Data Corruption

Data corruption is the process of data becoming unreadable or invalid. It typically happens to hardware, but software can also cause data corruption. Computer hard drives and external hard drives are susceptible to data corruption, as are solid-state drives (SSDs). While the ways data can become corrupted are numerous, the cause is often related to underlying drives.

How does data corruption happen?

All data is comprised of bits, either 0s or 1s in what is called binary code. When that binary code gets flipped, or mixed improperly, the file no longer opens or functions as it should.e. Sometimes flipping makes the file entirely unreadable by the computer.

Causes of hardware data corruption include:

  • Age
  • External conditions (such as extreme temperature)
  • Internal conditions (an overheated drive)
  • Malicious code, such as viruses that are downloaded onto a computer

Causes of software data corruption include:

  • Anything that happens during rewrite or overwrite operations to a file in a program or application
  • Software updates that don’t mesh well with the previous version of the software
  • Parts of the software that aren’t aware of other modules or errors as they’re being corrected (silos within software error management)

If a computer’s operating system or applications detect that data corruption is imminent, it may be able to reverse that, avoiding the corruption. Computer operating systems have disk monitoring options, such as the Check Disk feature (Chkdsk), but users can also download software that performs monitoring.  RAID (Random Array of Independent Disks) platforms for HDDs could be able to restore or transfer data from a corrupted drive to another drive, such as in a network-attached storage device with multiple drives.

True and final data corruption can be irreversible. Data corruption can be either detected or undetected. Undetected corruption is known as silent data corruption. This means that the computer system or monitoring software doesn’t see it.

Some amount of silent corruption is common in enterprise computer systems. Technology companies such as NetApp have done tests to see how much corruption a detection system can find. Out of 400,000 hard drives, 30,000 had silent corruption that was undetected by the system that was supposed to find it. Silent corruption is dangerous for enterprises, which are responsible for protecting their clients’ important data.

What is the solution to data corruption?

The solution to data corruption is to prevent data loss through backups.

If all data is backed up, when data is corrupted, all is not lost. A good practice for personal computer users is having at least one external hard drive on which their personal computer’s files are also stored. Having those files on a cloud server, such as through iCloud or Google Drive, is another good option. If data is particularly important or sensitive, it’s also good to store it in multiple locations, such as storing through a cloud provider as well as on premises. A good disaster recovery platform can also help users recover data in case of emergency.

 

Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.

Related Articles

Phishing

What is phishing? Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as...

Photo Editing Software

Photo editing software is used to manipulate or enhance digital images. This category of software ranges from basic apps, which are able to apply...

SOHO Business Solutions: Free Email Marketing Services

Just like big businesses, SOHO (small office/home office) owners can leverage email marketing systems to communicate with customers, partners and employees. Just like big businesses,...

Fintech

Fintech, also known as "financial technology," is a term used to describe companies that use innovative technology to create more efficient, transparent, and cost-effective...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...