Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Solutions: Laptops. Privacy. ID Theft. Try Online Backup

By Timothy A. Hannibal
July 1, 2006
There is local and offsite online backup for corporate and branch offices.


In today’s around-the-clock business environment, critical data is growing at an explosive rate. Protecting this information is a crucial business need. So chief security officers (CSO) need immediate and constant access to important information to ensure business continuity when disasters happen.

At the same time, a growing number of incidents point to the vulnerability of laptops offsite, as enterprises crack down on placing sensitive data on laptops that travel with executives.

That is why more and more companies each day are considering and ultimately switching to online data backup.

Here’s how it works. The first step with online backup is for the service provider to supply the company with software to be installed on the PC or server that needs to be protected. The software will enable the user to hand-select the files, databases or email to be backed up. Once the software is installed, the user will be asked to establish a backup schedule, which can occur as frequently as the user needs.

Next, the data is compressed, encrypted and sent offsite. After the initial backup the subsequent backups will be reviewed for changes since the last backup and only the changes will be sent offsite. Once uploaded to the service provider’s data center, the data is available to be restored 24 hours a day, seven days a week.

Now, let’s review some of the benefits and limitations of online data backup. First, the advantages:
  1. Online backup relies on an automated process that does not require human intervention. Backup status is provided to the customer by e-mail after every scheduled backup, making the process easily monitored.
  2. Data is stored securely off-site. In case of any emergency, disaster or fire at the business location, all data is safely stored off the premises.
  3. Set-up and installation can be quick and simple. Many times installation can be done remotely and completed just with a simple phone call.
  4. Backup and data recovery can be simpler and faster than more traditional methods, such as tape. Just a couple clicks and your backup or restore is underway.
  5. Online backup allows the user to centrally manage data protection for remote office locations.
  6. There are no upfront costs to get started. No purchase of hardware or software is required.
  7. Online backup provides the user with the ability to back-up and restore multiple versions of files. This can be useful if earlier versions of a document need to be retrieved.
  8. Upgrades are made frequently and, for the customer, effortlessly. Using an online backup provider means that product improvements are free and conducted regularly.
  9. Online backup is available to all size companies – big and small – which helps the small and medium-sized businesses compete in a global market, giving them access to resources that have traditionally only been available only to larger enterprise companies.


Lost laptops with sensitive business information have grabbed headlines and CEO headaches. More CSOs are opting to add biometrics for laptop access and also move data to online backup, just in case.

Benefits and disadvantages

The rapid increase in businesses adopting online data backup is an indication that the benefits have been outweighing the disadvantages. However, it is important to be aware of some potential pitfalls:
  1. Internet speed and availability can be an influencing factor in reviewing online backup service for a company. The duration of backups and restores will be limited by the speed of the Internet connection. Therefore, if an internet connection is unavailable, it may not be possible to perform a backup or restore. To avoid this from happening to you, be sure that your online backup provider is able to save a copy of the backup on your Local Area Network (LAN) as well as offsite. In the event that the company needs to perform an emergency restore and the internet connection is unavailable or the amount of data is extremely large, it is important to have a copy of the backup on the network. Many online backup providers also have the ability to return data on CD, DVD or USB in the event of a disaster.
  2. Relying on an external company to protect your critical business data can be seen as a risk. That is why it is important to meet with the service provider, ask to tour their data center, and do some research. Some businesses have chosen to store unencrypted backup tapes with an offsite storage company and we have heard many stories of these tapes being lost and the location of unsecured data is unknown. With online backup, this risk is eliminated by ensuring that data is encrypted and only the user holds the key to decrypt the data.
  3. The cost can be a potential disadvantage if the service provider is not chosen wisely. Most service providers charge on a monthly basis for online backup. One factor to consider is that you will get the best deal if you only pay for the data you are storing offsite. Avoid paying for pricing plans that require you to pay for pricing commitment where you pay for storage space not used. Also, some online backup providers charge for uncompressed data -- be sure that your service provider charges only for compressed data.

If you decide that you would like to pursue online data backup for your company, below are seven simple – but critical -- questions to ask the potential service provider:
  • Can I obtain customer references from companies with similar requirements?
  • Is free customer support available 24 hours a day, seven days a week?
  • Is the backup of mail servers and open databases included? (Don’t be misled -- some companies require the purchase of additional software for protecting this type of data.)
  • Will my data be encrypted during transfer and while stored on remote servers?
  • Can we have a copy of your Service Level Agreement (SLA)? The absence of a guarantee on uptime should be an element considered when reviewing online backup providers.
  • Will my data be stored in a secure data center?
  • Does the service provider have a second data center where the data is protected?

Online backup can be an excellent way to augment your existing backup solution or can serve as a complete replacement to traditional backups. Be educated about the pros and cons, and follow this advice to determine a solution that best suits your company’s needs.

Human error, disasters, file corruption, and hardware failure can and do happen – more often than we’d like to admit. A little planning today can go a long way to ensure the safety of your business tomorrow.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Timothy Hannibal is the president and CEO of VaultLogix, Ipswich, Mass.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • surveillance 2 responsive default security

    New Battery Backup Solutions Increase System Reliability and Reduce TCO

    See More
  • video cameras

    New Battery Backup Solutions Usher in a New Generation of DC Power for Professional Security Systems

    See More
  • Identity Theft Resource Center Proposes Child ID Theft Prevention Database

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

  • surveillance.jpg

    Surveillance, Privacy and Public Space

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!