Database

 

Database, know some of the key tips for this management shared by our specialist Carlos Arias, Data Center Services Supervisor at Anida Latam:

Security

Sometimes there are many users with permissions that they should not have, which can intervene in the database and generate inconsistencies. 

TIP

Properly determine which profiles can access the database and with what privileges, in order to avoid this problem.

Installation

In companies, it is common to see errors in the way the database is installed and configured. There are best practices according to the different engines, which companies do not always follow, which then generates problems and requires "a posteriori" a new configuration, causing a lot of unavailability.

TIP

In SQL, the "best practices" recommend installation on different disks depending on the type of data; but many times there are customers who install everything on a single disk, which generates problems that must be solved later with the creation of new disks and migrations.

Space

One of the typical problems that companies complain about when faced with database management is the lack of space. 

TIP

Attention, it is common that this is repeated when using any SQL database, which requires a lot of "tuning" (search for the origin, nature and correction of performance problems), configurations and good parameterization to avoid filling your logs. In Oracle, on the other hand, you have to be very careful with archiving.

Performance

One of the biggest "headaches" that companies have is that their database is slow. In this sense, an expert database administrator can do a thorough follow-up and detect if there are development problems when it comes to scripting or queries (instructive scripts). 

TIP

It is necessary to determine whether, for example, issues such as indexes to be created have been overlooked; to visualize that they do not have a very high cost or generate too much resource consumption, and to intervene, improving and freeing resources to the database.

High availability

There are different ways to manage the high availability of the database, in the cloud and on premise. Many customers do not have this service, so when the engine crashes, they are left without any kind of service. 

TIP

It avoids the loss of service by having a high availability equipment, a contingency database server, so that when the main database fails there is another database ready to be activated.

 

"Finally, a fundamental issue is that, even when the company has an external provider monitoring its database, this does not always guarantee that it will not continue to face crashes. That is why it is so important to define correctly which provider we trust, because although some do solve problems at the time, they do it once they occur because their approach is still reactive", emphasizes the Anida Latam executive. 

In summary, good database management is essential for the success of any company that handles large amounts of information. The implementation of security measures, the regularization of information, the optimization of queries and the automation of processes are some of the tips that can help in this process. In addition, the use of specialized technological tools can simplify the task and reduce errors. By applying these tips, companies can guarantee the integrity and availability of their information and gain competitive advantages in the market.

Database

Database

Cyber incidents caused by the "human factor" are often attributed to occasional employee error, but a more important element is often overlooked: deliberate malicious behavior by staff.

The leak contains user data from LinkedIn, Twitter, Weibo, Tencent and other platforms, is almost certainly the largest ever discovered.

Share on

Related News

Insider Threats: Malicious employees impact corporate cybersecurity

Cyber incidents caused by the "human factor" are often attributed to occasional employee error, but a more important element is often overlooked: deliberate malicious behavior by staff.

26 billion worth of data stolen in what experts call 'The mother of all leaks'

The leak contains user data from LinkedIn, Twitter, Weibo, Tencent and other platforms,
is almost certainly the largest ever discovered.

Effective Recovery: A Response to Cyberattacks

We are nearing the arrival of March, a month that in terms of cybersecurity generated a lot of noise last year when for the first time

Contact us at
close slider