The next of the 10 common mistakes that put your data at risk is when your IT security and user access procedures are not monitored or followed.
Many businesses invest a great deal of resources to ensure the security of their primary systems, but they leave their backup systems vulnerable. The same sensitive business information that exists in your primary system is being replicated within your high availability solution. Keeping that information safe requires the same diligent security policies.
In the event that you have to role swap from your primary systems to your backup environment, unsecured data that resides within that backup environment will be vulnerable to all users on that system. Vulnerabilities include unauthorized access to sensitive information and the ability to view and change business-critical information that should be locked down.
Additionally, without proper security measures in place this business data is susceptible to malicious attacks. Skimping on security for your backup environment can be a costly mistake for the business if the wrong person obtains privileged information or if a company breaches compliance mandates for secure data handling.
Check back tomorrow for Mistake #8.