<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Data Strategy Archives - The SERO Group</title>
	<atom:link href="https://theserogroup.com/category/data-strategy/feed/" rel="self" type="application/rss+xml" />
	<link>https://theserogroup.com/category/data-strategy/</link>
	<description>SQL Servers Healthy, Secure, And Reliable</description>
	<lastBuildDate>Mon, 03 Nov 2025 17:06:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>

<image>
	<url>https://theserogroup.com/wp-content/uploads/2024/07/cropped-Canister-only-1-32x32.png</url>
	<title>Data Strategy Archives - The SERO Group</title>
	<link>https://theserogroup.com/category/data-strategy/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">121220030</site>	<item>
		<title>SQL Server Maturity Curve: How Banks Move from Reactive Risk to Strategic Advantage</title>
		<link>https://theserogroup.com/data-strategy/sql-server-maturity-curve-how-banks-move-from-reactive-risk-to-strategic-advantage/</link>
		
		<dc:creator><![CDATA[Joe Webb]]></dc:creator>
		<pubDate>Wed, 29 Oct 2025 12:00:56 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[Database Development]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Assessment]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Consultant]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consultant]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=7600</guid>

					<description><![CDATA[<p>When I talk with companies, whether they be community banks or healthcare companies, about their SQL Server environments, I find that most aren’t intentionally and proactively managing their SQL Server environment&#8211;they’re reacting to it. Things run fine until they don’t. Then, suddenly, IT teams are dealing with performance issues, failed backups, or questions from auditors&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/sql-server-maturity-curve-how-banks-move-from-reactive-risk-to-strategic-advantage/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/sql-server-maturity-curve-how-banks-move-from-reactive-risk-to-strategic-advantage/">SQL Server Maturity Curve: How Banks Move from Reactive Risk to Strategic Advantage</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>When I talk with companies, whether they be community banks or healthcare companies, about their SQL Server environments, I find that most aren’t intentionally and proactively managing their SQL Server environment&#8211;they’re reacting to it. Things run fine until they don’t. Then, suddenly, IT teams are dealing with performance issues, failed backups, or questions from auditors that need answers.</p>



<p>A reactive approach may get you through the day, but it doesn’t build long-term stability, security, or confidence.</p>



<h3 class="wp-block-heading" id="h-what-is-the-sql-server-maturity-curve">What is the SQL Server Maturity Curve?</h3>



<p>Over the years, we’ve found that every SQL Server environment naturally falls somewhere along a <strong>maturity curve</strong>. Understanding where your SQL Server environment is today and where you want it to be helps you move from firefighting to foresight. SQL Server maturity can be best understood in four stages: <strong>reactive, managed, optimized, and strategic.</strong></p>



<figure class="wp-block-image size-large"><a href="https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve.png"><img fetchpriority="high" decoding="async" width="1024" height="614" src="https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve-1024x614.png" alt="The SQL Server Maturity Curve" class="wp-image-7602" srcset="https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve-1024x614.png 1024w, https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve-300x180.png 300w, https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve-768x461.png 768w, https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve-1536x922.png 1536w, https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve-1800x1080.png 1800w, https://theserogroup.com/wp-content/uploads/2025/10/sql_server_maturity_curve.png 2000w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p>Let&#8217;s look at each stage.</p>



<h4 class="wp-block-heading" id="h-1-reactive-firefighting"><strong>1. Reactive: Firefighting</strong></h4>



<p>At the lowest level of maturity, we have what we call the <strong>reactive stage</strong>. This is where SQL Server environments are managed more in a ‘break/fix’ mode. Something goes wrong—an outage, a performance issue, maybe even a regulatory problem—and the team jumps in to fix it. Since the problem usually catches them by surprise, they then have to spend time figuring out how to address the issue before they can start to fix it. </p>



<p>Banks in this stage tend to rely heavily on manual processes and have very little automation in place. There might be some monitoring, but it’s often not tailored to SQL Server and effectively too generic (maybe something like SolarWinds Orion). So, leaders don’t have a clear picture of what’s healthy, what’s risky, or what’s about to break.</p>



<p>A second indicator for this stage is an environment where no one person is truly accountable for SQL Server. It’s a shared responsibility, which really means no one’s watching it closely. It’s just one of many systems all lumped in together. In these environments, small problems slip through the cracks until they turn into something big.</p>



<p>A third indication is the assumption that the vendor or core provider is handling all necessary SQL Server maintenance. In reality, they’re not watching it nearly as closely as the bank thinks they are.</p>



<p>From a business standpoint, this leads to high operational costs, more regulatory findings, and frustrated employees and customers when things go down.</p>



<p>Most of the SQL-related budget at this stage goes toward putting out fires instead of preventing them. Unfortunately, this is still where a lot of community banks find themselves today—operating in a reactive state, vulnerable to risk, and always one incident away from disruption.</p>



<h4 class="wp-block-heading"><strong>2. Managed: Gaining Control</strong></h4>



<p>The next stage up in the curve is the <strong>managed stage</strong>. In this stage banks start putting some structure in place.</p>



<p>Backups are running consistently. And I know what you might be thinking: ‘Of course they are.’ But you’d be surprised how often we hear that, only to find something very different once we dig in during an SQL Health Check.</p>



<p>Monitoring is usually turned on so the team gets alerted before things get out of hand, and patching is scheduled instead of done haphazardly.</p>



<p>You’ve probably heard the phrase people, processes, and technology. At this stage, banks are making solid progress on two of those: processes and technology. And there’s usually someone in IT who’s been given responsibility for SQL Server, though it’s often just one of the many things they take care of.</p>



<p>But the results are noticeable. Incidents are happening less often, performance is steadier, and compliance is easier to manage. There’s even some separation of duties starting to take shape.</p>



<p>Here, most of the SQL-related budget is still going toward maintenance, but now, instead of pure firefighting, a little bit of that time and money is shifting toward planning and improvement.</p>



<p>So the managed stage is a big step forward. Things are more stable, there are fewer surprises, and the environment is definitely safer. But it’s still not efficient—and it’s not yet resilient. That’s usually when the question shifts from ‘Are we stable?’ to ‘How can we do this better?’</p>



<h4 class="wp-block-heading"><strong>3. Optimized: Running Proactively</strong></h4>



<p>Third is the <strong>optimized stage</strong>; things start to look and feel different. We’re no longer spending most of our time just keeping the lights on; the focus shifts from maintenance to <em>efficiency</em>.</p>



<p>Routine tasks like backups and testing the backups, patching, and monitoring are automated and standardized across the SQL Server environment. The team’s not reinventing the wheel on every server anymore. Builds are standardized and perhaps even automated.</p>



<p>Performance is managed <em>proactively</em>—indexes, queries, and resource usage are being reviewed on a regular basis. The bank finally has real visibility into capacity, performance trends, and risks over time.</p>



<p>And all that optimization pays off literally.</p>



<p>At this stage, banks start saving real money. They’re doing proactive performance tuning, right-sizing their environments, and consolidating where it makes sense. That means fewer servers, lower licensing costs, and less wasted hardware.</p>



<p>We worked with one client who was able to save about $2,000 a month—$24,000 a year—on just one of their Azure SQL Servers, simply by tuning and optimizing the setup.</p>



<p>And another bank we work with was able to cut their SQL footprint in half through consolidation and decommissioning efforts. That saves on licensing costs, management costs, etc.</p>



<p>But it’s not <em>just</em> about cost savings. This is also where security gets stronger. Misconfigurations get closed off, permissions are tightened, and the environment starts aligning with best practices like the CIS benchmarks and the principle of least privilege.</p>



<p>The payoff is easy to see. Customers experience faster, more reliable systems. Inside the bank, IT teams aren’t scrambling to fix the latest outage—they’re staying ahead of it. They identify and resolve issues before they impact operations or audits. SQL Server becomes a reliable foundation that actively supports business goals.</p>



<h4 class="wp-block-heading" id="h-4-strategic-turning-data-into-advantag-e"><strong>4. Strategic: Turning Data into Advantag</strong>e</h4>



<p>In the final stage, the <strong>strategic stage</strong>, SQL Server isn’t just stable or secure; it’s <em>resilient by design.</em></p>



<p>High availability is built in. Disaster recovery plans aren’t just written; they’re tested and refined. Security is strong and consistent across the environment, and compliance isn’t something the team scrambles to prove once a year; it’s woven into daily operation.</p>



<p>Auditing and monitoring tools are in place. There’s clear separation of duties. And reporting infrastructure is mature enough to shift workloads where they make the most sense.</p>



<p>But what really sets this stage apart is how <strong>SQL Server starts to enable the business.</strong></p>



<p>At this point, it’s not just about avoiding risk; it’s about driving strategy.</p>



<p>Data becomes a competitive advantage. Executives have access to real-time insights through analytics and reporting. They can spot trends, understand customer behavior, and make better decisions—faster.</p>



<p>And IT? It’s no longer seen as a cost center. It’s a business enabler—helping drive efficiency, innovation, and growth.</p>



<h3 class="wp-block-heading"><strong>Moving Up the Curve</strong></h3>



<p>Wherever your institution is today, the goal isn’t perfection overnight. It’s steady progress. Moving even one stage up the maturity curve can dramatically reduce risk, improve audit readiness, and free up your team to focus on higher-value initiatives.</p>



<p>The key is to be intentional, to assess, document, and continually refine your SQL Server management practices.</p>



<p>Because in business, in banking, and in healthcare, SQL Server maturity isn’t just an IT milestone; it’s a business advantage.</p>



<h3 class="wp-block-heading" id="h-further-resources"><strong>Further Resources</strong></h3>



<ul class="wp-block-list">
<li>Curious where your environment stands today? We’ve created a short <strong><a href="https://40117694.fs1.hubspotusercontent-na1.net/hubfs/40117694/SERO_SQL_Server_Maturity_Checklist.pdf">SQL Server Maturity Checklist</a></strong> to help you identify which stage your organization is in and where to focus next. It’s a quick, practical way to assess your current practices and start planning your path forward. <a href="https://40117694.fs1.hubspotusercontent-na1.net/hubfs/40117694/SERO_SQL_Server_Maturity_Checklist.pdf" target="_blank" rel="noreferrer noopener">Download the SQL Server Maturity Checklist</a> to see where you stand and how to move from risk to advantage.</li>
</ul>



<ul class="wp-block-list">
<li>For a deeper dive on this subject, you can watch our <a href="https://youtu.be/ml12K6kWMaY"><strong>free, on-demand webinar, “Navigating the SQL Server Maturity Curve,”</strong></a> on YouTube.</li>
</ul>



<h3 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to work with The SERO Group?</h3>



<p>If your SQL Server environment feels more reactive than strategic, or if you’re ready to strengthen reliability, improve security, and become more audit-ready, we can help.</p>



<p>We specialize in helping institutions move up the SQL Server maturity curve with proven processes and a proactive approach. Let’s start a conversation about where you are today and where you want to be. <a href="https://theserogroup.com/contact-us/" target="_blank" rel="noreferrer noopener">Schedule a brief call</a> with us today. </p>
<p>The post <a href="https://theserogroup.com/data-strategy/sql-server-maturity-curve-how-banks-move-from-reactive-risk-to-strategic-advantage/">SQL Server Maturity Curve: How Banks Move from Reactive Risk to Strategic Advantage</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7600</post-id>	</item>
		<item>
		<title>How Proper Database Design Improves SQL Server Performance and Scalability</title>
		<link>https://theserogroup.com/data-strategy/how-proper-database-design-improves-sql-server-performance-and-scalability/</link>
		
		<dc:creator><![CDATA[Eric Cobb]]></dc:creator>
		<pubDate>Wed, 29 Jan 2025 13:00:00 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[Database Development]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=6993</guid>

					<description><![CDATA[<p>When a SQL Server database is the backbone of your application, its design will have a huge impact on the application&#8217;s performance. While many developers just view the database as a container for storing data, the truth is that a well-designed database is critical to your application’s speed, reliability, and ability to scale with your&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/how-proper-database-design-improves-sql-server-performance-and-scalability/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/how-proper-database-design-improves-sql-server-performance-and-scalability/">How Proper Database Design Improves SQL Server Performance and Scalability</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>When a SQL Server database is the backbone of your application, its design will have a huge impact on the application&#8217;s performance. While many developers just view the database as a container for storing data, the truth is that a well-designed database is critical to your application’s speed, reliability, and ability to scale with your business needs. A poorly designed database can quickly become a bottleneck, leading to performance issues and costly overhauls.</p>



<p>Here are a few of the ways your database design can impact your application’s success:</p>



<h3 class="wp-block-heading" id="h-faster-data-retrieval">Faster Data Retrieval</h3>



<p>A well-designed database makes it easier and faster to find the data your application needs. For example, properly structuring your tables and relationships and having good indexes in place allows SQL Server to quickly locate the right information in your database.</p>



<p>Without these optimizations, your database has to do more work, leading to slower response times. Over time, as your database grows, these delays can pile up, frustrating users and affecting your app’s overall performance.</p>



<h3 class="wp-block-heading" id="h-structured-for-future-growth">Structured for Future Growth</h3>



<p>Applications often start small but grow in complexity and size over time. A good database design prepares your application to handle increasing data volumes and user loads. For example, splitting a large table into smaller partitions based on date ranges or geographical regions helps ensure queries are faster because they only have to search the relevant data.</p>



<p>As your app attracts more users, it will face increased demand for data access and processing, and your database needs to be able to handle this pressure. Techniques like indexing, query optimization, and using appropriate isolation levels play a big role in maintaining performance under heavy loads.  And strategies like row-level locking or read replicas can ensure that high traffic doesn’t impact the user experience.</p>



<p>If these types of strategies aren’t considered during the design phase, you might face significant challenges as your application tries to scale.</p>



<h3 class="wp-block-heading" id="h-more-efficient-resource-utilization">More Efficient Resource Utilization</h3>



<p>Good database design ensures that your application uses system resources like CPU, memory, and storage as effectively as possible. This means your app can perform well even with limited or less expensive hardware, saving money and avoiding unnecessary upgrades.</p>



<p>For example, choosing the right data types for your data columns can reduce storage requirements and speed up processing. And indexing, when done correctly, significantly improves the read performance of your queries and can cut down on memory and CPU usage, while missing indexes can slow down your entire application.</p>



<h3 class="wp-block-heading" id="h-in-conclusion-sql-server-database-design-matters">In Conclusion: SQL Server Database Design Matters</h3>



<p>Taking the time to plan your database properly can save you headaches down the road and ensure your application is fast, reliable, and ready for anything.</p>



<h3 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to Work With The SERO Group?</h3>



<p>Want to learn more about how The SERO Group helps organizations take the guesswork out of managing their SQL Servers? <a href="https://theserogroup.com/contact-us/" target="_blank" rel="noreferrer noopener">Schedule a no-obligation discovery call</a>&nbsp;with us to get started.</p>
<p>The post <a href="https://theserogroup.com/data-strategy/how-proper-database-design-improves-sql-server-performance-and-scalability/">How Proper Database Design Improves SQL Server Performance and Scalability</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6993</post-id>	</item>
		<item>
		<title>How to Encrypt Sensitive Text in SQL Server with ENCRYPTBYPASSPHRASE</title>
		<link>https://theserogroup.com/data-security/how-to-encrypt-sensitive-text-in-sql-server-with-encryptbypassphrase/</link>
		
		<dc:creator><![CDATA[Eric Cobb]]></dc:creator>
		<pubDate>Wed, 23 Oct 2024 12:00:00 +0000</pubDate>
				<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[DBA]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[Database Development]]></category>
		<category><![CDATA[Script Library]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Security]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=6786</guid>

					<description><![CDATA[<p>Storing sensitive information in a database, like passwords or social security numbers, is common practice. However, storing them securely is less common. Unfortunately, one of the most typical approaches is to store sensitive information in a table as clear text. That means that anyone with access to that table can see all of that sensitive&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-security/how-to-encrypt-sensitive-text-in-sql-server-with-encryptbypassphrase/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-security/how-to-encrypt-sensitive-text-in-sql-server-with-encryptbypassphrase/">How to Encrypt Sensitive Text in SQL Server with ENCRYPTBYPASSPHRASE</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Storing sensitive information in a database, like passwords or social security numbers, is common practice. However, storing them securely is less common. Unfortunately, one of the most typical approaches is to store sensitive information in a table as clear text. That means that anyone with access to that table can see all of that sensitive data.</p>



<p>Just to be clear, storing sensitive information as a clear text string is a really, really,&nbsp;<em>really</em>&nbsp;bad idea.</p>



<p>Not encrypting information in a database can cause serious problems. As just one example, if the database is compromised, all user passwords could be exposed. Data breaches are becoming more and more common. If the authorities come knocking on your door, you need to be able to show them that you at least made a concerned effort to protect that data.</p>



<h2 class="wp-block-heading" id="h-encrypting-text-that-will-need-to-be-decrypted">Encrypting text that will need to be decrypted</h2>



<p>In some cases, you may be able to store your sensitive data as strongly encrypted text that will never need to be decrypted. For example, hashing a password used for your application login and then just comparing the hashed password for the login instead of the actual password. But, in most cases, being able to decrypt the sensitive data is going to be necessary.</p>



<p>In these cases,  <a href="https://docs.microsoft.com/en-us/sql/t-sql/functions/encryptbypassphrase-transact-sql" target="_blank" rel="noreferrer noopener">ENCRYPTBYPASSPHRASE</a> (available in SQL Server 2008 and up) offers one of the simplest ways for you to encrypt sensitive information in a way that can also be decrypted (by using <a href="https://docs.microsoft.com/en-us/sql/t-sql/functions/decryptbypassphrase-transact-sql" target="_blank" rel="noreferrer noopener">DECRYPTBYPASSPHRASE</a>). At its very basic, ENCRYPTBYPASSPHRASE requires two mandatory arguments: a passphrase used to generate the encryption key and the text to be encrypted.  Notice that it specifies a pass<strong><em>phrase</em></strong>, not pass<strong><em>word</em></strong>. There is an important difference between these two.</p>



<h2 class="wp-block-heading" id="h-a-passphrase-vs-a-password">A passphrase vs. a password</h2>



<p>As described in the ENCRYPTBYPASSPHRASE documentation:&nbsp;</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><em>A passphrase is a password that includes spaces. The advantage of using a passphrase is that it is easier to remember a meaningful phrase or sentence than to remember a comparably long string of characters.</em></p>
</blockquote>
</blockquote>



<p>Many people don’t realize that you can use a space as a legitimate special character in most passwords. By doing this, you can generate a much more secure password sentence (or phrase) instead of a single word. An example of a passphrase may be something like “I forgot my password!”</p>



<p>Just to be clear, a space is <strong><em>not </em></strong>required in your passphrase for ENCRYPTBYPASSPHRASE. If you wanted to use a GUID for your passphrase or a random string such as “Zgt9$Ex%*unZO8Z},” that is perfectly acceptable.</p>



<h2 class="wp-block-heading" id="h-using-nbsp-encryptbypassphrase">Using&nbsp;ENCRYPTBYPASSPHRASE</h2>



<p>For the examples in this post, I am going to use the encryption passphrase “This is my Passphrase!”, and the text to be encrypted is “ABC123”.</p>



<p>The basic syntax is:<br>ENCRYPTBYPASSPHRASE(‘encryption passphrase’, ‘text to encrypt’)</p>



<p>There are other arguments that can be used with&nbsp;ENCRYPTBYPASSPHRASE (see&nbsp;<a href="https://docs.microsoft.com/en-us/sql/t-sql/functions/encryptbypassphrase-transact-sql" target="_blank" rel="noreferrer noopener">MSDN Doc</a>), but for this simple example we are just using the&nbsp;two mandatory arguments.</p>



<p>To view the encrypted value of the text “ABC123”, you would use this script:</p>



<pre class="wp-block-code"><code>SELECT ENCRYPTBYPASSPHRASE(N'This is my Passphrase!', N'ABC123');</code></pre>



<p>That SELECT statement will return a&nbsp;VARBINARY value such as:&nbsp;<em>0x0100000093EEC20B790EF208B1FB631F0AB3028E3A8C196643C4BD578528A0DFAE7AB45B</em></p>



<p>It is important to note that the VARBINARY value returned from ENCRYPTBYPASSPHRASE is <a href="https://en.wikipedia.org/wiki/Nondeterministic_algorithm" target="_blank" rel="noreferrer noopener">nondeterministic</a>, meaning that even with the same input it will not generate the same output every time.  So you can run the exact same SELECT statement multiple times and get a different result each time.</p>



<p>Thankfully, this output has no bearing on using the DECRYPTBYPASSPHRASE function. As long as you have the correct passphrase, DECRYPTBYPASSPHRASE will successfully decrypt any of those VARBINARY results to their original value.</p>



<h2 class="wp-block-heading" id="h-storing-an-encrypted-value-in-a-table">Storing an encrypted value in a table</h2>



<p>Now that we know how to encrypt a sensitive text string, let’s take a look at how to store that encrypted value in a table. &nbsp;Since the value returned from&nbsp;ENCRYPTBYPASSPHRASE is a&nbsp;VARBINARY data type, that is how we want to store it since this is also the data type required by DECRYPTBYPASSPHRASE.</p>



<p>The first thing we need to do is determine the size of our encrypted column in our table. The VARBINARY values returned by ENCRYPTBYPASSPHRASE can vary in size, with maximum size of 8,000 bytes. The size of the returned value is going to depend on the size of the actual text being encrypted. You can use the <a href="https://docs.microsoft.com/en-us/sql/t-sql/functions/datalength-transact-sql" target="_blank" rel="noreferrer noopener">DATALENGTH</a> function to help figure that out. If you have a way to control the maximum allowed length of the sensitive text value you want to encrypt, use that size for your table column, but try not to use VARBINARY(8000) if you don’t have to.</p>



<p>Here is a simple example of storing our encrypted text in the [Password] column of a table:</p>



<pre class="wp-block-code"><code>CREATE TABLE dbo.Users (&#91;UserName] VARCHAR(50), &#91;Password] VARBINARY(50))
 
INSERT INTO dbo.Users (&#91;UserName], &#91;Password])
VALUES ('Charlie Brown', ENCRYPTBYPASSPHRASE(N'This is my Passphrase!', N'ABC123'))
 
SELECT &#91;UserName], &#91;Password]
FROM dbo.Users</code></pre>



<h2 class="wp-block-heading" id="h-using-decryptbypassphrase">Using DECRYPTBYPASSPHRASE</h2>



<p>Now that we have our sensitive text encrypted, we need to be able to decrypt it as well. &nbsp;This is easily done by using the&nbsp;DECRYPTBYPASSPHRASE function with the same passphrase we encrypted our text string with. However, DECRYPTBYPASSPHRASE also returns a VARBINARY value, which we will have to convert to a string. &nbsp;This can be done by adding a CONVERT function to our SELECT statement.</p>



<pre class="wp-block-code"><code>SELECT &#91;UserName], CONVERT(NVARCHAR, DECRYPTBYPASSPHRASE(N'This is my Passphrase!', &#91;Password]))
FROM dbo.Users</code></pre>



<p>Now you should see your decrypted value returned correctly in clear text. ENCRYPTBYPASSPHRASE offers a quick and easy way for you to encrypt text in SQL Server and can be useful for encrypting sensitive information if you need to be able to decrypt it later. </p>



<h2 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to work with The SERO Group?</h2>



<p>Want to learn more about how The SERO Group helps organizations take the guesswork out of managing their SQL Servers? <a href="https://theserogroup.com/contact-us/" target="_blank" rel="noreferrer noopener">Schedule a no-obligation discovery call</a>&nbsp;with us to get started.</p>
<p>The post <a href="https://theserogroup.com/data-security/how-to-encrypt-sensitive-text-in-sql-server-with-encryptbypassphrase/">How to Encrypt Sensitive Text in SQL Server with ENCRYPTBYPASSPHRASE</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6786</post-id>	</item>
		<item>
		<title>What’s in a Job Title? Understanding Changing Data Roles</title>
		<link>https://theserogroup.com/data-strategy/different-data-roles/</link>
		
		<dc:creator><![CDATA[Natasha Collins]]></dc:creator>
		<pubDate>Wed, 31 Jul 2024 12:00:00 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[IT Manager]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[Sero]]></category>
		<category><![CDATA[Sero Group]]></category>
		<category><![CDATA[Serogroup]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Training]]></category>
		<category><![CDATA[The Sero Group]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=6350</guid>

					<description><![CDATA[<p>The world of data is rapidly evolving, and the demand for skilled data professionals has continued to rise. But who are these data professionals? Those of us in the field have been asked many times about the nature of what we do. Students and prospective career changers, hiring managers, business partners, and prospective clients all&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/different-data-roles/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/different-data-roles/">What’s in a Job Title? Understanding Changing Data Roles</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The world of data is rapidly evolving, and the demand for skilled data professionals has continued to rise. But who are these data professionals? Those of us in the field have been asked many times about the nature of what we do. Students and prospective career changers, hiring managers, business partners, and prospective clients all have questions about what falls within the expertise of a “data professional”.</p>



<p>The answer is not simple.</p>



<p>Data roles are diverse and constantly evolving. Similarly, the lines that separate data disciplines are inherently blurred. The reality faced by active data professionals is also complex, with business and project requirements often requiring them to extend their expertise across disciplines. Consequently, data professionals often wear many hats.</p>



<p>Still, it&#8217;s useful for those entering the field or looking to hire a data professional to understand some of the important distinctions between data disciplines.</p>



<p>Here are just a few.</p>



<h2 class="wp-block-heading">Common Data Roles</h2>



<h3 class="wp-block-heading"><strong>Data Architect</strong></h3>



<p>Data architects design the overall blueprint for your organization&#8217;s data environment. They define how data is stored, organized, integrated, and accessed across systems. They also ensure that your data infrastructure is scalable, secure, architected for efficient retrieval, and aligns with your long-term business goals.</p>



<h3 class="wp-block-heading"><strong>Database Administrator (DBA)</strong></h3>



<p>DBAs are the administrators of your database systems. They possess a deep knowledge of the database engine itself, including all its native functionality and features. They are also responsible for keeping databases updated, backed up, secure, and performing optimally. DBAs also manage database upgrades and migrations, as well as database recovery in a disaster or emergency.</p>



<h3 class="wp-block-heading"><strong>Data Engineer</strong></h3>



<p>Think of data engineers as the builders of your data infrastructure. They design, construct, and maintain the pipelines that collect, store, and process your data. Their toolkit is diverse and often includes programming languages like Python and SQL. It is also common to leverage cloud platforms like Azure, AWS, or GCP. These professionals ensure that your data is accessible, reliable, and ready for analysis.</p>



<h3 class="wp-block-heading"><strong>Data Analyst / Business Intelligence Analyst</strong></h3>



<p>Data analysts are the storytellers of the data world. They take the data that engineers have prepared and draw out insights through creating reports, dashboards, and visualizations. Furthermore, their strong analytical skills and ability to recognize patterns allow them to turn data into knowledge. They tell stories with data to help guide decisions. Tools often include Excel and BI reporting platforms like Tableau or Power BI.</p>



<h3 class="wp-block-heading"><strong>Data Scientist</strong></h3>



<p>Data scientists take analytics to a deeper level. They use advanced statistical techniques and machine learning to uncover hidden patterns that are often difficult for humans to detect. Similarly, the algorithms used by data scientists can predict future trends, and the outputs of their models are used to drive decision-making. Data scientists possess mathematical expertise, programming skills in languages like Python or R, and domain knowledge relevant to their industry.</p>



<h3 class="wp-block-heading"><strong>Machine Learning Engineer</strong></h3>



<p>Machine learning engineers take the models created by data scientists and make them operational in real-world production environments. They leverage both data science and software engineering skills. ML engineers are responsible for building the systems that deploy, monitor, and scale data science models. They also manage these systems to ensure that they deliver accurate and timely predictions once deployed in a real-world context.</p>



<h2 class="wp-block-heading" id="h-tips-for-choosing-your-future-data-role">Tips for Choosing Your Future Data Role</h2>



<p>Shadowing some different data professionals is a great way to get started. Depending on which role appeals to you, there are different pathways to getting started.</p>



<p>If you have a background in system administration, data architecture and database administration<strong> </strong>may be good avenues to investigate. Likewise, people who have enjoyed building their own home labs may also enjoy these data roles. </p>



<p>Similarly, if you love automation and problem-solving for technical efficiency, one of the engineering roles may be right for you. Engineers enjoy designing and building solutions for technical challenges.</p>



<p>Finally, if you have a mind for analytics and statistics, an analyst or data science role may be a great fit. These roles uncover the root causes of the problems under investigation in order to unlock potential solutions.</p>



<h3 class="wp-block-heading" id="h-there-are-a-variety-of-ways-to-kick-start-your-journey-for-any-of-these-data-disciplines">There are a variety of ways to kick-start your journey for any of these data disciplines.</h3>



<ol class="wp-block-list">
<li><strong><a href="https://www.kdnuggets.com/2021/02/10-resources-data-science-self-study.html">Self-Education</a></strong>. There are many resources available online that can guide you through learning specialized skills. Set up a home lab environment in which to safely practice. Start to build a profile of projects and/or certifications that can showcase your new skills.</li>



<li><strong><a href="https://www.forbes.com/advisor/education/bootcamps/best-data-science-bootcamps/">Bootcamps</a>.</strong> The number and variety of bootcamps for data have increased dramatically in the last 5 years. If your schedule allows for participation in one of these intense programs, they can be a great way to upskill rapidly.</li>



<li><strong><a href="https://www.usnews.com/best-colleges/rankings/computer-science/data-analytics-science">Formal education</a>.</strong> If you are looking to go into a highly specialized role in a particular knowledge domain or industry, obtaining an advanced degree can be a great way to get started.</li>
</ol>



<p>Determining which path to take will depend on what appeals to you and on the circumstances in which you are beginning your journey. The key, however, is just taking the first step.</p>



<h2 class="wp-block-heading" id="h-tips-for-hiring-which-data-role-do-you-need">Tips for Hiring: Which Data Role Do You Need?</h2>



<p>Just as the path to becoming a data professional depends on individual circumstances, the type of data professional to hire will also depend on your organization’s needs and where you are in your data maturity journey.</p>



<p>Here are some hiring considerations for several common scenarios:</p>



<h3 class="wp-block-heading" id="h-just-starting-out"><strong>Just Starting Out</strong> </h3>



<p>If you are building your data capabilities from the ground up, a data engineer with versatile skills is a great first hire. While partnering with system administrators and business experts, as well as potentially seeking external assistance from a DBA or data architect, a data engineer can lay the foundation for your future data work.</p>



<h3 class="wp-block-heading" id="h-business-optimization-improved-operations"><strong>Business Optimization / Improved Operations</strong></h3>



<p>If you are looking to use your data for improved operations, a data or business intelligence analyst can work with business partners to track key metrics, identify trends, and drive data-driven decisions to find ways to improve. Likewise, by developing an understanding of the business, this person can work as a bridge between business and IT teams to help harness the full potential of your data.</p>



<h3 class="wp-block-heading" id="h-complex-or-outdated-data-environment"><strong>Complex or Outdated Data Environment</strong></h3>



<p>A data architect can bring order to chaos by ensuring that your data is well-organized, accessible, and scalable as your organization grows and expands. Data architects can also be instrumental in reshaping legacy structures to meet current business requirements and make the best use of modern technologies.</p>



<h3 class="wp-block-heading" id="h-predictive-insights-and-automation"><strong>Predictive Insights and Automation</strong></h3>



<p>Data scientists and machine learning engineers are ideal for building models that can make important predictions, optimize processes, and/or automate complex AI tasks. It is important to note, however, that having a robust, well-governed data infrastructure is a prerequisite for success for these types of initiatives.</p>



<h3 class="wp-block-heading" id="h-diverse-needs-large-scale-projects-or-complex-remediation"><strong>Diverse Needs, Large-Scale Projects, or Complex Remediation</strong></h3>



<p>Partnering with an external data team with diverse areas of expertise can be an affordable way to: remediate complex problems, make infrastructure improvements rapidly, or design and implement large-scale solutions. Leveraging this type of support also allows you to access professionals with expertise in different data roles and may offer flexibility for scaling up or scaling down your level of support as needed.</p>



<h2 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to work with The SERO Group?</h2>



<p>Want to learn more about how SERO Group helps organizations take the guesswork out of managing their SQL estate? <a href="https://theserogroup.com/contact-us/" target="_blank" rel="noreferrer noopener">Schedule a no-obligation discovery call</a> with us to get started.</p>
<p>The post <a href="https://theserogroup.com/data-strategy/different-data-roles/">What’s in a Job Title? Understanding Changing Data Roles</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6350</post-id>	</item>
		<item>
		<title>Data Governance in Action: 4 Challenges for Small and Mid-Sized Businesses (SMBs)</title>
		<link>https://theserogroup.com/data-strategy/data-governance-challenges-small-mid-sized-businesses/</link>
		
		<dc:creator><![CDATA[Natasha Collins]]></dc:creator>
		<pubDate>Wed, 08 May 2024 21:30:00 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Events]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Events]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=5905</guid>

					<description><![CDATA[<p>With the explosion of AI and ever-increasing awareness of the importance of data, the term “data governance” seems to be everywhere these days. We hear it used in different contexts, and it may seem to equate to regulatory compliance or to have relevance for only the largest companies. This interpretation misses a key benefit of&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/data-governance-challenges-small-mid-sized-businesses/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/data-governance-challenges-small-mid-sized-businesses/">Data Governance in Action: 4 Challenges for Small and Mid-Sized Businesses (SMBs)</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>With the explosion of AI and ever-increasing awareness of the importance of data, the term “data governance” seems to be everywhere these days. We hear it used in different contexts, and it may seem to equate to regulatory compliance or to have relevance for only the largest companies.</p>



<p>This interpretation misses a key benefit of data governance, however: <strong>competitive advantage</strong>. We cannot diminish the critical importance of regulatory compliance and its role in shaping governance efforts, but it&#8217;s important to understand that this is not the whole picture when it comes to data governance.</p>



<h2 class="wp-block-heading" id="h-governing-data-as-an-asset">Governing Data as an Asset</h2>



<p>Data is a business asset, not unlike cash. If you asked any business leader whether their cash flow processes needed controls to ensure their accuracy, integrity, and protection, they would likely give you a quizzical look and assume you were baiting them into some trap…<em>of course their cash flow processes need controls.</em></p>



<p>Similarly, data has the potential to guide and inform nearly every aspect of a business. To leverage data effectively, businesses must ensure its integrity in an ongoing and reliable way. From financial reporting to performance evaluation to operational efficiency, data quality sits at the heart of modern businesses. Later, we will see some examples of how data quality and integrity issues can have significant impacts on SMBs.</p>



<p>Additionally, company data assets need to be <strong>secure</strong> and <strong>protected</strong>—arguably even more so than other company assets. This is because many personal data elements <em>do not ultimately belong to a business</em>. These considerations impact regulatory compliance and are essential for effectively and responsibly leveraging data as the valuable asset that it is.</p>



<h3 class="wp-block-heading" id="h-the-policies-and-processes-that-ensure-the-availability-usability-integrity-and-security-of-data-assets-are-what-we-mean-by-data-governance"><strong>The policies and processes that ensure the availability, usability, integrity, and security of data assets are what we mean by<em> data governance</em>.</strong></h3>



<p>Did you know that…</p>



<ul class="wp-block-list">
<li><strong>97%</strong> of data leaders state that their companies have experienced the costs of disregarding data quality and integrity in the form of lost revenue opportunities, inaccurate performance forecasting, and/or poor investments.</li>



<li>More than <strong>87%</strong> of small and mid-sized businesses (SMBs) collect or process sensitive customer data that could be compromised.</li>



<li>Small businesses spend an average of <strong>$955,429</strong> to restore normal business operations in the wake of successful attacks.</li>
</ul>



<p>AND…</p>



<ul class="wp-block-list">
<li>About <strong>85% </strong>of data science and analytics projects <strong>fail </strong>due in part to disregarding data governance processes.</li>
</ul>



<h1 class="wp-block-heading" id="h-four-common-challenges-for-smbs">Four Common Challenges for SMBs</h1>



<h2 class="wp-block-heading" id="h-challenge-1-no-buy-in">Challenge #1: No Buy-In</h2>



<p>To effect change within an organization, you must secure buy-in from key constituents. For data governance, these important players begin with executive leadership and extend through the organizational hierarchy to front-line staff. However, some SMBs question whether data governance has any real applicability for them. In response, consider: Do you store sensitive customer, client, or patient data? Do you keep sales, productivity, performance, or program data for decision-making? If you answered yes to any of those questions, data governance principles do have applicability in your environment.</p>



<p><strong>Business leaders</strong> and <strong>decision-makers</strong> should prioritize data governance because their decisions directly impact the company’s value and profitability. Without data governance policies, decision-makers can only hope that their data-driven decisions are well-founded. Inaccurate data can lead to poor decisions in ways that are difficult to detect or explain even after the fact, leaving decision-makers accountable for the outcome.</p>



<p><strong>Securing employee buy-in</strong> is equally important when implementing data governance. Buy-in should stem from an understanding of the shared responsibility for the data that drives business outcomes. A collective sense of accountability for data quality works to prevent resentment and misunderstandings towards your policies that could undermine even the best data governance efforts.</p>



<p><strong>Tips for Success:</strong></p>



<ul class="wp-block-list">
<li><strong>Elicit interest and assistance from vested stakeholders</strong>. Leverage opportunities to ease business pain points through data governance. I&#8217;ll list some examples in &#8220;Data Governance in the Wild&#8221; below.</li>



<li><strong>Pave a <strong>step-by-step</strong></strong> <strong>path to mature your data culture</strong>. Start with education, delegated responsibility, and distributed data ownership.</li>



<li><strong>Align policies</strong> <strong>with the existing strategic objectives of the company</strong>. Be specific about the expected business outcomes of your efforts.</li>



<li><strong>Empower business stakeholders</strong> to take ownership of and make decisions about business data.</li>



<li><strong>Create strategic goals and an initial roadmap</strong><em>. </em>This will work best if it is<em> an ongoing organizational effort</em> <em>that is largely led by the business</em>, not by IT.<strong>&nbsp;&nbsp;&nbsp;&nbsp;</strong></li>
</ul>



<h2 class="wp-block-heading" id="h-challenge-2-no-budget">Challenge #2: No Budget</h2>



<p>Chances are that unless improving data governance is already a top business priority, perhaps because of a recent security incident, audit, or a particularly problematic data irregularity, you will be up against budget constraints when introducing formalized data governance to an SMB.</p>



<p>This is a challenge, but not a barrier. Yes, there are tools on the market that can be very helpful, but they are by no means necessary for SMBs—and certainly not at the outset.</p>



<h3 class="wp-block-heading" id="h-tips-for-success"><strong>Tips for Success:</strong></h3>



<ul class="wp-block-list">
<li><strong>Start small and go slow.</strong> Introduce change gradually by beginning with what you can accomplish internally. Define and document business logic for your most critical data objects, and then introduce business processes to enforce that logic.</li>



<li><strong>Treat data governance as a process of continuous improvement</strong> rather than a costly one-time project. Small, inexpensive wins can produce significant results.</li>



<li><strong>Avoid a box-checking mentality.</strong> Use internal data audits to showcase regulatory compliance, but don&#8217;t let minimal standards dictate strategy. Prioritize business advantage over compliance, focusing first on areas with immediate value, such as labor cost savings, enhanced reporting, or boosted analytical capabilities.</li>



<li><strong>Leverage tools strategically.</strong> Develop your strategy and framework first. Look to tools second, and only for ease of implementation and execution. Tools alone will not provide true data governance.</li>
</ul>



<h2 class="wp-block-heading" id="h-challenge-3-no-champion">Challenge #3: No Champion</h2>



<p>You know that data governance is important for your organization and that someone needs to advocate for it. You also might not have the authority, capacity, or desire to be that person. In that case, use the suggestions about securing buy-in from Challenge #1 to find or create a data governance champion within your organization.</p>



<h3 class="wp-block-heading" id="h-tips-for-success-0"><strong>Tips for Success:</strong></h3>



<ul class="wp-block-list">
<li><strong>Business and IT need to collaborate for effective data governance. </strong>There should be a designated senior IT team leader who is collaborating closely with at least one senior business leader. In a small organization, this could simply mean your one IT resource working with the business owner. Regardless of the size of the organization, the effort should not be one-sided.</li>



<li><strong>Champions should not limit their scope to policies alone.</strong> Having centralized documentation, tools, and processes at the ready will help to avoid individuals and teams developing their own tools and processes to implement the policies their own way. Disparate processes can lead to inconsistency and diminished success.</li>



<li><strong>Champions need to be committed and persistent. </strong>Don&#8217;t roll out data governance processes and forget about them. Remember that education and training will need to be ongoing, as will the refinement of governance practices to keep pace with technology and changing business requirements.</li>



<li><strong>Champions should consider the needs of the employees that work with the data</strong> <strong>when creating policies and approving tools</strong>. If your governance initiatives are seen as an unnecessary burden, workarounds will be developed that could compromise your efforts.</li>
</ul>



<h2 class="wp-block-heading" id="h-challenge-4-internal-skills-gap">Challenge #4: Internal Skills Gap</h2>



<p>You have the needed organizational buy-in, a small budget, and even a champion, but your IT team is small (or outsourced), without any data professionals on staff. Where can you begin?</p>



<p>Remember, the key is to go slowly and implement organically. The full implementation of data governance will ultimately require technology expertise, but defining rules, requirements, and workflows may not. Start there, then reach out for help with technical implementation when you&#8217;re ready.</p>



<h3 class="wp-block-heading" id="h-tips-for-success-1"><strong>Tips for Success:</strong></h3>



<ul class="wp-block-list">
<li><strong>Research any compliance regulations applicable to your business sector</strong>. Perform an analysis of how your business is meeting these requirements. Where you find gaps, assess a strategy for how to fill those gaps. Implementation can be left to a third party as needed, but be sure that you understand what needs to be done. If you are unsure about how to get started, use some of that budget to reach out for support.</li>



<li><strong>Perform a security audit of your data systems.</strong> Adjust and delete credentials and permissions as appropriate. Review third-party system access. Inventory inbound, outbound, and internal data pipelines and evaluate for best practices. Then set up ongoing processes and/or reports to assist with security monitoring.</li>



<li><strong>Look for critical data objects that need to be formally defined.</strong> Beginning with mission-critical data elements, document all business logic and metadata requirements associated with these elements in a data dictionary or catalog. This doesn&#8217;t need to be elaborate, but it should cover all key data elements. Start in one business area and expand out from there.</li>



<li><strong>Assign ownership and accountability</strong>. Look for data owners who are invested in the quality of the data within their domain because of their connection to the processes that produce or consume the data.</li>



<li><strong>Upskill and/or seek third-party guidance as required</strong>. Provide access to resources for interested staff to get trained to become data owners, stewards, and partners in data governance. Reach out to third parties for guidance in areas that are outside the internal expertise of the organization.</li>
</ul>



<h2 class="wp-block-heading" id="h-data-governance-challenges-in-the-wild">Data Governance Challenges in the Wild</h2>



<p>Below are some real challenges faced by SMBs that could be solved with improved data governance processes.</p>



<h3 class="wp-block-heading" id="h-local-restaurant-chain">Local Restaurant Chain</h3>


<p>A small, local restaurant chain encountered a discrepancy between a company report on drink sales and individual location reports generated in Excel. This irregularity surfaced after a competition to incentivize staff to sell more drinks by holding a competition between locations with a cash prize. At the end of the competition, when managers compared their individual reports, Store A had sold the most drinks. When using the central company report, Store B had. Which was correct?</p>
<p>Upon investigation, one of the restaurant locations had long ago coded milkshakes as drinks. All of the other locations coded them as desserts. This was never audited or corrected. As a result, the individual reports that were rolled up by individual menu item codes produced a different result than the central report that was rolled up by the “Drink” category. This confusion affected competition results as well as drink and dessert sales analytics and other location-to-location comparisons.</p>
<p>


</p>
<h3 id="h-small-food-manufacturer" class="wp-block-heading">Small Food Manufacturer</h3>
<p>


</p>
<p>


</p>
<p><span style="font-size: revert; color: initial;">A large grocery store chain approached a regional manufacturer of salad dressings and condiments, requesting the production of one of its products as a generic for the chain. Similarly, a bulk food retailer asked the same manufacturer to produce a bulk version of the same product. The contracts were accepted, but the original product, the generic version, and the bulk version of the product are all assigned different product codes without being rolled up to any parent product category. When the accounting office ran their standard report of overall sales trends by product, they had no way of recognizing that these three items represented the same underlying product</span> and ended up producing a skewed and incomplete product analysis.</p>
<p>


</p>
<p>


</p>
<h3 id="h-international-boutique-wholesaler" class="wp-block-heading">International Boutique Wholesaler</h3>
<p>


</p>
<p>


</p>
<p>A private international wholesaler with dispersed brick-and-mortar locations was having continual problems with their inventory. Customers complained that the website frequently showed products as available when they were not. Retail associates complained that the inventory in the POS was incorrect and frequently showed negative inventory when stock was actually present in the stores.</p>
<p>


</p>
<p>


</p>
<p>One of the issues in this scenario was that individual store inventory was manually counted and entered with different workflows, lacking a centralized mechanism for tracking inventory. Furthermore, associates often used the “miscellaneous” category to sell products that were at the stores but didn&#8217;t have a corresponding inventory item recognized in the system. These issues produced a myriad of operational, financial, and analytic discrepancies, as well as increased costs in the form of labor inefficiencies, lost revenue, and misplaced or stolen inventory.</p>
<p>


</p>
<p>


</p>
<h3 id="h-social-services-organization" class="wp-block-heading">Social Services Organization</h3>
<p>


</p>
<p>


</p>
<p>A social services organization gathers information about its clients to produce an annual statistical analysis of clients and outcomes. This nationally distributed, highly regarded report serves as a source for scholarly research and influences funding for numerous public and private institutions.</p>
<p>


</p>
<p><p>However, the organization faces challenges in bringing consistency to its intake processes. Since many clients arrive in crisis, intake steps that can be skipped by staff often are because intake personnel are in a rush and do not realize the importance of each step. Furthermore, the application being used to collect this valuable information does not require answers to many questions that are deemed critical for this organization and the annual report. The organization has attempted many process changes to improve the consistency of this workflow. However, the problem still persists and is consistently cited as a limitation of their statistical findings.</p>
</p>


</p>
<h2 id="h-is-data-governance-important-for-smbs" class="wp-block-heading">Is data governance important for SMBs?</h2>
<p>


</p>
<p>


</p>
<p>This is just a small handful of examples of how a lack of data governance can affect SMBs. In fact, once you&#8217;re on the lookout for data governance issues, you may start to notice them everywhere.</p>
<p>


</p>
<p>


</p>
<p>Additionally, <strong>we have only begun to touch on the security and compliance aspects of data governance</strong>. Many of the challenges to implementation outlined here are less prominent when a regulatory requirement is at play since compliance is mandated. Even when regulations play a less obvious role, most of us are aware of the gravity of security risks. <strong>It is important to note, however, that this security risk is even greater for SMBs than for the largest companies. </strong>According to <a href="https://www.veeam.com/blog/small-business-ransomware.html#:~:text=It's%20a%20common%20misconception%20that,ransomware%20attacks%20targeted%20small%20businesses.">Veeam’s 2023 Data Protection Trends Report</a>, 85% of ransomware attacks targeted small businesses.</p>
<p>


</p>
<p>


</p>
<p>The take-away? If your business or organization retains data, and very few (if any) businesses do not, formalizing some level of data governance will help you to securely and responsibly leverage that asset to drive your business.</p>
<p>


</p>
<p>


</p>
<h3 id="h-further-reading" class="wp-block-heading">Further Reading</h3>
<p>


</p>
<p>


</p>
<ul class="wp-block-list">
<li style="list-style-type: none;">
<ul>

<li><a href="https://www.fundera.com/resources/small-business-cyber-security-statistics">More interesting statistics</a></li>
</ul>
</li>
</ul>
<p>

</p>
<p>

</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><a href="https://cyber.harvard.edu/ecommerce/privacyaudit.html">A privacy audit checklist</a></li>
</ul>
</li>
</ul>
<p>

</p>
<p>

</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><a href="https://fundcount.com/a-guide-to-data-governance-for-small-businesses/#:~:text=In%20essence%2C%20data%20governance%20is,like%20organizing%20your%20home%20office.">A guide to data governance for small businesses</a></li>
</ul>
</li>
</ul>
<p>

</p>
<p>

</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><a href="https://www.cio.com/article/202183/what-is-data-governance-a-best-practices-framework-for-managing-data-assets.html">Data governance frameworks</a></li>
</ul>
</li>
</ul>
<p>

</p>
<p>

</p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><a href="https://aws.amazon.com/what-is/data-governance/">Amazon’s guide to data governance for SMBs</a></li>
</ul>
</li>
</ul>
<p>

</p>
<p>


</p>
<p>


</p>
<h2 id="h-want-to-continue-the-conversation-about-data-governance-for-smbs" class="wp-block-heading">Want to continue the conversation about data governance for SMBs?</h2>
<p>



<p>To learn more, you can <a href="https://www.youtube.com/watch?v=dgfGUkEeAe0">click here</a> to access a recording of our May 14, 2024 webinar on Data Governance for SMBs.</p>



<p>Need help? We can help you tailor practical data governance solutions to meet the specific needs of your SMB. <a href="https://theserogroup.com/#contact" target="_blank" rel="noreferrer noopener">Schedule a call</a> or <a href="mailto:joew@theserogroup.com" target="_blank" rel="noreferrer noopener">send us an email</a>. </p>
<p>The post <a href="https://theserogroup.com/data-strategy/data-governance-challenges-small-mid-sized-businesses/">Data Governance in Action: 4 Challenges for Small and Mid-Sized Businesses (SMBs)</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5905</post-id>	</item>
		<item>
		<title>Archiving and Deletion Strategy&#8230;KonMari for Data Management?</title>
		<link>https://theserogroup.com/data-strategy/archiving-and-deletion-strategy-konmari-for-data-management/</link>
		
		<dc:creator><![CDATA[Natasha Collins]]></dc:creator>
		<pubDate>Thu, 26 Oct 2023 20:09:35 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Data Management]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[Database Development]]></category>
		<category><![CDATA[IT Manager]]></category>
		<category><![CDATA[Sero]]></category>
		<category><![CDATA[Sero Group]]></category>
		<category><![CDATA[Serogroup]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Events]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consultant]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=5588</guid>

					<description><![CDATA[<p>Welcome to the third and final post in our series on Data Lifecycle Management (DLM), where we will talk about archiving and purging company data. In the last post, we talked about applying the Kaizen approach to data management to achieve a culture of continuous improvement on our data teams. In this post, we will&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/archiving-and-deletion-strategy-konmari-for-data-management/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/archiving-and-deletion-strategy-konmari-for-data-management/">Archiving and Deletion Strategy&#8230;KonMari for Data Management?</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Welcome to the third and final post in our <a href="https://theserogroup.com/data-strategy/data-collection-two-key-tools-to-improve-your-data-strategy/">series</a> on Data Lifecycle Management (DLM), where we will talk about archiving and purging company data.</p>



<p>In the <a href="https://theserogroup.com/data-strategy/data-management-strategy-a-kaizen-approach/">last post</a>, we talked about applying the Kaizen approach to data management to achieve a culture of continuous improvement on our data teams.</p>



<p>In this post, we will use the <a href="https://konmari.com/about-the-konmari-method/#:~:text=The%20KonMari%20Method%E2%84%A2%20encourages,and%2C%20finally%2C%20sentimental%20items.">KonMari</a> method of simplification, recently made famous by Marie Kondo, as a lens for considering what to keep and what to purge in our business data repositories.</p>



<p>As always, we will also give some best practices for how to establish policies around archiving and purging your company data.</p>



<h2 class="wp-block-heading" id="h-data-lifecycle-management-archiving-and-deletion">Data Lifecycle Management: Archiving and Deletion</h2>



<p>As mentioned in previous posts, the final phases of Data Lifecycle Management are Archiving and Deletion.</p>



<p>These phases help to ensure that we keep and maintain only that data which is required for our business. But how do we determine what to keep active, what to archive, and what to purge?</p>



<p>We can apply some concepts from the KonMari simplification method to our data strategy here to help us decide.</p>



<h2 class="wp-block-heading" id="h-rule-1-make-the-commitment">Rule 1: Make the Commitment</h2>



<p>Kondo states that the first step in KonMari is committing to achieving your goal. This may seem like an obvious first step for any endeavor, but many companies fail to establish a data retention strategy.</p>



<p>It is not uncommon for businesses to take the approach that keeping <em>all </em>data (sometimes even in a “hot”, or readily accessible, repository) is the way to go. This tactic usually stems from either:</p>



<ol class="wp-block-list" type="A">
<li>an explicit belief that you cannot go wrong with keeping too much historical data<br><strong>or</strong></li>



<li>from having no capacity to prioritize a retention strategy.</li>
</ol>



<h3 class="wp-block-heading" id="h-either-way-the-keep-everything-strategy-is-misguided-for-3-reasons">Either way, the “keep everything” strategy is misguided for 3 reasons.</h3>



<p><strong>First, the more data you keep, the more time it will take to recover in the event of a crisis.</strong><br><br>Crisis can take the form of:</p>



<ul class="wp-block-list">
<li>a lawsuit or an audit that requires <em>retrieval of specific information</em></li>
</ul>



<p>or</p>



<ul class="wp-block-list">
<li>a natural disaster, human error, criminal activity or another event that demands <em>restoration of data to a particular point in time</em>.</li>
</ul>



<p>In any case, restoration time is critical during these events. The more time it takes to retrieve the required data from your archive, the longer it will take for the business to recover.</p>



<p><strong>Second, while data retention is a necessity, it is also a liability and entails responsibility.</strong></p>



<p>Businesses must take the responsibility to respect consumer privacy rights very seriously. Part of this responsibility entails keeping consumer data for no longer than is required or for any purpose other than that for which the consumer gave consent. Even if your company does not fall under the regulatory jurisdiction of privacy laws like <a href="https://www.gdpreu.org/gdpr-requirements/">GDPR</a>, <a href="https://oag.ca.gov/privacy/ccpa">CCPA</a>, or <a href="https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/pipeda_brief/">PIPEDA</a>, the business is nevertheless liable for securely and responsibly maintaining its consumer data.</p>



<p>With any data that is retained comes the possibility that it could be stolen, leaked, or misused. This risk is unavoidable, but preserving <em>unnecessary</em> archives of historical data is a liability that ought to be avoided.</p>



<p><strong>Third, <em>“Data stores don’t grow on trees…”</em></strong></p>



<p>A well-crafted data strategy can reduce the financial cost of maintaining your data repositories, but increasingly large data stores cost the business money nevertheless.</p>



<p>There are also performance, time, system resource, and opportunity costs associated with maintaining large data stores.</p>



<p><strong>So, in short – <em>make the commitment to tidy up your unwieldy data repositories!</em></strong></p>


<div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><a href="https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-scaled.jpg"><img decoding="async" width="1024" height="683" src="https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-1024x683.jpg" alt="" class="wp-image-5597" style="aspect-ratio:1.499267935578331;width:448px;height:auto" srcset="https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-1024x683.jpg 1024w, https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-300x200.jpg 300w, https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-768x512.jpg 768w, https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-1536x1024.jpg 1536w, https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-2048x1365.jpg 2048w, https://theserogroup.com/wp-content/uploads/2023/10/messydesk-3-1620x1080.jpg 1620w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>
</div>


<h2 class="wp-block-heading" id="h-rule-2-imagine-your-ideal">Rule 2: Imagine Your Ideal</h2>



<p>Compliance regulations do some of the work of envisioning the ideal for us in the data world. Still, take the time to consider the ideal composition of your data repositories. Doing this can help you to think strategically about what should be kept, how and where to keep it, and for how long.</p>



<p>As mentioned in the <a href="https://theserogroup.com/data-strategy/data-management-strategy-a-kaizen-approach/">previous</a> post in this series, consider both regulatory requirements and the needs of the business for reporting, analytics, and strategic planning when determining what to keep. Consult business leaders and business analysts about what data is needed and for how long. You can even create a formal <a href="https://blog.datahubproject.io/the-what-why-and-how-of-data-contracts-278aa7c5f294" target="_blank" rel="noreferrer noopener">data contract</a> for critical data elements in your business.</p>



<h2 class="wp-block-heading" id="h-rule-3-finish-discarding-first">Rule 3: Finish Discarding First</h2>



<p>Obviously, deleting data should always be done with extreme caution and forethought.</p>



<p>Nevertheless, once you have performed an audit of your data repositories and have determined your retention strategy, you should begin implementation by purging unnecessary data. We will discuss more about how to perform this action safely and according to best practices below. &nbsp;</p>



<h2 class="wp-block-heading" id="h-rules-4-and-5-progress-by-category-and-in-the-right-order">Rules 4 and 5: Progress by Category and in the Right Order</h2>



<p>For the purposes of purging and archiving data, we should be thinking in a criticality/age matrix like the one below – beginning in the upper left corner and working down and to the right.</p>


<div class="wp-block-image">
<figure class="aligncenter size-full is-resized"><a href="https://theserogroup.com/wp-content/uploads/2023/10/image.png"><img decoding="async" width="568" height="236" src="https://theserogroup.com/wp-content/uploads/2023/10/image.png" alt="" class="wp-image-5589" style="aspect-ratio:2.406779661016949;width:394px;height:auto" srcset="https://theserogroup.com/wp-content/uploads/2023/10/image.png 568w, https://theserogroup.com/wp-content/uploads/2023/10/image-300x125.png 300w" sizes="(max-width: 568px) 100vw, 568px" /></a></figure>
</div>


<p>You should make incremental passes <em>across</em> departments in these stages, beginning with the oldest and least important data in each departmental area.</p>



<h2 class="wp-block-heading" id="h-rule-6-does-it-spark-joy">Rule 6: “Does it Spark Joy?”</h2>



<p>Ok, ok &#8211; I admit this iconic final question from Kondo is much less suitable to data retention. However, there still may be an important (if less-than-perfectly-measurable) question that should be asked by data teams before coding a delete.</p>



<p><strong>Does a business leader strongly prefer to retain certain data despite the lack of any clear regulatory or business-driven reason for doing so?</strong></p>



<p>If so, keep it&#8230;unless doing so presents a serious risk or concern. If you feel there is a serious risk, continue to voice your concerns. Otherwise, just wait and continue to get clarification.</p>



<h2 class="wp-block-heading" id="h-now-for-some-best-practices">Now for some best practices…</h2>



<p>Keep in mind that the practices listed here do not include the critical practice of backing up your production data, which has been discussed in previous posts (<a href="https://theserogroup.com/dba/whats-in-this-sql-server-backup-file/" target="_blank" rel="noreferrer noopener">here</a>, <a href="https://theserogroup.com/sql-server/using-vm-snapshots-to-backup-sql-server/" target="_blank" rel="noreferrer noopener">here</a>, and <a href="https://theserogroup.com/azure/how-to-test-sql-server-backups-using-dbatools/" target="_blank" rel="noreferrer noopener">here</a>). Always make sure that backups are in place before beginning to archive or delete data.</p>



<h3 class="wp-block-heading" id="h-1-nbsp-nbsp-nbsp-nbsp-replicate-and-archive-data-in-flight">1.&nbsp;&nbsp;&nbsp;&nbsp; Replicate and archive data “in-flight”.</h3>



<p>Archiving and/or replicating your data at various points in your pipeline is a best practice. Process failures in data pipelines are not uncommon, and you need to be able to recover data from earlier stages of the pipeline if you need to reprocess the data.</p>



<p>3 common examples of this practice, which should include purging data after an established retention period, are:</p>



<ul class="wp-block-list">
<li>Moving imported files to an archive folder</li>



<li>Replicating transactional databases to a staging database before further processing by downstream systems</li>



<li>Staging imported API data in its own table or database before integrating with internal systems.</li>
</ul>



<h3 class="wp-block-heading" id="h-2-nbsp-nbsp-nbsp-nbsp-archive-in-cold-storage-and-protect-the-archive">2.&nbsp;&nbsp;&nbsp;&nbsp; Archive in cold storage and protect the archive.</h3>



<p>Consider how you will store data that has served its immediate purpose and has been determined to be a candidate for long-term storage. There are pros and cons to each method, and a combination of archiving methods may be appropriate for your different data sets. Here are some options and considerations.</p>



<ul class="wp-block-list">
<li><strong>Onsite physical storage</strong><ul><li>Pros: ease of access in an emergency, familiar technology</li></ul>
<ul class="wp-block-list">
<li>Cons: vulnerable to tampering, theft, and physical damage/natural disasters</li>
</ul>
</li>



<li><strong>Offsite storage</strong> (tape, optical disk, magnetic hard drives)<ul><li>Pros: well-established, relatively inexpensive, usually more secure than onsite</li></ul>
<ul class="wp-block-list">
<li>Cons: slower recovery times</li>
</ul>
</li>



<li><strong>Cold cloud storage</strong><ul><li>Pros: speed and ease of recovery, alleviated burden of maintenance, built-in security, inexpensive</li></ul>
<ul class="wp-block-list">
<li>Cons: potentially less familiar to established IT departments than traditional methods</li>
</ul>
</li>



<li><strong>Data lake</strong><ul><li>Pros: accessibility, speed and ease of recovery, suitable for use with emerging technologies, built-in security</li></ul>
<ul class="wp-block-list">
<li>Cons: less-established, steeper learning curve, potentially expensive, requires careful governance of user access</li>
</ul>
</li>
</ul>



<h3 class="wp-block-heading" id="h-3-nbsp-nbsp-nbsp-nbsp-don-t-forget-critical-data-that-is-managed-by-third-parties">3.&nbsp;&nbsp;&nbsp;&nbsp; Don’t forget critical data that is managed by third parties.</h3>



<p>Over time, businesses may find that a significant body of company data resides in data stores managed by third parties. Since maintenance has often been delegated to vendors in these cases, archiving this data is sometimes overlooked.</p>



<p>While there may be an ability to set a retention policy, it can be very beneficial for many reasons to work with your vendors to set up an extraction process to archive a copy of your data from these systems into your own repositories as well.</p>



<h3 class="wp-block-heading" id="h-4-nbsp-nbsp-nbsp-nbsp-establish-retention-schedules-and-procedures-for-purging-data">4.&nbsp;&nbsp;&nbsp;&nbsp; Establish retention schedules and procedures for purging data.</h3>



<p>Business, regulatory, and legislative needs dictate what should be saved and for how long, and these may differ between data sets. Establishment of policies and procedures for deleting data will ultimately be the responsibility of data owners.</p>



<p>These policies should address the following areas:</p>



<ul class="wp-block-list">
<li>Who is authorized to purge data?</li>



<li>In what maintenance windows can this process occur since deletion can go slowly and data processing jobs/replication must be disabled?</li>



<li>How will notification be given to the business?</li>



<li>What validation and integrity checks must be in place?</li>



<li>What rollback procedures will be used if necessary?</li>
</ul>



<h2 class="wp-block-heading" id="h-just-the-tip-of-the-iceberg">Just the tip of the iceberg…</h2>



<p>There is much, much more to say about all these topics.</p>



<p>If you have made it as far as committing to cleaning up your data but the rest seems overwhelming, never fear! There are many vendors that are happy to help with all levels of assistance.</p>



<p>If you have a good handle on your archiving and deletion processes but would like assistance with a SQL Server implementation of them, <a href="https://theserogroup.com/#contact">reach out</a>! We are here to help.</p>
<p>The post <a href="https://theserogroup.com/data-strategy/archiving-and-deletion-strategy-konmari-for-data-management/">Archiving and Deletion Strategy&#8230;KonMari for Data Management?</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5588</post-id>	</item>
		<item>
		<title>Data Management Strategy: A Kaizen Approach</title>
		<link>https://theserogroup.com/data-strategy/data-management-strategy-a-kaizen-approach/</link>
		
		<dc:creator><![CDATA[Natasha Collins]]></dc:creator>
		<pubDate>Thu, 21 Sep 2023 21:17:28 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Data Management]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[Database Development]]></category>
		<category><![CDATA[IT Manager]]></category>
		<category><![CDATA[Sero]]></category>
		<category><![CDATA[Sero Group]]></category>
		<category><![CDATA[Serogroup]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Audit]]></category>
		<category><![CDATA[SQL Events]]></category>
		<category><![CDATA[SQL Security]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consultant]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=5522</guid>

					<description><![CDATA[<p>“Take time to improve our data management processes? Sorry, we are just too busy”… fixing errors from broken data processes. This refrain is more common than you think in IT departments of all sizes. Or maybe you live that reality every day and are fully aware that clunky, error-laden processes eat away at your team’s&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/data-management-strategy-a-kaizen-approach/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/data-management-strategy-a-kaizen-approach/">Data Management Strategy: A Kaizen Approach</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>“Take time to improve our data management processes? Sorry, we are just too busy”… <em>fixing errors from broken data processes.</em></p>



<p>This refrain is more common than you think in IT departments of all sizes. Or maybe you live that reality every day and are fully aware that clunky, error-laden processes eat away at your team’s efficiency (and morale).</p>



<h2 class="wp-block-heading">Data management and continuous improvement may sound like they should always go together, but they often don’t.</h2>



<p>Many times our data management practices involve too many business-critical data processes that break regularly and need to be improved, but we have no time to make the needed improvements because there are so many data processes that need to be “managed” (a.k.a. remediated regularly).</p>



<h2 class="wp-block-heading">So, how can we break this cycle?</h2>



<figure class="wp-block-image size-large is-resized"><a href="https://theserogroup.com/wp-content/uploads/2023/09/stop-scaled.jpg"><img loading="lazy" decoding="async" src="https://theserogroup.com/wp-content/uploads/2023/09/stop-1024x683.jpg" alt="" class="wp-image-5528" style="width:449px;height:300px" width="449" height="300" srcset="https://theserogroup.com/wp-content/uploads/2023/09/stop-1024x683.jpg 1024w, https://theserogroup.com/wp-content/uploads/2023/09/stop-300x200.jpg 300w, https://theserogroup.com/wp-content/uploads/2023/09/stop-768x513.jpg 768w, https://theserogroup.com/wp-content/uploads/2023/09/stop-1536x1025.jpg 1536w, https://theserogroup.com/wp-content/uploads/2023/09/stop-2048x1367.jpg 2048w, https://theserogroup.com/wp-content/uploads/2023/09/stop-1618x1080.jpg 1618w" sizes="auto, (max-width: 449px) 100vw, 449px" /></a></figure>



<p><strong>Welcome back</strong> to the <a href="https://theserogroup.com/data-strategy/data-collection-two-key-tools-to-improve-your-data-strategy/">second</a> of three posts on how to refine your strategy for Data Lifecycle Management (DLM)!</p>



<p>In this post, we will focus on Data Management as the second of the three DLM stages: Data Collection, Data Management, and Data Deletion.</p>



<h2 class="wp-block-heading">Kaizen for Data Management</h2>



<p>The Kaizen approach, famously championed by the Toyota corporation, suggests that small organizational changes can lead to a culture of continuous improvement. This culture will ultimately lead to better processes, greater efficiency, improved outcomes, and increased morale.</p>



<p><a href="https://kaizen.com/insights/continuous-improvement-culture/">The Kaizen Institute</a> states,</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p class="has-text-align-center"><em>“As part of the corporate culture, continuous improvement becomes an ongoing process integrated into the organization’s daily activities. Employees are encouraged to challenge the status quo, suggest ideas, and implement improvements. Continuous learning and development are valued, and mistakes are seen as growth opportunities.”</em></p>
</blockquote>



<p>This means that adopting a Kaizen approach to your data management strategy can be a lever for driving a continuous improvement culture on your data team without sweeping, drastic changes.</p>



<p>Small improvements to existing processes can slowly bring significant reduction in process failures, and improvements in efficiency, accuracy, and team morale. (<a href="https://www.cio.com/article/220369/what-is-kaizen-a-business-strategy-focused-on-improvement.html">Here</a> is a short article about applying a Kaizen approach in an IT context.)</p>



<h2 class="wp-block-heading">So, how and where can we improve our data management?</h2>



<p>Where should you look to start identifying small improvements that might be implemented?</p>



<p>Consider the areas below with your team. Most likely you will find that you are very strong in some areas, but perhaps there are areas that have not been addressed at all. Start with the lowest hanging fruit, and bit by bit you will find that you are slowly filling the gaps and addressing the technical debt that every established data team faces. &nbsp;</p>



<h2 class="wp-block-heading">First, analyze your data structures.</h2>



<p>The applications, tools, and data processes in place for your company will impact the data structure that needs to be in place for it to be usable. Unfortunately, these requirements rarely align.</p>



<p>When you think about the flow of your data, think about consistency of format and type. As data flows into your system, it is often riddled with discrepancies in format, data type, and even the information it contains (but we will save that for another post).</p>



<p>As your data flows downstream toward the consumer, it should become more and more aligned in these areas. Why? Because the more points of contact that your technical teams must have with it (to transform it for particular use cases, etc.), the more points of failure you can have.</p>



<p>Strategic policies and governance and centralized data management can really help, but you don’t need an operational overhaul to improve!</p>



<h2 class="wp-block-heading">In line with a Kaizen approach, try encouraging small changes in these areas:</h2>



<h3 class="wp-block-heading" id="h-establish-data-standards">Establish data standards</h3>



<p>This will be an ongoing process. You will want to give thought to what your core standards should be, especially for mission critical data elements like identifiers, account numbers, etc., since these are more difficult to change once processes are mature. However, your standards will expand and refine as your business matures its data processes.</p>



<h3 class="wp-block-heading" id="h-adopt-an-enterprise-modeling-tool">Adopt an enterprise modeling tool</h3>



<p>Document and catalog your data standards using a modeling tool. Include all the metadata associated with your data objects and their relationships. The business will use the resulting documentation at every level (system administration, development, business analysis, and report consumption) for understanding and interpreting the data.</p>



<h3 class="wp-block-heading" id="h-transform-your-data-with-consistency">Transform your data with consistency</h3>



<p>Wherever your transformation layer lives in your processes (and hopefully there are as few of these as possible), always architect toward your established data standards.</p>



<p>Establishing governance and centralized management can really help here, but feel free to start small! Apply these principles to new processes and only to established processes as they require other changes. Encourage a culture that celebrates these improvements and looks for opportunities to make things better.</p>



<h3 class="wp-block-heading" id="h-implement-database-source-control">Implement database source control</h3>



<p>That’s right – employ a source control process for your database objects. Many companies do not take this step. However, having source control in place does not only protect your team from losing important data objects. It can also help ensure that new structures follow established standards when code reviews, pull request approvals, and other best practices are in place.</p>



<h3 class="wp-block-heading" id="h-structure-your-deployment-process">Structure your deployment process</h3>



<p>Lastly, establish protocols around deployment. Some options include:</p>



<ul class="wp-block-list">
<li>Creating a deployment cadence that uses established deployment windows</li>



<li>Setting up a change advisory board for reviewing changes before approving them to be deployed to production</li>



<li>Designating deployment managers that are responsible for deploying code</li>



<li>And, of course, you can always automate your deployments! Just be careful to include the appropriate guardrails.</li>
</ul>



<p><em>Remember – slow and steady wins the race with continuous improvement.</em></p>



<h2 class="wp-block-heading">Second, evaluate your data pipelines.</h2>



<p>Outside of data structure, there are other data process considerations that need to be evaluated as well.</p>



<h3 class="wp-block-heading">Accuracy &amp; Reliability</h3>



<ul class="wp-block-list">
<li>Are your data ingestion and replication processes accurate and reliable?</li>
</ul>



<p>Sometimes when evaluating our pipelines, we find that issues with error handling, purge processes, SFTP, APIs, replication, logging or any number of other processes are causing duplicative, inaccurate, incomplete, or undelivered data transfers. Look out for these and correct them as you find them.</p>



<h3 class="wp-block-heading">Maintenance &amp; Scalability</h3>



<p>Also, ask yourself these questions:</p>



<ul class="wp-block-list">
<li>Are you frequently stretching the limits of any of your allocated hardware, VMs, databases, or network resources?</li>



<li>Are any of your system resources in need of upgrades or patching? Are you missing protocols to ensure that these are completed?</li>



<li>Are there other systems, applications, technologies, or vendors that might suit your current or projected needs better?</li>



<li>Are your data processes too slow? Do they struggle with the amount of data that must be processed by them?</li>
</ul>



<p>If your answer to any of these questions is “yes”, then you have opportunities for improvement (<em>slow and steady…</em>).</p>



<h2 class="wp-block-heading">Third, never forget about security with data management.</h2>



<p><a href="https://theserogroup.com/sql-server-resources/sql-server-security-best-practices/">Security</a> should always be top of mind when considering your company data. Here are some areas to evaluate.</p>



<h3 class="wp-block-heading">Security – External</h3>



<p>Review the security around the infrastructure supporting your company’s data processes for points of external connection. Pay particular attention to any processes that utilize third party tools or that export or extract data to/from external sources.</p>



<h3 class="wp-block-heading">Security – Internal &nbsp;&nbsp;</h3>



<p>For internal sharing and usage, security measures should be concerned with careful provisioning of access to data and systems. For lower-level systems, be sure to mask or de-identify any sensitive data.</p>



<p>Further, for sensitive or confidential data, give careful consideration to protecting against any intentional or unintentional data leaks. Areas to consider creating policies around include:</p>



<ul class="wp-block-list">
<li>Unsecured physical devices or paperwork</li>



<li>Keeping only what data is necessary</li>



<li>Emailing sensitive data</li>



<li>Downloading data to personal devices</li>



<li>What to do if a suspected data breach has occurred</li>
</ul>



<h2 class="wp-block-heading">Is your head spinning? Don’t worry!</h2>



<p>Remember that data management is an ongoing process of continuous improvement, and we will delve into many of these topics more deeply in upcoming posts.</p>



<p>In the meantime, if you have a pressing need and could use some help detailing a roadmap, <a href="https://theserogroup.com/#contact">let us know</a>! We love to help empower continuous improvement with our clients.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p class="has-text-align-center"><em>&#8220;We cannot become what we want to be by remaining what we are.&#8221;</em></p>
</blockquote>



<p class="has-text-align-center"><em>&#8211; Max DePree</em></p>
<p>The post <a href="https://theserogroup.com/data-strategy/data-management-strategy-a-kaizen-approach/">Data Management Strategy: A Kaizen Approach</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5522</post-id>	</item>
		<item>
		<title>Data Collection: Two Key Tools to Improve Your Data Strategy</title>
		<link>https://theserogroup.com/data-strategy/data-collection-two-key-tools-to-improve-your-data-strategy/</link>
		
		<dc:creator><![CDATA[Natasha Collins]]></dc:creator>
		<pubDate>Tue, 29 Aug 2023 13:01:31 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Data Collection]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[IT Manager]]></category>
		<category><![CDATA[Sero]]></category>
		<category><![CDATA[Sero Group]]></category>
		<category><![CDATA[Serogroup]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Consultant]]></category>
		<category><![CDATA[SQL Events]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consultant]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<category><![CDATA[The Sero Group]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=5460</guid>

					<description><![CDATA[<p>Are your company&#8217;s data collection processes sound? Do they align with best practices? Welcome to the first of three posts on how to refine your strategy for data lifecycle management. In this post, we will look at how to evaluate your data collection processes for improvements. Data Collection in Data LifeCycle Management (DLM) As has&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/data-collection-two-key-tools-to-improve-your-data-strategy/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/data-collection-two-key-tools-to-improve-your-data-strategy/">Data Collection: Two Key Tools to Improve Your Data Strategy</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Are your company&#8217;s data collection processes sound? Do they align with best practices?</p>



<p>Welcome to the first of three posts on how to refine your strategy for data lifecycle management. In this post, we will look at<strong> </strong>how to evaluate your<strong> data collection processes </strong>for improvements.</p>



<h2 class="wp-block-heading">Data Collection in Data LifeCycle Management (DLM) </h2>



<p>As has been noted in a previous post on the <a href="https://theserogroup.com/data-strategy/are-information-and-data-lifecycle-management-processes-different/" target="_blank" rel="noreferrer noopener">difference between Data Lifecycle Management (DLM) and Information Lifecycle Management(ILM)</a>, there are fundamentally 3 phases of Data Lifecycle Management (DLM) into which all physical data-related tasks fall: Data Collection &amp; Creation, Data Management, and Data Deletion.</p>



<p>As an IT leader, there are <strong>two important exercises</strong> you should perform<strong> </strong>to evaluate your data collection strategy. By performing these, you will produce living documents that should guide how your company creates, ingests, and consumes data now and in the future.</p>



<h2 class="wp-block-heading">First, perform a <em>data collection audit.</em></h2>



<p>The first step in evaluating your DLM processes is to gain a complete understanding of the data collection processes your company is currently using. The best way to do this is through an internal audit.</p>



<p>Your data collection audit should include answers to the following questions:</p>



<ul class="wp-block-list">
<li>Where is data coming into your systems (websites, transactional systems, vendors)?</li>



<li>What systems or processes are used to create or collect data (software, web forms, APIs, FTP)?</li>



<li>What data formats are being leveraged by these processes (SQL, JSON, CSV, XML)?</li>



<li>What security, threat mitigation, backups, and archiving processes are in place for these processes and data stores? &nbsp;(<a href="https://devops.com/optimizing-security-in-data-collection-processes/" target="_blank" rel="noreferrer noopener nofollow">Here</a> is a good summary of what to look for.) </li>
</ul>



<p>Finally, examine the information you gathered through a strategic lens. Look for vulnerabilities, inefficiencies, and pain points in your processes. Then work with your team to devise a strategic plan and implementation timeline for achieving improvements in these areas.</p>



<h2 class="wp-block-heading">Second, create a<em> data tracking plan</em>.</h2>



<p>Now that you have audited your data collection processes, you should give thought to why you are collecting the data that you are and what data <em>needs</em> to be collected. Consult business analysts in your company about which metrics they would like to track. This will help you understand what data points need to be collected. Likewise, find out what government regulations dictate about what data should be collected and retained.</p>



<p>Ask questions like:</p>



<ul class="wp-block-list">
<li>Is the <em>right </em>data being collected?</li>



<li>Are there any missing data points?</li>



<li>Are you collecting irrelevant or duplicated data?</li>
</ul>



<h3 class="wp-block-heading">Bridge the Gap</h3>



<p>Undoubtedly, it is tricky to bridge the gap between the business, which has ideas about what data they would <em>like</em> to track, and the technical team, who knows <em>how</em> to track it. A data tracking plan is a tool that can help with this.</p>



<p>While some people strictly define what a data tracking plan must consist of, a simple plan is often sufficient. Your data tracking plan defines your primary business objects (customers, products, stores, etc.) and the metrics or events surrounding them that your business would like to have more information about.</p>



<p>Before spending time creating your own, take a look at the many templates available to get you started. Here is a <a href="https://www.avo.app/blog/9-free-tracking-plan-templates-from-mixpanel-amplitude-segment-and-more#lle4n0ay38-" target="_blank" rel="noreferrer noopener">l</a><a href="https://www.avo.app/blog/9-free-tracking-plan-templates-from-mixpanel-amplitude-segment-and-more#lle4n0ay38-" target="_blank" rel="noreferrer noopener nofollow">ink</a> to an evaluation of a few free templates to start your research.</p>



<h3 class="wp-block-heading">Create the plan</h3>



<p>Once you have your template, start your internal planning discussions with questions like:</p>



<ul class="wp-block-list">
<li>What core business objects are we concerned with?</li>



<li>What metrics do we care about for those objects (that is, what do we want to track about them)?</li>



<li>Why do we want to track these metrics?</li>



<li>What data needs to be collected to obtain these metrics and how will it be defined?</li>



<li>Where can the data be obtained? Do we already collect it?</li>



<li>Who will govern the information once we have it?</li>



<li>Who will manage the data collection?</li>



<li>What format does the data need to be in to be useful?</li>
</ul>



<p>It can certainly be challenging on many fronts for the business and IT to come together to create a data tracking plan. However, facilitating this will be well worth the effort in terms of the clear data strategy objectives that will be produced. Avoiding the costs associated with misguided data projects will more than outweigh the time and energy spent in coordinated planning.</p>



<h2 class="wp-block-heading">Finally, update your data strategy, and implement changes.</h2>



<p>Once you have assessed your data collection processes and have identified improvements, you&#8217;ll need to assign priorities to your findings. Work with both the business and your technical team to set these priorities, as well as to build a roadmap for implementation. </p>



<p>As can be seen, the information you have gathered through cross-functional cooperation and through using these tools will help you to make a strong case to business leaders for the importance of these strategic improvements. </p>



<h2 class="wp-block-heading" id="h-want-to-learn-more">Want to learn more?</h2>



<p>Looking for more information about Data Strategy and how it can help align IT and business goals? Check out <a href="https://theserogroup.com/tag/data-strategy/">these posts</a>. </p>



<p>If you&#8217;d like to learn more about how we approach Data Strategy, or if you have some concerns about your SQL estate, give us a <a href="https://theserogroup.com/#contact" target="_blank" rel="noreferrer noopener">call</a>. We can help.</p>
<p>The post <a href="https://theserogroup.com/data-strategy/data-collection-two-key-tools-to-improve-your-data-strategy/">Data Collection: Two Key Tools to Improve Your Data Strategy</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5460</post-id>	</item>
		<item>
		<title>Are Information and Data Lifecycle Management Processes Different…and Who Cares?</title>
		<link>https://theserogroup.com/data-strategy/are-information-and-data-lifecycle-management-processes-different/</link>
		
		<dc:creator><![CDATA[Natasha Collins]]></dc:creator>
		<pubDate>Thu, 10 Aug 2023 12:50:53 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[IT Manager]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[Sero]]></category>
		<category><![CDATA[Sero Group]]></category>
		<category><![CDATA[Serogroup]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Consultant]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consultant]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<category><![CDATA[The Sero Group]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=5437</guid>

					<description><![CDATA[<p>Are Data Lifecycle Management (DLM) and Information Lifecycle Management (ILM) just fancy terms for the exact same thing &#8211; namely, data management? Will understanding these terms actually impact your data strategy in any meaningful way? Will knowing this distinction affect your business at all? Recently, we began a series of posts on data strategy by&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/are-information-and-data-lifecycle-management-processes-different/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/are-information-and-data-lifecycle-management-processes-different/">Are Information and Data Lifecycle Management Processes Different…and Who Cares?</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Are Data Lifecycle Management (DLM) and Information Lifecycle Management (ILM) just fancy terms for the exact same thing &#8211; namely, data management? Will understanding these terms actually impact your data strategy in any meaningful way? Will knowing this distinction affect your business <em>at all</em>?</p>



<p>Recently, we began a series of posts on data strategy by asking whether your <a href="https://theserogroup.com/data-strategy/how-to-justify-it-spend-is-company-data-an-asset-or-a-utility/" target="_blank" rel="noreferrer noopener">company data is an asset or a utility</a>. We then uncovered <a href="https://theserogroup.com/data-strategy/10-data-storage-considerations-for-growing-companies/" target="_blank" rel="noreferrer noopener">10 Data Storage Considerations to Improve Your Company Data Strategy</a>. In this post, I will argue that recognizing the distinction between DLM and ILM is important for IT leaders to help their companies get the most out of their data.</p>



<p>Now, the difference between Data Lifecycle Management (DLM) and Information Lifecycle Management (ILM) might initially seem like hair-splitting. However, while DLM incorporates management policies for the <em>physical </em>aspects of data <em>as data </em>(type, size, location, age, etc.), ILM addresses the <em>content</em> of the data <em>as information </em>(its accuracy, reliability, sensitivity/confidentiality, etc.).</p>



<p>Here are some of the differences and why <em>both</em> are important to consider.</p>



<h2 class="wp-block-heading">Data Lifecycle Management</h2>



<p>At its highest level, DLM addresses data creation, data management, and data deletion.</p>



<p>Within these categories, there are many other elements of data management that are included as well:</p>



<ul class="wp-block-list">
<li>Creation / Collection</li>



<li>Classification</li>



<li>Redundancy</li>



<li>Duplication</li>



<li>Integrity</li>



<li>Usage and Availability</li>



<li>Sharing</li>



<li>Storage</li>



<li>Security</li>



<li>Archiving</li>
</ul>



<p>All these data process elements when viewed through DLM are fundamentally concerned with the physical aspects of managing data.<strong> Failing to address these areas in your data strategy is to gamble with the health of your data structures and the value of your company data.</strong></p>



<h2 class="wp-block-heading">Information Lifecycle Management</h2>



<p>On the other hand, ILM addresses issues associated with the <em>information </em>the data contains. ILM establishes policies that manage the data quality, business relevance, regulatory compliance, and legal liability of the data.</p>



<p>Many of the specific areas addressed by ILM establish protocols for processing data in a way that ensures data accuracy, reliable delivery, protection of sensitive information, and compliance with data privacy laws. Some elements of ILM can include:</p>



<ul class="wp-block-list">
<li>Data De-Identification / Masking</li>



<li>Data Quality Frameworks &amp; Audits</li>



<li>Development and QA Environment Refreshes</li>



<li>Source Control</li>



<li>Master Data Management</li>



<li>Classification and Governance</li>



<li>Sharing &amp; Usage</li>



<li>Security</li>



<li>Regulatory Compliance Audits</li>
</ul>



<p>While many elements of the data lifecycle have relevance in both management models, they are viewed through a different lens in each model.</p>



<h2 class="wp-block-heading">So&#8230;Who Cares?</h2>



<p>So, why does recognizing this distinction matter? Will your business really suffer without it?</p>



<p>The answer is that it matters because if this distinction is not recognized, the two sets of management policies can get conflated, with one getting largely ignored. <strong>When either DLM or ILM is neglected, important elements of the data lifecycle can appear to be fully managed when in fact they are only partially addressed.</strong></p>



<p>Perhaps even more importantly, when IT leaders do not see these management policies as distinct, they risk missing out on the benefits that come with using both together, like:</p>



<ul class="wp-block-list">
<li>Improved system performance</li>



<li>Increased availability and accessibility of data</li>



<li>Improved data quality</li>



<li>Increased data consistency across the organization</li>



<li>Improved recoverability</li>



<li>Increased security</li>



<li>Increased user satisfaction</li>



<li>Controlled costs</li>



<li>Improved regulatory compliance</li>
</ul>



<p>In upcoming posts, we will unpack these models further while exploring more ways to improve your data strategy.</p>



<h2 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to work with The SERO Group?</h2>



<p>Would you like some outside input in any of these areas? We love to work alongside IT leaders and their teams to help them establish the use of best practices in their data environments.</p>



<p>If that’s something you’d like to learn more about,&nbsp;<a href="https://theserogroup.com/#contact" target="_blank" rel="noreferrer noopener">let’s have a conversation</a>.</p>
<p>The post <a href="https://theserogroup.com/data-strategy/are-information-and-data-lifecycle-management-processes-different/">Are Information and Data Lifecycle Management Processes Different…and Who Cares?</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5437</post-id>	</item>
		<item>
		<title>10 Data Storage Considerations for Growing Companies</title>
		<link>https://theserogroup.com/data-strategy/10-data-storage-considerations-for-growing-companies/</link>
		
		<dc:creator><![CDATA[Natasha Collins]]></dc:creator>
		<pubDate>Wed, 26 Jul 2023 19:03:33 +0000</pubDate>
				<category><![CDATA[Data Strategy]]></category>
		<category><![CDATA[Data Storage]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database Administration]]></category>
		<category><![CDATA[IT Manager]]></category>
		<category><![CDATA[Microsoft Azure]]></category>
		<category><![CDATA[Sero]]></category>
		<category><![CDATA[Sero Group]]></category>
		<category><![CDATA[Serogroup]]></category>
		<category><![CDATA[SQL]]></category>
		<category><![CDATA[SQL Consultant]]></category>
		<category><![CDATA[SQL Server]]></category>
		<category><![CDATA[SQL Server Consultant]]></category>
		<category><![CDATA[SQL Server Management]]></category>
		<category><![CDATA[The Sero Group]]></category>
		<guid isPermaLink="false">https://theserogroup.com/?p=5379</guid>

					<description><![CDATA[<p>As the business world becomes more and more data-centric, what questions does your growing company need to ask about its data storage? Recently, we began a series of posts on data strategy by asking whether your company data is an asset or a utility. In this post, we will look at 10 key data storage&#8230; <br /> <a class="read-more" href="https://theserogroup.com/data-strategy/10-data-storage-considerations-for-growing-companies/">Read more</a></p>
<p>The post <a href="https://theserogroup.com/data-strategy/10-data-storage-considerations-for-growing-companies/">10 Data Storage Considerations for Growing Companies</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>As the business world becomes more and more data-centric, what questions does your growing company need to ask about its data storage?</p>



<p>Recently, we began a series of posts on data strategy by asking whether your <a href="https://theserogroup.com/data-strategy/how-to-justify-it-spend-is-company-data-an-asset-or-a-utility/" target="_blank" rel="noreferrer noopener">company data is an asset or a utility</a>. In this post, we will look at 10 key data storage considerations that should be evaluated as part of your company data strategy.</p>



<h2 class="wp-block-heading">What is Data Storage?</h2>



<p>Data storage can be broadly defined as the collection and retention of information using digital technology.</p>



<p>Sometimes data storage refers to the physical hardware itself. Other times, it includes the processes connected with storing data. Both are important when considering data storage in the context of your company data strategy.</p>



<p>So, we can think about data storage in two categories. First, we will consider the storage infrastructure itself, including both the hardware and the data management systems. Second, we will touch on managing that platform – including backup, archiving, and retention policies.</p>



<h2 class="wp-block-heading">Data Storage Platform</h2>



<p>The data storage technology and vendor you choose will be a critical part of implementing your data strategy. Here are 7 important areas to evaluate.</p>



<h3 class="wp-block-heading">1) Size and Growth</h3>



<ul class="wp-block-list">
<li>How much data does your company currently store?</li>



<li>How rapidly is new data generated?</li>



<li>How fast and how large do you expect your data stores to grow?</li>
</ul>



<p>Awareness of the current size and growth patterns of your company’s data ecosystem is crucial for accurate planning.</p>



<h3 class="wp-block-heading">2) Data Storage Infrastructure</h3>



<ul class="wp-block-list">
<li>What does your current IT infrastructure consist of?</li>



<li>Have you recently made investments in updating hardware, or is company equipment nearing end-of-life?</li>



<li>Do you have internal talent that is tasked with managing that infrastructure?</li>
</ul>



<p>Any technology strategy must ask: What <em>can </em>and what <em>should </em>we manage internally? This question applies to data storage as much as to any other part of IT.</p>



<h3 class="wp-block-heading">3) Data Types and Workflows</h3>



<ul class="wp-block-list">
<li>Is your company primarily concerned with transactional data?</li>



<li>Do you have large bodies of reporting data?</li>



<li>What about unstructured data?</li>



<li>Does company leadership have plans to expand the ways it uses or generates data in the future?</li>
</ul>



<p>Different technologies support certain types of workflows better than others. So, knowing what your company wants to get out of its data both now and in the future will impact your data storage decisions.</p>



<h3 class="wp-block-heading">4) Traffic</h3>



<ul class="wp-block-list">
<li>How many data consumers do you expect to have and how will they access the data?</li>



<li>How many concurrent users or connected devices do you anticipate?</li>



<li>What types of data consumption are typical?</li>
</ul>



<p>How and how much your data is consumed will also impact data storage requirements. Therefore, accurately projecting this usage can save countless headaches later on.</p>



<h3 class="wp-block-heading">5) Data Storage: Cloud vs. On Prem</h3>



<p>Evaluating whether to use a cloud-based or on premise data storage solution is critical to your data strategy. So, be sure to include all of these areas when performing your analysis:</p>



<ul class="wp-block-list">
<li>Security</li>



<li>Budget/Cost</li>



<li>Regulatory Compliance</li>



<li>Location/Distribution</li>
</ul>



<p>Do your homework. Prominent tech leaders have strong arguments on both sides of the cloud vs. on prem debate. So, what is right for your company may not be the same as what is right for your industry peer. Evaluate the options in the light of your company&#8217;s budget, needs, and current state to come to the best decision. </p>



<h3 class="wp-block-heading">6) Data Storage Vendor</h3>



<p>Choosing the vendor of your solution is your next big decision. &nbsp;For a good article about questions to ask when evaluating vendors, see <a href="https://www.businesstechweekly.com/cybersecurity/data-security/10-crucial-data-storage-questions-to-ask-when-selecting-a-vendor/" target="_blank" rel="noreferrer noopener">this</a> article.</p>



<p>While we at The SERO Group specialize in SQL Server and Azure SQL, there are many vendors for data storage. Which vendor is right for your company? Budget, security, the requirements of the business, and the current state of your data environment will likely be your biggest considerations.</p>



<h3 class="wp-block-heading">7) Licensing for Data Storage</h3>



<p>Navigating licensing requirements can be a pain. However, carefully researching features that are unlocked with each licensing tier is important to getting the best service and support from your chosen data storage solution.</p>



<p>A careful cost-benefit analysis of licensing can be a game-changer for unlocking the highest potential of your data team as well. Sometimes advanced features are rightly deemed superfluous for your business case. However, at other times, higher licensing tiers afford security, recovery, performance, efficiency, or scalability options that are well worth the cost.</p>



<p>For SQL Server (whether on prem or on an Azure VM), this means considering Standard vs. Enterprise edition. Managed instances and Azure SQL databases have other important licensing considerations. See <a href="https://www.microsoft.com/licensing/docs/view/SQL-Server" target="_blank" rel="noreferrer noopener">here</a> for Microsoft&#8217;s description of the differences and <a href="https://medium.com/awesome-azure/azure-difference-between-azure-sql-database-and-sql-server-on-vm-comparison-azure-sql-vs-sql-server-vm-cf02578a1188" target="_blank" rel="noreferrer noopener nofollow">here</a> for a discussion of the differences between some of these options.</p>



<h2 class="wp-block-heading">Management Considerations: Backups, Archiving, and Retention</h2>



<h3 class="wp-block-heading">8) Backups</h3>



<ul class="wp-block-list">
<li>How are you currently backing up your data?</li>



<li>Have you <a href="https://theserogroup.com/wp-admin/post.php?post=3617&amp;action=edit" target="_blank" rel="noreferrer noopener">tes</a><a href="https://theserogroup.com/azure/how-to-test-sql-server-backups-using-dbatools/" target="_blank" rel="noreferrer noopener">ted</a> the recoverability of your backups?</li>



<li>Would your backups still be available if a site-level disaster occurred?</li>
</ul>



<p>Your backup strategy is critically important when thinking about data storage. Disasters and crisis events happen. In fact, we at The SERO Group have just about seen it all in terms of recovery efforts. Depending on your data storage platform, different backup considerations will apply to you.</p>



<p>There are usually three levels of backups that could be relevant to think about: <a href="https://theserogroup.com/the-sero-group/4-ways-to-better-manage-sql-server-without-a-dba/" target="_blank" rel="noreferrer noopener">local</a>, <a href="https://theserogroup.com/sql-server/using-vm-snapshots-to-backup-sql-server/" target="_blank" rel="noreferrer noopener">i</a><a href="https://theserogroup.com/wp-admin/post.php?post=4135&amp;action=edit" target="_blank" rel="noreferrer noopener">mage-level</a>, and offsite. So, be thorough when creating your strategy. Remember &#8211; frequency and redundancy are keys to a strong backup strategy. Your future self will thank you if confronted with a crisis!</p>



<h3 class="wp-block-heading">9) Data Archiving / Table-Level Snapshots</h3>



<p>So, why archive or take table-level snapshots of data if you have a solid backup strategy in place?</p>



<p>While this may not always be necessary, taking a snapshot of point-in-time data can be helpful or necessary for important data that may fluctuate (financial data, for example). These snapshots can also act as a point of redundancy in your backup strategy for critical data.</p>



<p>However, archives can require a significant amount of storage. So, how and where to store large amounts of snapshot data should be evaluated if an archiving strategy is used.</p>



<h3 class="wp-block-heading">10) Data Retention</h3>



<ul class="wp-block-list">
<li>How much data do you need to keep and for how long?</li>



<li>How long should your backups and archived data be in short-term storage?</li>



<li>What about long-term storage?</li>
</ul>



<p>You will need to consider any regulatory requirements that apply to your data when answering these questions, as well as the operational needs of the business.</p>



<h2 class="wp-block-heading" id="h-want-to-work-with-the-sero-group">Want to work with The SERO Group?</h2>



<p>Data storage can be a challenge, especially for growing companies. How to store the data? When to archive it? Where to store it? Who is responsible for it? All can be be challenging questions. </p>



<p>Our clients depend on their data. They need to know that their data is protected, that it is reliable, and that they can leverage it to make more informed and better decisions. </p>



<p>If that’s something you’d like to learn more about,&nbsp;<a href="https://theserogroup.com/#contact" target="_blank" rel="noreferrer noopener">let’s have a conversation</a>.</p>
<p>The post <a href="https://theserogroup.com/data-strategy/10-data-storage-considerations-for-growing-companies/">10 Data Storage Considerations for Growing Companies</a> appeared first on <a href="https://theserogroup.com">The SERO Group</a>.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5379</post-id>	</item>
	</channel>
</rss>
