{"id":6175,"date":"2017-03-10T06:33:41","date_gmt":"2017-03-09T20:33:41","guid":{"rendered":"http:\/\/nsrd.info\/blog\/?p=6175"},"modified":"2018-12-11T10:00:49","modified_gmt":"2018-12-11T00:00:49","slug":"the-rise-of-the-new-risk","status":"publish","type":"post","link":"https:\/\/nsrd.info\/blog\/2017\/03\/10\/the-rise-of-the-new-risk\/","title":{"rendered":"The Rise of the New Risk"},"content":{"rendered":"<p>In 2008 I published &#8220;Enterprise Systems Backup and Recovery: A corporate insurance policy&#8221;. It dealt pretty much exclusively, as you might imagine, with backup and recovery concepts.&nbsp;Other activities like snapshots, replication, etc., were&nbsp;outside the scope of the book. Snapshots, as I recall, were mainly covered as an appendix item.<\/p>\n<p>Fast forward almost a decade and there&#8217;s a new book&nbsp;on the marketplace, &#8220;<a href=\"https:\/\/www.crcpress.com\/Data-Protection-Ensuring-Data-Availability\/Guise\/p\/book\/9781482244151\" target=\"_blank\">Data Protection: Ensuring Data&nbsp;Availability<\/a>&#8221; by yours truly, and it is not just focused on backup and recovery. There&#8217;s snapshots, replication, continuous data protection, archive, etc., all covered. Any reader of my blogs will know though that I don&#8217;t just think of the technology: there&#8217;s the business aspects to it as well, the process, training and people side of the equation.&nbsp;There&#8217;s two other titles I bandied with: &#8220;Backup is dead, long live backup&#8221;, and &#8220;Icarus Fell: Understanding risk in the modern IT environment&#8221;.<\/p>\n<p>You might be wondering why in 2017 there&#8217;s a need for&nbsp;a book dedicated to data protection.<\/p>\n<p><a href=\"https:\/\/nsrd.info\/blog\/2017\/03\/10\/the-rise-of-the-new-risk\/solution\/\" rel=\"attachment wp-att-6176\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6176\" src=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/03\/bigStock-Puzzle-Pieces.jpg\" alt=\"Puzzle Pieces\" width=\"900\" height=\"383\" srcset=\"https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/03\/bigStock-Puzzle-Pieces.jpg 900w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/03\/bigStock-Puzzle-Pieces-300x128.jpg 300w, https:\/\/nsrd.info\/blog\/wp-content\/uploads\/2017\/03\/bigStock-Puzzle-Pieces-768x327.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p>We&#8217;ve come a long way in data protection, but we&#8217;re now actually teetering on an interesting precipice, one which we need to understand and manage very carefully. In fact, one which has resulted in significant data loss situations for many companies world-wide.<\/p>\n<p>IT has shifted from the datacentre to \u2013 well,&nbsp;<em>anywhere<\/em>. There&#8217;s still a strong datacentre focus. The estimates from various industry analysts is that around 70% of IT infrastructure&nbsp;spend is still based in the datacentre.&nbsp;That number is shrinking, but IT infrastructure is&nbsp;not; instead, it&#8217;s morphing. &#8216;Shadow IT&#8217; is becoming more popular \u2013 business units going off on their own and deploying systems without necessarily talking to their IT departments. To be fair, Shadow IT always existed \u2013 it&#8217;s just back in the 90s and early 00s, it required the&nbsp;business units to actually <em>buy<\/em> the equipment. Now they just need to provide a credit card to a cloud provider.<\/p>\n<p>Businesses are also starting to divest themselves of IT activities that aren&#8217;t their &#8220;bread and butter&#8221;, so to speak. A financial company or a hospital doesn&#8217;t make money from running an email system, so they outsource that email \u2013 and increasingly it&#8217;s to someone like Microsoft via Office 365.<\/p>\n<p>Simply put, IT has become significantly more commoditised, accessible and abstracted over the&nbsp;past decade. All of this is&nbsp;<em>good<\/em> for the business,&nbsp;<em>except<\/em> it brings the business closer&nbsp;to that precipice I mentioned before.<\/p>\n<p>What precipice? Risk. We&#8217;re going from datacentres where we don&#8217;t lose data because we&#8217;re deploying on highly resilient systems with 5 x 9s availability, robust layers of data protection and formal processes into situations where data is pushed out of the datacentre, out of the <em>protection<\/em> of the business. The old adage,&nbsp;&#8220;never assume, you make an <span style=\"text-decoration: underline;\">ass<\/span> out of <span style=\"text-decoration: underline;\">u<\/span> and <span style=\"text-decoration: underline;\">me<\/span>&#8221; is finding new ground in this modern approach to IT. Business groups trying to do a little data analytics rent a database at an hourly rate from a cloud provider and find good results, so they start using it more and more. But don&#8217;t think about data protection because they&#8217;ve never had to before. That led to things like <a href=\"https:\/\/nsrd.info\/blog\/2017\/01\/11\/what-can-we-learn-from-the-mongodb-attacks\/\" target=\"_blank\">the devastating data losses encountered by MongoDB users<\/a>. Startups&nbsp;with higher level&nbsp;IT&nbsp;ideas are <a href=\"https:\/\/nsrd.info\/blog\/2017\/02\/12\/gitlabs-rca-misses-key-failures\/\" target=\"_blank\">offering services without any understanding of the&nbsp;fundamental requirements of infrastructure protection<\/a>. Businesses daily are finding that because they&#8217;ve spread their data over such a broad area, the attack vector has staggeringly increased, and <a href=\"https:\/\/nsrd.info\/blog\/2016\/11\/16\/falling-in-love-with-the-irs\/\" target=\"_blank\">hackers are turning that into a&nbsp;profitable business<\/a>.<\/p>\n<p>So returning to&nbsp;one of my first comments &#8230; you might be wondering why in 2017 there&#8217;s a need for a book dedicated to data protection?&nbsp;It&#8217;s simple:&nbsp;the requirement for data protection never goes away, regardless of whose&nbsp;infrastructure you&#8217;re using, or where your data resides.&nbsp;IT is standing on the brink of&nbsp;a significant evolution in how services are offered and consumed,&nbsp;and in so many situations it&#8217;s like a return to the early 90s. &#8220;Oh yeah, we bought a new server for a new project, it&#8217;s gone live. Does anyone know how we back it up?&#8221; It&#8217;s a new&nbsp;generation of IT and business users that need to be educated about data&nbsp;protection.&nbsp;Business is also demanding a return on investment for as much IT spend as possible, and that means data protection also needs to evolve to offer something back to the business other than&nbsp;<em>saving you when the chips are down<\/em>.<\/p>\n<p>That&#8217;s why I&#8217;ve got a new book out about data protection: because the problem has not gone away.&nbsp;IT has&nbsp;evolved, but so has risk.&nbsp;That means data protection technology, data protection processes, and the&nbsp;<em>way<\/em> that we talk about data protection has to evolve as well. Otherwise we, as IT professionals, have failed in our&nbsp;professional duties.<\/p>\n<p>I&#8217;m a passionate believer that we can always find a way to protect&nbsp;data. We think of it as business data, but it&#8217;s also&nbsp;<em>user<\/em> data.&nbsp;<em>Customer<\/em> data. If you work in IT&nbsp;for an airline it&#8217;s not just&nbsp;a flight bookings database you&#8217;re protecting, but the travel&nbsp;plans, the holiday plans, the emergency trips to sick relatives or&nbsp;getting to a meeting on time that you&#8217;re protecting, too. If you work in IT&nbsp;at a university, you&#8217;re not just protecting details that can be used for student billing, but also the future hopes and dreams of every student to pass through.<\/p>\n<p>Let&#8217;s be passionate about data protection together. Let&#8217;s have that conversation with the business and help them understand how data protection doesn&#8217;t go away just because infrastructure it evolving. Let&#8217;s help the business understand that data protection isn&#8217;t a budget sink-hole, but it can improve processes&nbsp;and deliver real returns to the business. Let&#8217;s make sure that data, no matter where it is, is adequately protected and we can avoid that precipice.<\/p>\n<p>&#8220;Data Protection: Ensuring Data Availability&#8221; is available now&nbsp;from the a variety of sellers, including <a href=\"https:\/\/www.crcpress.com\/Data-Protection-Ensuring-Data-Availability\/Guise\/p\/book\/9781482244151\" target=\"_blank\">my publisher<\/a> and <a href=\"https:\/\/www.amazon.com\/Data-Protection-Ensuring-Availability\/dp\/1482244152\/ref=mt_paperback?_encoding=UTF8&amp;me=\" target=\"_blank\">Amazon<\/a>.&nbsp;Come on a&nbsp;journey with me and discover why backup is dead, long live backup.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2008 I published &#8220;Enterprise Systems Backup and Recovery: A corporate insurance policy&#8221;. It dealt pretty much exclusively, as you&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,5],"tags":[282],"class_list":["post-6175","post","type-post","status-publish","format-standard","hentry","category-architecture","category-backup-theory","tag-data-protection"],"aioseo_notices":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/pKpIN-1BB","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/comments?post=6175"}],"version-history":[{"count":3,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6175\/revisions"}],"predecessor-version":[{"id":7395,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/posts\/6175\/revisions\/7395"}],"wp:attachment":[{"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/media?parent=6175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/categories?post=6175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsrd.info\/blog\/wp-json\/wp\/v2\/tags?post=6175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}