Risk analysis

Data loss risk analysis

If you're wondering about the security of your data and whether the data in your organization is safe, it's important to start with an inventory. Before we start planning a backup system, we first need to know what data we have and where it is. It's worth stopping for a moment and doing such a data security analysis once and well, to avoid a situation where our backup system, even though it's working, fails because it will be out of order, incomplete.

What to consider?

All the data we have produced or acquired that will be impossible, difficult or simply time-consuming to restore are worth focusing on for a moment and considering when planning a backup. After entering the name of the data resource, the following fields will begin to appear:

 

  • accounting / warehouse / payroll programs
  • document files, contracts, photos
  • password manager
  • archived data and applications that we no longer use, but which we must keep obliged by law

Data loss risk analysis form

To make it easier to start working on a complete backup system, we have prepared the form below. The data entered into it is not saved anywhere except in your browser. Once completed, you can print it out and save it for later analysis.

1
Data resource Enter a name of the resource, application, data store that is unambiguously understandable to you.
?

1
Data resource Enter a name of the resource, application, data store that is unambiguously understandable to you.
?