Data-recovery service providers are tasked with saving important data for you when something goes wrong — a drive crashes or storage device is dropped, and no backup is available. But do you trust them with the important data you let them recover or could they actually be a source for a data breach?
A survey of 769 IT professionals published this week finds those surveyed need to find out more about the third-party data-recovery services their organizations use. For example, according to the survey, 67% felt that encryption they had in place protected their organizations from data loss or theft during the data recovery process. But encryption keys are often handed over to the third-party data recovery service provider as part of the process, according to the study done by Ponemon Institute.
Ponemon’s “Trends in Security of Data Recovery Operations” report says of the 87% of survey respondents who said their organization had at least one data breach in the past two years, “21% say the breach occurred when a drive was in the possession of a third-party data service provider.”
Source…
Tags: analyzing data, apps, background checks, certifications, Certified ISO, cleanroom, Cloud Services, Computing, confidentiality, customers, data, data breaches, data loss, Data Recovery Operations, Data-recovery, data-theft, desktops, devices, documentation, DriveSavers Data Recovery, encryption keys, hard drives, hardware, Helpdesks, internet, IR professionals, IT professionals, networks, Online, organizations, Ponemon, proof-of-custody, providers, research, researchers, Security, servers, Software, speed of recovery, storage-device disposal, Surveys, technology, third-party services, vetting process, web
Forty-eight percent of U.S. tablet device owners have used them to transmit all kinds of sensitive data, according to a survey released recently by Harris Interactive and FuzeBox.
Considering the explosive increase in tablet computer adoption, this is not entirely shocking news, but it should give pause to business owners and IT professionals. Sometimes without the explicit blessing of the company, employees are increasingly using tablets to answer work email and conduct day-to-day business. Read More…
Tags: advantages of using a consultant, best Internet Phone Service, business owners, Chicago Computer Help Desk, Chicago Computer Services, Chicago Data Center, Chicago Internet Providers, chicago PC Technician, Chicago Telcom Audits, Chicago VoIP, cloud computing, Cloud Computing Chicago, computer consultant, Computer Consultants, Computer Help Desk, Computer Install, computer network services, computer programmers, computer Serurity, Computer Services, Computer Technician in Chicago, Computer Technician Outsourcing, Computers, Computing, connections, corporate networks, data, data centers, data transmission, day-to-day business, Desktop Services, desktops, device owners, devices, Email, email services, exploits, FuzeBox, Harris Interactive, Help Desk Services, hosted exchange, information, information technology, insecure networks, internet, IT, IT Audits, IT Outsourcing, IT professionals, IT support services, IT teams, laptops, linksys routers, managed IT services, Network Design, network management, Network Optimization, Network routers, Network Services, network solutions, network support services, networks, Online, online data backup, PC repairs, Routers, secured connections, secured networks, Security, security rules, sensitive data, Server Management, smartphones, strong passwords, Surveys, tablet adoption rates, tablets, technical support, technology, Telcom Audits, telephone auditing review, The Syber Group, Virtual Computers, Virtual Machine, Virtualization, viruses, VoIP in Illinois, VoIP MPLS, voip office phone systems chicago, web, Windows Technician, Wireless, Wireless Internet