Topic > Measures companies need to take to prevent…

Computer system failures can be classified as unintentional threats, not to mention intentional threats, IT attacks, targeted attacks and botnets. It occurs due to poor manufacturing, faulty materials, and outdated or poorly maintained networks. Unintentional malfunctions can also occur for other reasons, ranging from lack of experience to inadequate testing. There is a way to prevent this unintentional threat from occurring. The most common prevention is to create a backup, test the backup, keep the antivirus protection updated, use the firewall, purchase and install the UPS power supply, use data encryption on the wireless network. Creating a backup is not just a simple backup. Depending on the size of your data, there may be many ways to back up your data. Your best security policy is to take frequent backups. Most external drives available today come with affordable, easy-to-use backup software. Don't get caught without your backups. For a large company or enterprise, they usually used centralized backup, which was expensive compared to the common backup type. Some of the centralized backups are the database module, encryption modules, and disaster recovery option and off-site storage. Database module. This software is added to your central backup system so that you can back up those databases while they are online. Most vendors offer database modules for Oracle, Sybase, Informix, Microsoft SQL, and Microsoft Exchange. These modules tend to work with utilities included in databases. For example, a central backup software module for Oracle typically interfaces with the Oracle RMAN utility to capture an online backup. Encryption modules provide additional security for backups. Both the client and server have... half of paper... all a wireless network router, it is usually not set to encrypt data transmissions by default. A smart hacker can see everything you are doing. Configure your router to use WPA encryption and set your password so it can't be easily guessed. Works Cited Efraim Turban, Linda Volonino. (November 2011). Information Technology Management, 8th Edition International Student Version. United States: Canisius College Michael J. Gallagher. (July 1, 2001). Centralized backup. Available at http://www.sans.org/reading-room/whitepapers/backup/centralized-backups-513 Retired December 20, 2013Garret System. (February 2, 2011). How to protect yourself from computer failures. Available at http://www.garrettsystems.com/index.php?option=com_content&view=article&id=51:how-to-protect-against-computer-failure&catid=31:general&Itemid=46 Retrieved December 19 2013