SHARE
Facebook X Pinterest WhatsApp

Enterprises Still Lax on Storage Security

Despite the explosion of data and the large numbers data breaches, enterprises are not doing enough to encrypt their backup data, according to a study conducted jointly by security vendor Thales Group and Trust Catalyst. The results of the study, released yesterday, show that backup tapes are neglected in administrators’ security efforts. Of the 330 […]

Oct 29, 2008
Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Despite the explosion of data and the large numbers data breaches, enterprises are not doing enough to encrypt their backup data, according to a study conducted jointly by security vendor Thales Group and Trust Catalyst.

The results of the study, released yesterday, show that backup tapes are neglected in administrators’ security efforts. Of the 330 respondents from large enterprises worldwide, 35 percent said they do not know whether or not they will encrypt their backup tapes.

“Traditionally, storage has been a domain in and of itself, and IT security has been focusing on front-facing business applications, so they don’t pay that much attention to security,” Kevin Bocek, director of product marketing at Thales, told InternetNews.com.

Not having a backup tape encryption plan could place an organization’s data at risk, leading it into a breach of compliance. Data breaches can cause heavy financial losses, as retail store chain owner TJX discovered.

The storage department is more concerned with the cost and speed of data recovery than with encryption, according to Bocek. Also, enterprises felt they lacked access to technology adequate for enterprise-grade tape encryption.

“Previously, tape encryption technology used to be bolted on or would be an application used for general backup, and some didn’t trust those to encrypt their tapes for backup,” Bocek said.

The situation is changing, as more and more applications come with built-in encryption. However, a new problem then emerges — managing the encryption keys. “If you’re going to use encryption, you must have good key encryption, because if you lose your keys, you lose your data,” Dave Hill, principal at analyst firm Mesabi Group, told InternetNews.com.

Keys should not all be given to one person, he added. “If they do something wrong, either in error or maliciously, that could be a problem.”

For instance, giving control over all means of access to a system can lead to severe consequences, as San Francisco found out when rogue system administrator Terry Childs gained control over all the passwords to its fiber optic wide-area network.

Hill recommends enterprises have keys stored with a trusted third party “so somebody can get them back in case of an emergency.”

This article was first published on InternetNews.com. To read the full article, click here.

  SEE ALL
ARTICLES
 
RA

Richard Adhikari is an experienced writer who specializes in high tech. His areas of focus include cybersecurity, mobile technologies, CRM, databases, software development, mainframe, and mid-range computing, and application development. He has written and edited for numerous publications, including eSecurity Planet and Serverwatch. He is the author of two books on client/server technology.

Recommended for you...

AI in Cybersecurity: The Comprehensive Guide to Modern Security
Liz Ticong
Apr 29, 2024
What Is Cybersecurity? Definitions, Practices, Threats
Liz Ticong
Apr 8, 2024
How to Secure a Network: 9 Key Actions to Secure Your Data
Liz Ticong
Mar 21, 2024
7 Best Data Security Software: Solutions For 2024
Datamation Logo

Datamation is the leading industry resource for B2B data professionals and technology buyers. Datamation's focus is on providing insight into the latest trends and innovation in AI, data security, big data, and more, along with in-depth product recommendations and comparisons. More than 1.7M users gain insight and guidance from Datamation every year.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.