM EST Reads: 3,079
Software Defined Storage provides many benefits for customers including agility, flexibility, faster adoption of new technology and cost effectiveness. However, for IT organizations it can be challenging and complex to build your Enterprise Grade Storage from software. In his session at Cloud Expo, Paul Turner, CMO at Cloudian, looked at the new Original Design Manufacturer (ODM) market and how it is changing the storage world. Now Software Defined Storage companies can build Enterprise grade ...
Mar. 6, 2015 03:30 AM EST Reads: 2,883
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
Mar. 6, 2015 02:45 AM EST Reads: 4,080
IoT is still a vague buzzword for many people. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed the business value of IoT that goes far beyond the general public's perception that IoT is all about wearables and home consumer services. He also discussed how IoT is perceived by investors and how venture capitalist access this space. Other topics discussed were barriers to success, what is new, what is old, and what th...
Mar. 6, 2015 02:30 AM EST Reads: 4,737
Hadoop as a Service (as offered by handful of niche vendors now) is a cloud computing solution that makes medium and large-scale data processing accessible, easy, fast and inexpensive. In his session at Big Data Expo, Kumar Ramamurthy, Vice President and Chief Technologist, EIM & Big Data, at Virtusa, will discuss how this is achieved by eliminating the operational challenges of running Hadoop, so one can focus on business growth. The fragmented Hadoop distribution world and various PaaS soluti...
Mar. 6, 2015 02:30 AM EST Reads: 1,334
The Internet of Things (IoT) is rapidly in the process of breaking from its heretofore relatively obscure enterprise applications (such as plant floor control and supply chain management) and going mainstream into the consumer space. More and more creative folks are interconnecting everyday products such as household items, mobile devices, appliances and cars, and unleashing new and imaginative scenarios. We are seeing a lot of excitement around applications in home automation, personal fitness,...
Mar. 6, 2015 01:30 AM EST Reads: 3,682
Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and ex...
Mar. 6, 2015 01:30 AM EST Reads: 3,807
In his session at DevOps Summit, Tapabrata Pal, Director of Enterprise Architecture at Capital One, will tell a story about how Capital One has embraced Agile and DevOps Security practices across the Enterprise – driven by Enterprise Architecture; bringing in Development, Operations and Information Security organizations together. Capital Ones DevOpsSec practice is based upon three "pillars" – Shift-Left, Automate Everything, Dashboard Everything. Within about three years, from 100% waterfall, C...
Mar. 6, 2015 01:00 AM EST Reads: 4,599
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
Mar. 6, 2015 12:30 AM EST Reads: 3,732
Dale Kim is the Director of Industry Solutions at MapR. His background includes a variety of technical and management roles at information technology companies. While his experience includes work with relational databases, much of his career pertains to non-relational data in the areas of search, content management, and NoSQL, and includes senior roles in technical marketing, sales engineering, and support engineering. Dale holds an MBA from Santa Clara University, and a BA in Computer Science f...
Mar. 6, 2015 12:15 AM EST Reads: 3,914
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along...
Mar. 5, 2015 09:00 PM EST Reads: 7,153
The cloud is now a fact of life but generating recurring revenues that are driven by solutions and services on a consumption model have been hard to implement, until now. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, will discuss how a top European telco has leveraged the innovative recurring revenue generating capability of the consumption cloud to enable a unique cloud monetization mod...
Mar. 5, 2015 08:00 PM EST Reads: 1,967
FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice, will review the Federal Risk and Authorization Management Program (FedRAMP) process and provide advice on overcoming common compliance obstacles.
Mar. 5, 2015 08:00 PM EST Reads: 1,619
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will disc...
Mar. 5, 2015 07:00 PM EST Reads: 1,154
Are your applications getting in the way of your business strategy? It’s time to rethink your IT approach. In his session at 16th Cloud Expo, Madhukar Kumar, Vice President, Product Management at Liaison Technologies, will discuss a new data-centric approach to IT that allows your data, not applications, to inform business strategy. By moving away from an application-centric IT model where data integration and analysis are subservient to the constraints of applications, your organization will b...
Mar. 5, 2015 07:00 PM EST Reads: 1,687
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed...
Mar. 5, 2015 07:00 PM EST Reads: 968
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance...
Mar. 5, 2015 06:00 PM EST Reads: 2,040