Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Solutions: Laptops. Privacy. ID Theft. Try Online Backup

By Timothy A. Hannibal
July 1, 2006
There is local and offsite online backup for corporate and branch offices.


In today’s around-the-clock business environment, critical data is growing at an explosive rate. Protecting this information is a crucial business need. So chief security officers (CSO) need immediate and constant access to important information to ensure business continuity when disasters happen.

At the same time, a growing number of incidents point to the vulnerability of laptops offsite, as enterprises crack down on placing sensitive data on laptops that travel with executives.

That is why more and more companies each day are considering and ultimately switching to online data backup.

Here’s how it works. The first step with online backup is for the service provider to supply the company with software to be installed on the PC or server that needs to be protected. The software will enable the user to hand-select the files, databases or email to be backed up. Once the software is installed, the user will be asked to establish a backup schedule, which can occur as frequently as the user needs.

Next, the data is compressed, encrypted and sent offsite. After the initial backup the subsequent backups will be reviewed for changes since the last backup and only the changes will be sent offsite. Once uploaded to the service provider’s data center, the data is available to be restored 24 hours a day, seven days a week.

Now, let’s review some of the benefits and limitations of online data backup. First, the advantages:
  1. Online backup relies on an automated process that does not require human intervention. Backup status is provided to the customer by e-mail after every scheduled backup, making the process easily monitored.
  2. Data is stored securely off-site. In case of any emergency, disaster or fire at the business location, all data is safely stored off the premises.
  3. Set-up and installation can be quick and simple. Many times installation can be done remotely and completed just with a simple phone call.
  4. Backup and data recovery can be simpler and faster than more traditional methods, such as tape. Just a couple clicks and your backup or restore is underway.
  5. Online backup allows the user to centrally manage data protection for remote office locations.
  6. There are no upfront costs to get started. No purchase of hardware or software is required.
  7. Online backup provides the user with the ability to back-up and restore multiple versions of files. This can be useful if earlier versions of a document need to be retrieved.
  8. Upgrades are made frequently and, for the customer, effortlessly. Using an online backup provider means that product improvements are free and conducted regularly.
  9. Online backup is available to all size companies – big and small – which helps the small and medium-sized businesses compete in a global market, giving them access to resources that have traditionally only been available only to larger enterprise companies.


Lost laptops with sensitive business information have grabbed headlines and CEO headaches. More CSOs are opting to add biometrics for laptop access and also move data to online backup, just in case.

Benefits and disadvantages

The rapid increase in businesses adopting online data backup is an indication that the benefits have been outweighing the disadvantages. However, it is important to be aware of some potential pitfalls:
  1. Internet speed and availability can be an influencing factor in reviewing online backup service for a company. The duration of backups and restores will be limited by the speed of the Internet connection. Therefore, if an internet connection is unavailable, it may not be possible to perform a backup or restore. To avoid this from happening to you, be sure that your online backup provider is able to save a copy of the backup on your Local Area Network (LAN) as well as offsite. In the event that the company needs to perform an emergency restore and the internet connection is unavailable or the amount of data is extremely large, it is important to have a copy of the backup on the network. Many online backup providers also have the ability to return data on CD, DVD or USB in the event of a disaster.
  2. Relying on an external company to protect your critical business data can be seen as a risk. That is why it is important to meet with the service provider, ask to tour their data center, and do some research. Some businesses have chosen to store unencrypted backup tapes with an offsite storage company and we have heard many stories of these tapes being lost and the location of unsecured data is unknown. With online backup, this risk is eliminated by ensuring that data is encrypted and only the user holds the key to decrypt the data.
  3. The cost can be a potential disadvantage if the service provider is not chosen wisely. Most service providers charge on a monthly basis for online backup. One factor to consider is that you will get the best deal if you only pay for the data you are storing offsite. Avoid paying for pricing plans that require you to pay for pricing commitment where you pay for storage space not used. Also, some online backup providers charge for uncompressed data -- be sure that your service provider charges only for compressed data.

If you decide that you would like to pursue online data backup for your company, below are seven simple – but critical -- questions to ask the potential service provider:
  • Can I obtain customer references from companies with similar requirements?
  • Is free customer support available 24 hours a day, seven days a week?
  • Is the backup of mail servers and open databases included? (Don’t be misled -- some companies require the purchase of additional software for protecting this type of data.)
  • Will my data be encrypted during transfer and while stored on remote servers?
  • Can we have a copy of your Service Level Agreement (SLA)? The absence of a guarantee on uptime should be an element considered when reviewing online backup providers.
  • Will my data be stored in a secure data center?
  • Does the service provider have a second data center where the data is protected?

Online backup can be an excellent way to augment your existing backup solution or can serve as a complete replacement to traditional backups. Be educated about the pros and cons, and follow this advice to determine a solution that best suits your company’s needs.

Human error, disasters, file corruption, and hardware failure can and do happen – more often than we’d like to admit. A little planning today can go a long way to ensure the safety of your business tomorrow.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Timothy Hannibal is the president and CEO of VaultLogix, Ipswich, Mass.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • New Battery Backup Solutions Increase System Reliability and Reduce TCO

    See More
  • video cameras

    New Battery Backup Solutions Usher in a New Generation of DC Power for Professional Security Systems

    See More
  • Identity Theft Resource Center Proposes Child ID Theft Prevention Database

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • surveillance.jpg

    Surveillance, Privacy and Public Space

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing