No matter what type of operating system is implemented, it is critical for users to employ good methods for data protection and recovery.