A LOOK AT DATA STORAGE

We live in a data-centric world; we’re all saving photos, music, videos, contact details, and personal and business documents on storage devices that range from itty bitty flash drives to mega terabyte hard drives. Even the cloud comes into the picture.

For most of us, a USB will fulfil our personal data storage needs. But it’s not as simple as you might think. If you really want to get into it, there are three types of USBs to choose from.

 

1. Single layer cell (SLC)

SLC flash drives save one bit of data per cell. This results in greater cell endurance, faster transfer speeds and lower power consumption than other flash drives. A drawback is that SLC flash drives are more expensive than other types.

2. Multi-layer cell (MLC)

With MLC flash drives two bits of data is stored in a single cell, meaning that it can store double the amount of data as an SLC drive. The drawbacks are that the cells aren’t as durable as SLC cells, the transfer speeds are slower and they are more power hungry. However, they are cheaper than SLCs.

3. Triple layer cell (TLC)

TLC flash drives store three bits of data on a single cell. This means that their endurance is lower and their transfer speeds are even slower than that of MLC drives. There is also a greater chance of them failing than both the SLC and MLC flash drives. As a result TLCs are the cheapest type of flash drives available.

What about those of us who need lots of storage, like 10 terabytes or more? Well, then RAID is the way to go.

What is RAID?

RAID stands for Redundant Array of Independent Disks. Very basically, what it does is take a number of hard drives and connect them in such a way that they act as a single drive, so that there are extra copies of data in case some is lost. The three main types of RAIDare RAID 0, RAID 1 and RAID 5.

 

RAID 0

RAID 0 should not be used for any critical system as a fraction of the file is written over multiple disks, which means that if one drive fails the whole array is lost. Benefits are faster read/write times.

RAID 1

RAID 1 can be used for a critical system because if one disk fails, you have another to replace it with. This is because it works by mirroring data on redundant disks. As a result, you don’t get as much storage space as you would with RAID 0, but at least you have peace of mind.

RAID 5

In the case of RAID 5, if one drive fails the rest do not, although they run at a slowed rate. Also, if one drive fails you can use the information on the active drives to recover the data you lost.

It must be noted that RAID Recovery is considered the most complex form of data recovery, which is why you should only ever take your RAID problems to fully qualified and reputable data recovery experts. Take the time to investigate the companies operating in your area. Don’t be put off by small-scale operations, but don’t dismiss international specialists that have branches as far afield as Brisbane, Italy and Los Angeles, either.

 

INSPECT YOUR GADGETS

We have all become accustomed to mobile gadgets like iPads, iPhones, iPod-touches, and the list goes on.  They have been integrated seemingly seamlessly into our lives.

But there are some gadgets that don’t slot into your lives quite so easily that maybe you haven’t thought of yet.  It is up to you to decide whether you could imagine living without these gadgets after learning about them.

Here are few:

The Magic Wand Remote

If you’re bored using your old television remote, why not replace it with the long, thin, tubular, magic wand remote?  Change the channel with flicks of your wrist, and with big sweeping moves of your arm you can record your favourite TV show.  Fantastic.

Video Recording Spy Watch

Concealed inside this watch is 1GB of flash memory attached to a microphone. The microphone is well placed so that you can clearly record while the watch is still on your wrist. This makes it very easy to sneakily record conversations without raising suspicion.

It comes with a set of head phones allowing you to listen to your recording immediately afterwards, and the watch will also act as an MP3 player. This allows you to take your favourite tunes with you and keep you entertained while you’re on the move or in a boring lecture.  Who needs to tell the time?

Meade MySky Star and Planet Identifier

If you’re clueless about the night sky, don’t let it bother you any longer.  This gadget looks like a science-fiction ray gun, but the only thing it fires is knowledge.  It helps you to identify and learn about the stars and planets and can take you on a guided audio and visual tour where it can highlight the best bits based on the current time and your location.  It has full-color LCD that won’t obstruct your view of the night sky.  Wonderful.

Self-Stirring Lazy Mug

This mug holds your tea, coffee, hot chocolate or other mixed drink, and all you need to do is push a special button on the handle and it starts to stir your drink.  Who needs a spoon?  Think of all the time you’ll save.

Thanks to the very innovative people with plenty of time on their hands to invent gadgets like these, there are loads of them to choose from.

Before you have decided which ones you need in your life, there will already be another five hundred new ones available.  Isn’t it nice to be spoilt for choice?

DATA PROTECTION IS JUST AS IMPORTANT OFFLINE AS ON

How much of yourself do you share with the world? Do you take pains to keep your really personal information offline because you never know who’s watching? What if that’s not enough?

You can invent convoluted passwords to stymie hackers, you can install the latest firewalls and antivirus software, you can keep your email address and phone numbers off social networks. But, you can’t do anything about banks whose systems are hacked or about your friends who accidentally reveal a personal identifier online.

That doesn’t mean you should give it all up and give the world you PIN number and the password to your cheque account.

 

Protect your data

These days, people are very concerned about protecting their data online. They worry about hackers and viruses, and about search engines and marketers collecting, using and selling information about their search patterns.

And they are right to worry (although there is a line between appropriate concern and paranoia). But they shouldn’t forget about all the data that is available offline.

Ask yourself, what do you do with old bank statements – the really old ones? Do you run them through the shredder, cut them up into itty bitty pieces or just chuck them in the recycling bin? Your bank statements contain a wealth of personal information that cunning criminals can use to unravel all the details of your life and steal your entire identity, let alone all you money.

What you do with old utility bills? What do you do with those annoying letters that tell you’ve been pre-approved for store card at a store you’ve never been in?

If a department store can get your details, you can bet that a recreational hacker can do it quicker.

 

What else should you consider?

Where do you store your hard copies? Do you stuff them in a drawer, do you have a concertina file in the back of a cupboard, do you have an unlocked filing cabinet, or do you have a safe?

A thief with a particular goal in mind won’t find it too difficult to find your details if you keep documents in all the usual places. The least you can do is make it as difficult as possible to get hold of the information. Put locks on your filing cabinet. Buy a safe. Don’t keep documents in your sock drawer.

How much of your data is stored on your mobile phone? Is it secure enough that it won’t pose any risk if the phone is stolen? Mobile phones get stolen all the time. Sometimes they’re scrubbed clean before they find new owners. Sometimes curious thieves dig around before discarding unimportant information, but they might keep some stuff – like the pictures of your kids at the easily identifiable park that you frequent.

All your contacts, your texts and all your pictures, even your apps are data gold mines for someone of a certain bent.

That’s why there are data protection apps available, and why you should always have a password to access your phone. It’s also why you need to encrypt all the data you can, especially on your desktop and laptop.

You’re never going to make your data 100% safe. But many people are deterred if they have to work too hard to get what they want. So make criminals jump through fiery hoops, so that at least they have to earn your data – before your tracking system nails them, that is.

PROS AND CONS OF EXTERNAL HARD DRIVES

The rising demand for hard drive space

In 1980, the first gigabyte hard drive arrived. It was almost as big as a fridge, but it so many megabytes; more megabytes then anyone could ever need, right?

As time went by, people realized that there is no such thing as enough megabytes. Then they realized that you could never have enough gigabytes. And finally, it got to the point where the mythical terabyte became the standard unit of storage.

That’s the way it is with hard drive space. What’s considered too much now will be the standard in every computer in a few years, and scoffed at a few years later.

Multimedia and social media, all the video and image files people store on their computers and upload to social media sites, all contributing to the rising demand for data storage. Facebook alone processes about 500 Terabytes worth of data per day, while 72 hours’ worth of video footage is uploaded to YouTube every minute.

 

External hard drives: More portability for less reliability?

The space requirements of data are higher and so is its value, whether it is photos of a fondly remembered trip or important business data. The prevalence of viruses and hacking means people not only need additional storage space, but a means to backup all this information and protect it from threats. This is why external hard drives have become one of the fastest-growing data storage mediums.

They provide additional storage space that can be installed without having to open the computer case. It’s just a simple matter of plugging it in, usually via USB cable, and hundreds of additional gigabytes are yours to deploy. When it comes to protecting that data from online threats, it’s just a simple matter of unplugging the same cable, unlike internal hard drives which are accessible for as long as the computer is on.

Furthermore, external hard drives provide extra storage that is also portable. You may not be able to carry them around in your pocket as easily as USBs, but the far superior storage capacity more than makes up for the inferior portability.

For all their benefits, external hard drives are not the most reliable of devices. Internal hard drives are quite prone to failure as is, and external drives don’t even have the benefit of being close to the computer fans, which means that there is no cooling mechanism to protect them from excess heat.

What’s more, being positioned outside the case means they’re more exposed to the elements, and to the threat of physical trauma, especially when cables are unwisely left to trail in places where they can easily be caught on someone’s foot.

Data should only be considered “backed up” if it’s contained on an internal drive as well as an external drive. On the plus side, the portability of external hard drives makes it easier to transport them to a data recovery center should they fail.

THE DANGER THAT LURKS IN YOUR PRINTER

Are you aware of the danger that lurks in your business’s copier? These days, copiers and printers come with internal hard drives, and these are often forgotten when it comes to ensuring data security. Basically, every document copied and printed is stored on the hard drive, which is a major problem for businesses which regularly print and copy highly sensitive data.

Think about a bank; every time you pop in to do a transaction, like a cash transfer, or pick up a new card, your ID is photocopied. Every document you have to sign is photocopied. Your account details and personal information are stored, along with those of every other client, and they are easy pickings for identity thieves.

Think about police stations, which copy and print highly sensitive data regarding criminal cases. Think of the damage that data can do if it ends up in the wrong hands, or even in the public domain.

 

What can you do to protect yourself?

There’s not a lot you can do about the data stored in your bank’s copier (beyond asking them about their security measures and suggesting that they look into solutions), but you can protect your business’s data.

  • You can purchase data security kits, which encrypt data stored on the hard drive, as well as data stored on dynamic random-access memory (DRAM). Data is cleared and overwritten regularly.
  • Degaussing is recommended if you have no intention of using the drive again, or of selling it (VSSP). This entails running data through a magnetic field, which is supposed to completely remove all traces of data.
  • You can use overwrite software, which doesn’t render the drive inoperable. Look for software that provides a report on the erasure process (whether it was successfully completed or whether errors occurred).
  • Physically destroying the drive by disintegration, incineration, melting, and chemical treatment. However, this is not always entirely successful as skilled data recovery experts can often recover data from severely physically damaged drives.
  • Don’t forget that multifunction devices are plugged into your network, which makes them vulnerable to viruses, worms and malware. So, you need to include them in your network security measures (Larry Kovnat (Forbes.com).

The danger of hard drives in copiers and printers was first reported by CBS in 2010. Since then, not a lot more people have become aware of the risk. The result is that a lot of confidential data still finds ends up where it shouldn’t when old devices are sold or recycled. It’s not just up to manufacturers to ensure that their customers are aware of the danger that lurks in their machines (although they have a very important role to play). Consumers should also properly research equipment before they sign any cheques, so that they know exactly what they are getting.