A Microsoft subsidiary (called Danger) and T-Mobile lose thousands of customers data, WITHOUT ability to restore.
Are you Next?
Ask yourself: Do I use an online backup service? Does the backup service have a backup plan of their own?
Subscribers to ‘Danger’ (no pan intended) service stored their data in what is termed as “cloud computing storage”. In one recent example these customers woke up to discover that Microsoft had lost all their data without any chances of recovery. This recent catastrophic data loss event (October 09-Microsoft-T-Mobile Statement) has raised many questions as to the control over the backed up data by the entity who exercises the control.
The ability to backup data online, is a great solution. However, relying solely on that data store could be dangerous for any business. One is not in physical control of that data and depends on the fiduciary duty of a foreign entity. Not all online backup solutions are the same, just like no two companies are the same. Analogy of hamburgers
As a rule companies should have tailored backup solutions that meet their needs and protect them from catastrophic data events.
The Microsoft Blunder- Architecture of a Disaster
Below is the schematic of the data backup architecture
This specific catastrophic data-loss event is very damaging for Microsoft and its plans for similar services in the future. Cnet also wrote about this incident that “threatens to put a dark cloud” over Microsoft’s ambitions. In this event, contrary to common expectations from such an industry leader, Microsoft, failed to have sufficient internal data redundancies for their customer’s data. While conducting maintenance on the data storage they had an undisclosed malfunction that destroyed the entire data storage. Since they did not have any redundancies they had no way of recovering the data. This type of situation is a business’ worst nightmare. In essence, Microsoft’s customers gave Microsoft control over their data and were absolutely dependent on their benevolence.
T-Mobile and Microsoft's (Danger) Official Statement
Other News about the event....
The BlueLight IT Difference
At BlueLight IT we have years of experience in tailoring backup solutions to specific customer needs. Our approach is that each customer is unique, and with their best interest in mind we develop a backup and data recovery solution that best fits their strategic goals and operational needs. A worthwhile backup and recovery solution has to account for different scenarios and organizational needs. Some of the categories we consider are:
- Recovery time objective
- Length of time client can afford to be down
- What are alternative methods of providing services
- Possible costs of system and data recovery (hardware, software, data)
- Cost to benefit ratio of different solutions
- Local and regional disaster types
- Possible points of data loss
- System vulnerabilities (hacking, viruses and malware)
In each scenario BlueLight IT disaster recovery experts study the client needs and develop the best possible solution to fit their budget. Depending on the requirements BlueLight IT can setup 3 levels of redundancy measures to ensure data backup stores are recoverable in the shortest time possible.
BlueLight IT’s 3 Levels of Redundancy
The BlueLIght IT Promise
BlueLight IT is an international firm dedicated to providing the most innovative and business worthy solutions. Our premise is to implement solutions that are robust and provide the peace of mind business owner deserve. All our solutions are well established and follow the best and most up-to-date practices in the industry.
Follow the most successful businesses, call BlueLight IT Today! 561-282-2225
By the way… Does your company use backup tapes? It could cost your company $Millions!