Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Cybersecurity News

Secure Data Recovery Mythbusting

By Todd Johnson
October 9, 2012

 

According to a 2011 report from IT analyst firm IDC, the world’s information is doubling every two years. In 2011 the world was expected to create a staggering 1.8 zettabytes of data. By 2020 the world is expected to generate 50 times the amount of information and 75 times the number of "information containers" while IT staff to manage it will grow less than 1.5 times.

From a natural disaster ruining your corporate servers to an employee accidently deleting files to a security breach of your customer files, without the right support both from IT and an outside contractor, a data disaster could wreak havoc on your organization and its ever-growing, ever-important data

However, even the most advanced IT and security professionals can be unprepared to handle a major data disaster. Myths about working with a data recovery provider abound, but you don’t need to fear data disasters any longer.

Myth: Every data recovery provider offers the same trustworthy service, so I know my data is always in good hands.

Fact: Many data recovery providers claim to have a strong commitment to trustworthy service and sound security, but do your homework ahead of time to protect yourself and your most valuable assets. Additionally, find an authorized service provider that can handle highly sensitive information and adhere to U.S. government protocols. Maintaining an SAS 70 Type II Certification, a widely recognized auditing standard developed by the American Institute of Certified Public Accountants (AICPA),  for data recovery services ensures security protocols and processes are in place to protect your data while it is being handled by a recovery provider.

Myth: Our data is password protected so my enterprise doesn’t need to worry about its information being compromised.

Fact: Don’t assume that your data is safe just because you have a password installed. Choose a data recovery provider that can ensure the safety of your sensitive information and returns it in an encrypted format. Moreover, your provider should employ a comprehensive Information Security Policy that covers all data handling and data security protocols/standards.

Myth: Data recovery providers do not adhere to my organizations’ security requirements, so I’m not comfortable shipping a damaged or corrupt hard drive to a data recovery facility.

Fact: Your chosen provider should adhere to your organizations’ security requirements through all steps of the recovery process, not just during the actual recovery phase. Make sure the provider has ongoing security education for employees, exacting internal controls, sound physical security requirements and a strong commitment from senior management to maintain its security program.

Myth: I don’t trust my data going to a third party because I have no visibility into where my data is actually going.

Fact: After the headaches of data loss, the last thing you need to worry about is where your data is going and if your enterprise will get it back. An expert provider understands the urgency of rapidly responding to all data loss incidents and will give you a deep understanding of where your data is and where it’s going. Consider a provider that offers remote, in-lab and on-site recovery services, among others, to provide you with the right solution for your specific data loss situation. Also ask for regular status updates on your recovery.

Evaluating a respected data recovery provider in advance of a data disaster is the best way to ensure that you are not debunking a recovery myth in the midst of a problem. Working with senior management, IT and security professionals need to begin planning for a disaster now so a plan is in place if a problem should arise.  Additionally, you should never fear asking your data recovery provider for more insight into their process and security protocols.

At the end of the day, your corporate information is the lifeline of your organization. Placing it in the wrong hands could create problems for your business larger than your original data disaster. 

KEYWORDS: cyber security data breach data recovery data security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Todd Johnson, Vice President, Operations, Data Recovery Services and Software, Kroll Ontrack

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-cyber

    What Every Small Business Owner Should Know About Data Backup and Recovery

    See More
  • Most Countries without Cybersecurity Strategy

    21% of SMBs Don't Have a Data Backup or Disaster Recovery Solution in Place

    See More
  • Workers Monitor Hurricane Harvey

    Arkansas and Oklahoma Share Data Centers to Improve Disaster Recovery Efforts

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing