HalFILE 2.1 Network Protection & Disaster Recovery.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Information Technology Disaster Recovery Awareness Program.
Introducing FailSafeSolutions Online Backup Software.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Everything your business needs to know but probably doesn’t.
June 23rd, 2009Inflectra Proprietary InformationPage: 1 SpiraTest/Plan/Team Deployment Considerations How to deploy for high-availability and strategies.
Ensuring Continuing Operations and Disaster Recovery By: Alyssa Gatrell Mike Harker Amy Shumway.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Information Security in Real Business
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Cloud Backup. Current Backup failures  Bad media (tapes have limited lifespan, HDD’s can fail)  Backup software fault  Operating system fault  Human.
IT is our job! Mind your own business.. 1.Consulting 2.Support 3.Maintenance Network Assessment We provide you with an overview of your current network,
CS27510 Commercial Database Applications. Maintenance Maintenance Disaster Recovery Disaster Recovery.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Complete Data Protection from [INSERT SOFTWARE NAME] Insert logo.
AgVantage IT Services Systems Management Team Partnered with You and IBM® Agenda Disaster Recovery Service Disaster Recovery Service IT Visors IT Visors.
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
March 7, 2011 AlwaysThere™ Virtual Cloud Servers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
November 2009 Network Disaster Recovery October 2014.
DB-12: Achieving High Availability with Clusters and OpenEdge® Replication Combining the two technologies Hugo Loera Chávez Senior Tech Support Engineer.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Describe How Software and Network Security Can Keep Systems and Data Secure P3. M2 and D1 Unit 7.
IT:Network:Applications  What is the worst that could happen? ◦ It will  When is the worst time that could happen? ◦ That’s when it will.
Disaster Recovery Advice 6 th November Data What do you need to backup? System States All or Critical Data.
Chapter 8 Implementing Disaster Recovery and High Availability Hands-On Virtual Computing.
Module 7. Data Backups  Definitions: Protection vs. Backups vs. Archiving  Why plan for and execute data backups?  Considerations  Issues/Concerns.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
©2006 Merge eMed. All Rights Reserved. Energize Your Workflow 2006 User Group Meeting May 7-9, 2006 Disaster Recovery Michael Leonard.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Big Data Bijan Barikbin Denisa Teme Matthew Joseph.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Recover Your Data Quickly: Disaster Recovery Techniques with ARCserve  Disaster Recovery.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
CIT 470: Advanced Network and System AdministrationSlide #1 CIT 470: Advanced Network and System Administration Disaster Recovery.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Cosc 4750 Backups Why Backup? In case of failure In case of loss of files –User and system files Because you will regret it, if you don’t. –DUMB = Disasters.
Fault Tolerance and Disaster Recovery. Topics Using Antivirus software Fault tolerance –Power –Redundancy –Storage –Services Disaster Recovery –Backup/Restore.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
Install, configure and test ICT Networks
Backup Exec System Recovery. 2 Outline Introduction Challenges Solution Implementation Results Recommendations Q & A.
Creating and Managing Networks CSC February, 1999.
HalFILE 2.2 Disaster Recovery & Backups. Money & Time How much money and time are you willing to spend? How long can you afford to be down?
Verification & Validation
OCLC ILLiad hosted service March 18 th, 2010 The who, what, why, when and how of ILLiad hosting.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Santa Clara, CA (408)
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
City of Hyattsville City Council IT Briefing October 19, 2015 dataprise.com | #ITinRealLife.
Database recovery contd…
Session XIa - halFILE Disaster Recovery
UNIT 19 Data Security 2.
Business Contingency Planning
SpiraTest/Plan/Team Deployment Considerations
السلوك التنظيمى المعاصر
Administering Your Network
Part 3.
What is Information Security?
Presentation transcript:

halFILE 2.1 Network Protection & Disaster Recovery

Backup Method of scheduling flat-file backup of halFILE databases Auto archive now can include flat-file backup Format of bcp line for memo fields What images need to be backed up? Use Off site storage for CDs and tape

Multi-tiered Backup Strategy Fault tolerance – expense vs. downtime RAID levels Protected if one backup strategy fails? Verification of backup SQL Agents – benefits and drawbacks Tape rotation Incremental vs. full Backup expense

Products Computer Associates ArcServe Veritas Backup Exec Microsoft Backup (free with server) Choose your software, learn it and get very comfortable with it

hal Systems Review If you are on maintenance we will check that your flat file backups are running If you purchased tape software/hardware from us we will review backup strategy As a service, we will review halFILE backup strategies implemented by 3 rd parties

Restore Test your backup procedures often, we recommend every 3 weeks Get very comfortable with your backup software – make it routine If possible have a plan for a backup server to put in place during the restore of the primary server

Virus protection Real time monitoring issues with halFILE directories Schedule regular pattern file updates viruses most common source Firewall in place prior to connecting machines to the internet

Virus protection Companies rarely send out patches or updates via Attachments – double check before opening any attachment Real-time monitoring – it can definitely affect speed

Internet Security / Firewall Microsoft security patches Ports for remote access (VPN, PCAny, Terminal Services) Security designs (all behind firewall or Private/Public/Internet)

Disasters Can Happen Disgruntled employees Backup Failures Computer Hackers Viruses Fire Natural Disasters Terrorism

Disaster Prevention Secure the network, assume the worst situation Absolute control to the administrator ONLY Have the plan in place before the disaster! Don’t learn the hard way!

The End