Data Corruption

Data corruption is the process of data becoming unreadable or invalid. It typically happens to hardware, but software can also cause data corruption. Computer hard drives and external hard drives are susceptible to data corruption, as are solid-state drives (SSDs). While the ways data can become corrupted are numerous, the cause is often related to underlying drives.

How does data corruption happen?

All data is comprised of bits, either 0s or 1s in what is called binary code. When that binary code gets flipped, or mixed improperly, the file no longer opens or functions as it should.e. Sometimes flipping makes the file entirely unreadable by the computer.

Causes of hardware data corruption include:

  • Age
  • External conditions (such as extreme temperature)
  • Internal conditions (an overheated drive)
  • Malicious code, such as viruses that are downloaded onto a computer

Causes of software data corruption include:

  • Anything that happens during rewrite or overwrite operations to a file in a program or application
  • Software updates that don’t mesh well with the previous version of the software
  • Parts of the software that aren’t aware of other modules or errors as they’re being corrected (silos within software error management)

If a computer’s operating system or applications detect that data corruption is imminent, it may be able to reverse that, avoiding the corruption. Computer operating systems have disk monitoring options, such as the Check Disk feature (Chkdsk), but users can also download software that performs monitoring.  RAID (Random Array of Independent Disks) platforms for HDDs could be able to restore or transfer data from a corrupted drive to another drive, such as in a network-attached storage device with multiple drives.

True and final data corruption can be irreversible. Data corruption can be either detected or undetected. Undetected corruption is known as silent data corruption. This means that the computer system or monitoring software doesn’t see it.

Some amount of silent corruption is common in enterprise computer systems. Technology companies such as NetApp have done tests to see how much corruption a detection system can find. Out of 400,000 hard drives, 30,000 had silent corruption that was undetected by the system that was supposed to find it. Silent corruption is dangerous for enterprises, which are responsible for protecting their clients’ important data.

What is the solution to data corruption?

The solution to data corruption is to prevent data loss through backups.

If all data is backed up, when data is corrupted, all is not lost. A good practice for personal computer users is having at least one external hard drive on which their personal computer’s files are also stored. Having those files on a cloud server, such as through iCloud or Google Drive, is another good option. If data is particularly important or sensitive, it’s also good to store it in multiple locations, such as storing through a cloud provider as well as on premises. A good disaster recovery platform can also help users recover data in case of emergency.


Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...


An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...


ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...


Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...