Personal Technology Contingency Plan With Nearly Every Essay

Total Length: 738 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

Personal Technology Contingency Plan

With nearly every aspect of modern life dependent on electronic devices, there has never been a more important time to have a personal technology contingency plan. Smartphones and their many contacts, applications and customized options often represent hundreds of hours of time invested in getting them configured to a person's specific preferences. Multiply this by the number of devices and laptops that many people are relying on in their lives and to do their jobs, and the impact of losing all this data can readily be seen. It would bring anyone's life to a screeching halt and lead to days of chaos as the information, applications and specific settings were regenerated from memory. Too often human memory and effort is the default technology contingency plan (Young-Jai, 2001).

The most common scenarios that lead to lost data include lost or stolen devices, corrupted data and disk storage on systems, or the application and operating system corruption (Young-Jai, 2001). Large scale disasters including earthquakes, tornados, hurricanes and tornados often destroy tens of thousands of devices and lead to billions of dollars in information assets being destroyed.
While the risk of these larger-scale events are not as great as a device being stolen or failing over time, the common denominator to solve this problem is to have automated backups of personal data to cloud-based storage systems. Over a decade ago Web-based storage systems were considered ideal for contingency plans (Young-Jai, 2001) and today they include advanced authentication and security features (Tang, Lee, Lui, Perlman, 2012). Using a cloud-based platform to create a more device-independent strategy of data protection and backup makes more economic sense than local storage, as cloud-based systems can propagate backup and recovery options across a multiple of personal devices (Tang, Lee, Lui, Perlman, 2012). A personal technology recovery plan needs to be based on a solid foundation of automated backup, data verification and authentication options to get data assets completely independent of their hardware dependencies that are often the downfall of data recovery efforts (Young-Jai, 2001). Focusing on how devices and their data can be backed up transparently and with no added steps can assure both data and configuration options are successfully captured for later….....

Need Help Writing Your Essay?