Data backup security
Storage administrators are increasingly relying on encryption and other security technologies to guard sensitive data. Stay on top of the latest data backup security news and resources available with tips and advice from leading experts.
Top Stories
-
News
23 Apr 2024
Veeam acquires Coveware for incident response capabilities
Coveware will remain operationally independent with its cyberincident capabilities and ransomware research complementing the data backup vendor's recovery offerings. Continue Reading
-
News
23 Apr 2024
Cohesity adds confidential computing to FortKnox
Cohesity is partnering with Intel to bring confidential computing technology to its FortKnox vault service -- a welcome, if limited, security addition, according to experts. Continue Reading
-
Answer
13 Nov 2018
What 3 issues can affect your data backup procedures?
Do you have challenges with your data backup process, such as a lack of the right security? The three directives here will help with your overall business continuity. Continue Reading
-
Tip
25 Oct 2018
How blockchain data storage may revolutionize the enterprise
Blockchain for data storage promises to bring added trust, reliability and security to storage, but is it ready to become a mainstream technology? Experts offer their views. Continue Reading
-
News
13 Sep 2018
CEO: Veeam database exposure fixed, investigation launched
Veeam co-CEO Peter McKay said there's 'no excuse' for the exposure of a marketing database and millions of email addresses. He said the company is being proactive in its response. Continue Reading
- 06 Sep 2018
-
Opinion
06 Sep 2018
Preventing ransomware attacks is a top storage vendor claim
Storage vendors advance silly and not-so-silly claims about how data backup and protection technologies are the answer to ransomware prevention and growing ransomware fatalism. Continue Reading
-
Tip
21 Aug 2018
4 tips for backup infrastructure maintenance
Like a car or any other important machine or device, backup architecture should have a maintenance plan. This process will help ensure the health and integrity of your backups. Continue Reading
-
Answer
27 Jun 2018
What backup security measures protect against data breaches?
Backup security varies across different storage media. What works for tape-based backup may not work for disk backups, so plan your data protection strategy accordingly. Continue Reading
-
Quiz
25 Jun 2018
Can you recover from ransomware? Take our quiz and find out
Ransomware recovery is a complex, often expensive process. Are you prepared in the event of an attack? It may be time to ask yourself the difficult (or perhaps easy) questions. Continue Reading
-
News
14 Jun 2018
Iron Mountain data recovery adds ransomware protection
The isolated nature of Iron Mountain's latest Iron Cloud offering is important to its battle against ransomware. The Virtual Cleanroom provides an offline recovery environment. Continue Reading
-
Opinion
06 Jun 2018
What's new with data protection systems? Everything
The next backup hardware you purchase will likely come with integrated backup software. That changes the buying dynamic and complicates the decision-making process. Continue Reading
-
Feature
06 Jun 2018
Use object storage technology to fight ransomware infection
Done right, object storage reduces the likelihood of a successful ransomware attack and, in some instances, lets you get data back without paying a ransom. Continue Reading
-
News
17 May 2018
Protection from ransomware requires layered backup, DR
A strategy for protection and successful recovery from ransomware includes everything from monitoring tools to offline storage. Organizations should use multiple methods. Continue Reading
-
Tip
07 May 2018
GDPR backup and data protection: Five steps to implement now
Time is running out. If you haven't yet determined how to comply with the strict GDPR data protection rules, you better get started. Storage and backup play key roles. Continue Reading
-
Answer
11 Apr 2018
Can integrating data protection and management work?
While you may want to jump on the data management and protection train, consider first how combining the two in one product will affect your systems and users. Continue Reading
-
Opinion
03 Apr 2018
Want IT resiliency? Look to both security and disaster recovery
Security, protection from hackers and ransomware, disaster preparedness and disaster recovery are all means to the goal of resilient IT infrastructure and business processes. Continue Reading
-
Feature
08 Mar 2018
Ten ways to protect intellectual property and trade secrets
Industrial espionage is on the rise, and more data means more risk. Find out how to control the growth of data stores and secure your organization's most valuable assets. Continue Reading
-
Feature
08 Mar 2018
How ransomware variants are neutralizing data backups
The latest iterations of ransomware aim to undercut backups as an effective method for recovering from attacks. Learn how to overcome this vulnerability. Continue Reading
-
Opinion
08 Mar 2018
The EU's GDPR will make us better storage managers
The European Union's General Data Protection Regulation has organizations worldwide rethinking storage management to their and their customers' benefit. Continue Reading
- 08 Mar 2018
- 08 Mar 2018
-
E-Zine
08 Mar 2018
The future of flash storage: Is NVMe right for your enterprise?
Cracks in the SAS and SATA protocols started to appear with the rise of SSDs and the exponential performance improvements they delivered over HDD technology. This led to the development of the nonvolatile memory express protocol to exploit flash's potential. As the future of flash storage, NVMe addresses many of SAS and SATA's shortcomings by, among other things, connecting storage devices closer to the processor to reduce latency and introducing parallelism using multiple I/O queues and greater queue depth to match flash's ability to process many requests in parallel -- something SAS and SATA drives can't do. NVMe SSD adoption is leading to new storage architectures and helping give rise to disaggregated approaches to storage. NVMe-based devices come at a cost premium, however. Find out if and when you should move to NVMe and what the best use cases are for the future of flash storage and your enterprise.
Monetizing malware through ransomware has led to massive financial losses for companies worldwide. Ransomware is a megabillion-dollar industry and is becoming more sophisticated all the time. Although data backup restoration remains the best way to deal with a ransomware attack, it's no longer foolproof. It's time to rethink your organization's backup and restoration processes, acknowledge the hidden dangers of replication and revisit your permissions model to strengthen your defenses against the ransomware threat. Here's how.
Economic espionage, the theft of intellectual property and trade secrets, is another threat U.S. companies face. It can be rogue employees with access to company information doing the stealing, but most often, cybercriminals commit the crime. Effectively combatting economic espionage requires implementing a range of IT measures covered in this article.
Continue Reading -
Feature
19 Feb 2018
GDPR personal data requirements mark key business actions
Implementing GDPR is not a choice for organizations holding EU citizens' data. These organizations must know their data, identify individuals involved and review data management. Continue Reading
- 12 Feb 2018
-
E-Zine
12 Feb 2018
The best enterprise storage systems and services of 2017
For 16 years, Storage magazine and SearchStorage have recognized the best enterprise storage systems with our annual Products of the Year awards. For this year's competition, vendors submitted new and upgraded products from the past year across five categories, including backup and disaster recovery hardware, backup and DR software and services, software-defined storage, storage arrays and storage management tools. Judges for the competition included consultants, users, analysts and Storage magazine and SearchStorage writers and editors. They assessed products based on innovation, performance, ease of integration, ease of use and manageability, functionality and value. Of the 47 finalists, only the best enterprise storage systems won coveted gold, silver or bronze to become one of our 2017 Products of the Year.
Time is of the essence. If you haven't started getting ready for the European Union's General Data Protection Regulation (GDPR), it is time to start. GDPR goes into effect May 25, 2018, and is designed to protect EU residents' privacy and personal data by specifying rules, processes and technologies organizations must follow or use. Noncompliance -- both major and minor -- could lead to significant financial penalties that climb high enough to put some companies out of business. Compliance isn't optional; it's a must. While it won't be easy -- in some cases, particularly so -- to meet the GDPR's 87 pages and 99 articles of specifications and regulations, it isn't impossible. Read on to find out everything you need know about GDPR, see what it means for your organization and, most importantly, learn how to make sure you're not on the short end of the GDPR compliance stick.
Continue Reading -
Feature
12 Feb 2018
Are you ready to comply with GDPR requirements?
Compliance with the European Union's General Data Protection Regulation isn't optional. Noncompliance could be costly and possibly disastrous. Find out what you need to know. Continue Reading
-
Tip
18 Jan 2018
GDPR data protection officer role and responsibilities
The data protection officer, required for many organizations to be compliant with the EU's GDPR, will face challenges in the new role but could improve how data is handled. Continue Reading
-
Answer
09 Jan 2018
How can I encrypt backups for better data protection?
Don't let backup data encryption fall through the cracks. When encrypting backups, key management and compression are just two of the best practices for optimum security. Continue Reading
-
Feature
05 Dec 2017
Trends in data storage 2018: Five hot techs to watch
Our hot data storage technology trends for 2018 include predictive storage analytics, ransomware protection, converged secondary storage, multi-cloud and NVMe over Fabrics. Continue Reading
-
Feature
29 Jun 2017
Your top five ransomware backup and recovery questions answered
Are you worried about ransomware? If not, you might want to reconsider. Proper preparation and a backup strategy are vital to staying afloat once a ransomware attack occurs. Continue Reading
-
Definition
17 Apr 2017
Oracle RMAN (Oracle Recovery Manager)
Oracle RMAN (Oracle Recovery Manager) is a utility built into Oracle databases to automate backup and recovery; it includes features not available in third-party backup tools. Continue Reading
-
Tip
06 Mar 2017
Get smart with cloud backup security through 'CIA'
Encryption is just one important element of backup data security in the cloud. Ask the right questions of your organization and your cloud provider to make sure your data is safe. Continue Reading
-
Tip
28 Jun 2016
Use Microsoft Azure Key Vault to protect your data backups
The Azure Key Vault can serve as data backup protection through its encryption key storage management. Explore how to set up the vault and administer it in your organization. Continue Reading
-
Tip
23 Dec 2014
Restoring data from backups after a security breach
Once you've established how an attacker penetrated your network's defenses, and what they did after gaining access, the real work of restoring data begins in the wake of a security breach. Continue Reading
-
Tip
25 Nov 2013
How to dispose of unwanted backup media
Brien Posey looks at the inherent problems with backup media disposal. Because it contains sensitive data, you must dispose of it safely. Continue Reading
-
Tip
26 Apr 2013
Pros and cons of backup tape encryption
Independent backup expert Brien Posey outlines what's good and what's bad about backup tape encryption in this tip. Continue Reading
-
Tutorial
04 Apr 2011
Tape backup encryption best practices
Tape backup encryption is being used for many organizations, but figuring out how to implement it can be challenging. Learn about tape encryption best practices in this article. Continue Reading
-
Tip
25 Jan 2010
How to back up encrypted files and how to use the Encrypting File System
With data backup security being such a high priority, more organizations are encrypting the contents of their file servers. Although encryption improves security, it can complicate an organization's backup efforts. Continue Reading
-
Tutorial
11 Mar 2009
Data backup and recovery technology tutorials
Learn about the latest data backup and recovery technology trends in our technology tutorials. Continue Reading
-
Tip
01 Dec 2008
How to back up and restore a certificate store
One type of server that is critical to back up is your enterprise certificate authority. If you lose your certificates, you lose data. Continue Reading
-
Tip
14 Jul 2008
Data deletion or data destruction?
It's often assumed that once data has been marked for disposal, it no longer requires much attention. But when data backups or archives are deleted, are they really gone? Continue Reading
-
Tip
05 Jun 2007
How to destroy data on backup tapes
This tip offers guidelines for destroying data on backup tapes, with information about degaussing, tape cartridge destruction, tape reuse and record keeping. Continue Reading
-
News
05 Jun 2006
Guide to backup security
News of a lost tape can damage a company for years. Storage administrators are increasingly relying on encryption technologies to guard sensitive data on tape, disk or WAN. Continue Reading