Data Corruption

Data corruption is the process of data becoming unreadable or invalid. It typically happens to hardware, but software can also cause data corruption. Computer hard drives and external hard drives are susceptible to data corruption, as are solid-state drives (SSDs). While the ways data can become corrupted are numerous, the cause is often related to underlying drives.

How does data corruption happen?

All data is comprised of bits, either 0s or 1s in what is called binary code. When that binary code gets flipped, or mixed improperly, the file no longer opens or functions as it should.e. Sometimes flipping makes the file entirely unreadable by the computer.

Causes of hardware data corruption include:

  • Age
  • External conditions (such as extreme temperature)
  • Internal conditions (an overheated drive)
  • Malicious code, such as viruses that are downloaded onto a computer

Causes of software data corruption include:

  • Anything that happens during rewrite or overwrite operations to a file in a program or application
  • Software updates that don’t mesh well with the previous version of the software
  • Parts of the software that aren’t aware of other modules or errors as they’re being corrected (silos within software error management)

If a computer’s operating system or applications detect that data corruption is imminent, it may be able to reverse that, avoiding the corruption. Computer operating systems have disk monitoring options, such as the Check Disk feature (Chkdsk), but users can also download software that performs monitoring.  RAID (Random Array of Independent Disks) platforms for HDDs could be able to restore or transfer data from a corrupted drive to another drive, such as in a network-attached storage device with multiple drives.

True and final data corruption can be irreversible. Data corruption can be either detected or undetected. Undetected corruption is known as silent data corruption. This means that the computer system or monitoring software doesn’t see it.

Some amount of silent corruption is common in enterprise computer systems. Technology companies such as NetApp have done tests to see how much corruption a detection system can find. Out of 400,000 hard drives, 30,000 had silent corruption that was undetected by the system that was supposed to find it. Silent corruption is dangerous for enterprises, which are responsible for protecting their clients’ important data.

What is the solution to data corruption?

The solution to data corruption is to prevent data loss through backups.

If all data is backed up, when data is corrupted, all is not lost. A good practice for personal computer users is having at least one external hard drive on which their personal computer’s files are also stored. Having those files on a cloud server, such as through iCloud or Google Drive, is another good option. If data is particularly important or sensitive, it’s also good to store it in multiple locations, such as storing through a cloud provider as well as on premises. A good disaster recovery platform can also help users recover data in case of emergency.

 

Jenna Phipps
Jenna Phipps
Jenna Phipps is a writer for Webopedia.com, Enterprise Storage Forum, and CIO Insight. She covers data storage systems and data management, information technology security, and enterprise software solutions.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...