Whether
they acknowledge it or not, one of the greatest challenges facing IT
professionals is effectively protecting business data, particularly the growing
amount of data stored on distributed desktops, remote and laptop computers.
Most storage management and backup software products
lack the critical features required for the complete protection of all
information stored on these machines. Specifically, users need comprehensive
recovery tools to help them easily find and restore lost data and quickly bring
idle computers back to full operation.
A new approach to data storage management and
protection is essential. The ideal solution should allow quick and easy
recovery from any type of information loss, including simple user errors, failed
software installations, hardware failures and lost or stolen laptops. It should
also address local storage on desktops and laptops as well as distributed
server storage.
Understanding the Risk
The effects on IT
environments are outlined in what Gartner calls, “the emergence of the nexus of
four forces” - the
- convergence of cloud
- information growth
- mobile
- social
- Data creation is growing at a rapid pace, with a single business’s daily data growth reaching Terabytes and being accessed and edited on various devices.
- Our exposure to social channels and new technologies has resulted in a cultural shift. It means that Users manage and share their data differently, leaving business critical information increasingly vulnerable to loss, theft and corruption.
- Business stakeholders often recognize the value of (and begin using) new technologies in the workplace before IT departments can harness and implement controls, resulting in multi-device proliferation and increasingly mobilized and shared data.
- The massive increase in mobile workers (60% of those surveyed this year use laptops as their primary device) has meant that IT can’t assume that user-managed, server-focused data protection is a secure data protection strategy.
To
keep all the data reasonably resilient, it is becoming abundantly clear that data
protection, it must begin with
endpoint devices, which will mean to completely remove users from the data
backup process.
The
results of the 2012 Data Loss Survey Results: The State
of Business Data Protection 2012 was just released.
The participants of the 2012 Data Loss Survey
are mostly employed by companies with over 100 users, 37% of respondents
work for enterprise organizations of over 1000 users.
In total, over 200 (mostly enterprise)
organizations were represented, with respondents’ geographical locations split
as follows:
27.2% North American,
18% EU and
48.7% African, with
5.6% of
respondents spanning the globe.
Remote is Here to Stay
With more than half of
executives utilizing laptops (60-%) as their primary device with another 2% using
tablets, we have seen the IT mindset change from server data protection to an
outside, inwards approach – looking at endpoint devices as the start of an
organizations data protection strategy.
Today, BYOD has become a
commonplace business IT challenge as more companies need to cater for a
large number of users, including C-level execs, who want to access email and
other company data on the device of their choice.
40% of respondents
reported that their companies allow BYOD – and another 8% are planning to.
Which still leaves the majority of 52% who do not allow BYOD in the workplace;
however, few realize that it’s happening anyway. You know what they say, “Just
because you’re paranoid, doesn’t mean they still aren’t out to get you…”
We’ve seen a significant
increase in user mobility and technology independence. This in turn
increases company risk of data loss if backups are not automated and
centrally managed. Every year we report the same result – companies who
employ user-managed data backup end up losing their data.
Almost
every single survey respondent (who stated that their company expects users to
follow a data backup policy) reported users not following policy as their
biggest data protection challenge.
37%
have no real protection against unauthorized access to their data if
they had to lose their laptop, meaning that their companies are not compliant
with Corporate Governance and that company and customer data is severely at
risk. If these Executives were to
lose their business data only 69% could recover their files.
Do you feel secure in the knowledge that your endpoint
data is 100% protected from data theft, data loss and data breaches?
57.1 said No; 42.9 said yes.
Can your company recover all your critical data for
any and all users, the next time there is an incident?
69.4 said yes; while 30.6 said no.
Now, anyone in this space
knows the shape of the majority of the current backup technologies, tapes, and
cartridges aren’t going to cut it. They
are fraught with errors due to aged media, poor storage, magnetic interference,
and dilapidating technology; hence, recovery is a roll of the dice.
Where does the Buck Stop?
Only 63% of our
respondents are aware of the personal liability attached to protecting their
data, the other 37% did not know that they may be held personally
responsible for lost confidential company data.
Most companies have given
ownership of data protection to a specific employee, who is then responsible
for formulating a data protection strategy, for implementing the appropriate
solutions and procedures – and understands the required Compliance regulations
and legalities. Which is an odd
phenomenon, for those very same people say that the responsibility of a failure
falls on the head of IT.?
So the people expected to perform the duty have no accountability for their
performance.
Of the companies we surveyed, it is most often (58%) the
responsibility of the Head of IT to ensure effective business data protection.
• 11% stated that it is
the CEO’s responsibility, and 7% said the responsibility lies with the Head of
Risk.
• 16% were unsure of who
in their organization is responsible for protecting business data.
Hmmmmm, no surprise there,
unless you’re the Head of IT. In short,
the Head of IT better wrangle up those cows, unless they are comfortable with
the cows securing the cabbage, and we all know the end of that story.
So what can you do? Automate the management, backup, and security of all your endpoints. incidentally this doesn't just mean Mobile device Management, but it's a start, for even though it's only 2%, it's rising faster than flood waters during a hurricane. Remember, you still have to address the other 60% of laptops. This is where a good enterprise endpoint management strategy will come in handy.
Source(s):
- http://cibecs.com/wp-content/uploads/2012/05/Cibecs-IDG-2012-Data-Loss-Survey.pdf
So “Once more unto the breach, dear friends, once more;”
____________________________________________________________
About Rick Ricker
An IT professional with over 21 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.
For more information, contact Rick at (800) 399-6085





No comments:
Post a Comment
Thanks for your input, your ideas, critiques, suggestions are always welcome...
- Wasabi Roll Staff