Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Kroll Ontrack Urges Mgt Review

MINNEAPOLIS -- Each year, millions of people make new years resolutions on how they would like to manage their data, from the memorable family photograph to the legally sensitive document, but few take stock mid-year to track their progress. At the same time, according to statistics from Kroll Ontrack®, the leading provider of data recovery and legal technologies products, almost 90 percent of data loss occurs due to human error, software failures, or mechanical failure.

To help businesses take stock, Kroll Ontrack has launched a mid-year barometer checklist, enabling managers to breathe new life into long forgotten aspirations. The six point list advises the following:

Minimize Your Data Footprint. A company should only retain data that can be linked to a specific requirement of a necessary business process or obligation. Also, reduce the number of places data is stored. If there is no legitimate business need, companies should limit the number of electronic and hard-copy locations in which data is maintained. Re-evaluate data minimization before the end-of-the-year and use both internal audit and specialist external resources for this process.

Testing Times. Recognize the risks of wireless data transmission by regularly testing to ensure that no one is running a rogue network, and that authorized wireless networks are properly protected.

Secure Back-up Tapes. To increase security, back-up tapes may be encrypted, so if the tape is lost, sensitive information will still be protected. But there’s more that can be done to protect back-up files and other data in transit. Implementing exceptional security practices within an organization means that shipping or off-site storage must be held to the same high-level security and operational standards to which the organization holds itself. In some cases, corporate security, internal audit specialists or an independent third party can help by providing an assessment of the vendor’s physical and operational security practices.

  • 1