Page 65 - Cyber Warnings
P. 65

Some leading international institutions would issue many research efforts suggesting how this
sort of prevention could be important, but many enterprises, organizations and businesses
would suffer the lack of such a good practice.

The smart procedures would indicate that we should choose to do some backup periodically
depending on our needs and also apply a good data recovery in case of a disaster.

The backuping is nothing else, but recording your confidential data on some devices and
dealing with the installation discs in case you lose your licensed software, program or

The good thing is that the majority of those applications could be found on the web and
downloaded for free, while some of them would seek their serial number in order to get used.

Finally, it’s important to discuss how smart backuping procedures could save your IT
infrastructure. As it’s well-known, the computers are replaceable devices and if they suffer
damage and cannot get repaired – they could get replaced with the new machines.

The point is all their confidential data would previously get backuped on some of the hardware
and they would get recovered on the new computers.

The well-known case from a practice is a thunderstorm when data get lost or corrupted due to a
strong external magnetic field. Also, we would not decrease the significance of possible
hacker’s operations that could make your data being stolen and lately destroyed using some
malware applications.

At the end, we would appeal on the Law Enforcement agencies working over the globe to deal
proactively with these sorts of concerns and suggest some of the best practice getting applied in
their countries. As a consequence – this sort of action would get much safer cyberspace and
less risk form the economical collapses.

About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and.

She writes for American and Asia-Pacific security magazines. She is a volunteer with the
American corner of Subotica as well as a lecturer with the local engineering society.

65 Cyber Warnings E-Magazine – March 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   60   61   62   63   64   65   66   67   68   69   70