Skip to content

Protecting the Availability of Your Data

May 20, 2014

In this four-part blog series, we’ve written about the Confidentiality, Integrity and Availability of your company’s data as the three lynch-pins of corporate IT security.

We’ve already blogged about Confidentiality and Integrity, and in this final installment will address the Availability aspect of network security.

Availability addresses two IT security concerns:

  • That data be available when you and your employees need it;
  • and that the network resources to access and manipulate that data are available when you need them

Availability of Your Data:


As you and your employees go about your business throughout the day, you’ll touch on a wide variety of data types.

In the typical small business, you will need access to your company’s Line of Business application, word processing documents and spreadsheets, email, Internet-based applications, and perhaps accounting, image editing, and other highly specialized data generated by applications specific to your industry.

The inability to access any of those data sources could disrupt your business for at least as long as the data remains unavailable.

Imagine that the important quotes you’re working on are in documents on the server and the server goes down.

How disruptive would it be if you couldn’t send or receive important emails to customers or vendors or access important web sites for research because of bandwidth bottlenecks or the loss of the Internet entirely?

What happens when the Line of Business application’s database becomes corrupted or encrypted by a nasty virus like the Cryptolocker virus that encrypts files and demands a ransom for the decryption key?

How can you prevent or minimize those incidents from becoming disasters?

Availability of Network Resources:

If you can’t access network resources like your server or the Internet because of a failed server hard drive, or a failed router, modem or firewall, the Availability of your data suffers.

What would happen if a natural disaster or a fire destroyed a significant part or all of your business?

What can the typical Sussex County small business do to mitigate the risks and the damage associated with such events?

  • Consider a backup Internet source, such as another ISP or wireless services such as your cell phone provider, for access to Internet-based data, especially email, during on-premise Internet outages
  • If your business relies on the Internet for email, web-based research or Cloud-based applications, ensure that you have enough bandwidth to perform those tasks efficiently
  • Have plans in place to operate while the network resource is down, such as hand-written notes and receipts that can be entered into the system when the network resource becomes available
  • Backups to recover the most recent versions available of your data
  • For the most extreme disasters involving a long-term (more than a couple of days) loss of availability, have a Backup and Disaster Recovery Plan in place to get the business back up and running ASAP rather than trying to plan the recovery after the fact.

We’ve discussed a number of potential risks and mitigation strategies in this four-part series over the past several months.

In our inter-connected world, in which your business relies on that inter-connectivity to access data critical to your operations, the data stored on your firm’s network is more at risk than ever from a wide variety of threats.

More than anything, I hope you’ve gained an understanding of the risks to your data, and your company, and the steps needed to mitigate those risks, that you may not have appreciated before.

No comments yet

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: