IDG Answers is a community of experts who are passionate about technology. Ask a question or answer one below.
First, all of our data is stored on "mirrored" disks. Each time you add or edit your data, it is written to two hard drives, so that if one fails you will never notice as a user.
Second, we periodically copy all data to a third hard drive in order to protect against any problems that might affect the first two.
Lastly, we perform backups to tape each night. These tapes are periodically moved offsite to a secure location. The security of your data is our number-one goal, and we've put a great deal of thought and resources to ensure that we have a completely reliable system.
It’s not just passwords and going after your money, in many cases these hackers are going after the lists of who you know, in order to exact a scam at some time in the future. While it might not seem a threat at first, it is important to recognize that companies often need to keep their vendor list and customer list close to the vest. I’m not sure I would feel safe running my business from a public cloud; the SLA should demonstrate the cloud hosting vendor’s commitment to rectifying issues should there be a security breach.