04:45 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly

2012 Ponemon Report On Trends In Security Of Data Recovery

Eighty-seven percent of respondents experienced a data breach in the past two years

(Novato, CA – January 10, 2012) – DriveSavers Data Recovery, the worldwide leader in data recovery services, announced today that the Ponemon Institute, a privacy and information management research firm, identifies in its second annual study, Trends in Security of Data Recovery Operations, new potential threats to the security of confidential and sensitive data when it is outsourced to third-party data recovery vendors. As businesses and government organizations increase their use of data recovery vendors, the potential for data breach during the data recovery process also increases if the vendor’s security protocols are not properly vetted.

“While the need to recover data is often time sensitive, every effort must be made to ensure that the organization’s confidential and sensitive data is protected during the recovery process,” said Michael Hall, CISO at DriveSavers Data Recovery. “The consequence of using an unscrupulous data recovery vendor can lead to loss or theft of sensitive and confidential information. That could mean a major disruption in business, financial loss and in some cases, closure of the business.”

Ponemon interviewed 769 IT security and IT support practitioners in US healthcare, financial and government organizations, most of who report to CIOs and CISOs. Here are the study highlights:

Increased Use of Third-Party Data Recovery Vendors (as often as once a week) – Eighty-five percent of the respondents report their organizations have used or will continue to use a third-party data recovery service provider to recover lost data. This is an increase from 79 percent in the previous study. In fact, 39 percent say they use third parties at least once each week or more.

Loss of Business-critical Data Drives Use of Data Recovery Vendors – Organizations most often use third party data recovery vendors when intellectual property, financial information and customer/patient data files have been lost. IT desktop and helpdesk support managers typically select data recovery service providers. Mandated to close job tickets fast, speed ranks higher than security in their selection criterion according to the study.

IT Security Often Excluded from Data Recovery Vendor Selection Process – Fifty-four percent of respondents confirmed that IT security is excluded from selecting third-party data recovery providers, which could play a role in IT support’s placement of speed over security. Organizations admit that they need to improve their due diligence for vetting third-party vendors and their data recovery certification.

Data Breaches on the Rise at Data Recovery Vendors – Of the 87 percent of respondents who experienced a data breach in the past two years, 21 percent say the breach occurred when a drive was in the possession of a data recovery vendor. This is an increase from the previous Ponemon study. Many respondents who experienced a data breach during the data recovery process point to the vendor’s lack of security protocols.

Unknown Whether Cloud Service Providers Would Report a Data Loss/Recovery Incident – More than half of the surveyed organizations use a cloud storage service provider. While 69 percent of the respondents feel notification from the cloud provider should be required if their servers crash and drives are outsourced for data recovery, only a small percent (less than 10 percent) are confident that their service provider would notify them if they engaged the services of a data recovery provider. Fifty-seven percent are not confident that they would be informed at all.

Leading Security Guidelines are not Considered When Selecting a Data Recovery Provider – According to the study, 54 percent of respondents do not require third-party data recovery vendors to comply with leading security guidelines such National Institute of Standards and Technology (NIST) and International Organization of Standards for Business, Government and Society (ISO).

Based on the Ponemon findings, organizations should have policy and guidelines in place for selecting and using a data recovery service provider. In addition, organizations need to address potential new threats to the security of data during the data recovery process, including business associate agreements for cloud storage providers that outline the need for notification should a data loss occur and the services of a data recovery vendor be engaged. Respondents of the Ponemon studies developed a Data Security Checklist for vetting third-party data recovery service providers.

Healthcare organizations, government agencies and financial organizations are required by law to meet the most stringent data security guidelines and are now requiring third-party data recovery vendors to meet these same guidelines. DriveSavers adheres to the Gramm-Leach-Bliley Act Data Security Rule (GLBA), the Data-At-Rest mandate (DAR), the Sarbanes-Oxley Act (SOX) and Health Insurance Portability and Accountability Act (HIPAA).

About DriveSavers

DriveSavers Data Recovery, the worldwide leader in data recovery services, provides the fastest, most reliable and only certified secure data recovery service in the industry. DriveSavers is the only data recovery company to post proof of annual, company-wide SAS 70 Type II Audit Reports and its HIPAA data security compliance. DriveSavers High Security Service adheres to US Government security protocols, the Gramm-Leach-Bliley Act Data Security Rule (GLBA), the Data-At-Rest mandate (DAR) and the Sarbanes-Oxley Act (SOX). DriveSavers maintains the most technologically advanced Certified ISO 5 (Class 100) cleanroom in the industry and is authorized to open storage devices by all major storage device manufacturers without voiding the warranty. DriveSavers engineers are trained and certified in all leading encryption and forensics technologies. Satisfied customers include: Bank of America, Google, Lucasfilm, NASA, Harvard University, Salvation Army and The Rolling Stones. (http://www.drivesaversdatarecovery.com)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.