Backup Fanatic: How to Ensure Business Continuity by Delivering Continuous Protection, Secured Storage, Data Compliance, and Instant Data Recovery by Domenic DiSario

Backup Fanatic: How to Ensure Business Continuity by Delivering Continuous Protection, Secured Storage, Data Compliance, and Instant Data Recovery by Domenic DiSario

Author:Domenic DiSario [DiSario, Domenic]
Language: eng
Format: azw3
Published: 2015-04-28T16:00:00+00:00


How to Protect Your Personal

Data in the Event of a Disaster

Susan: Can you talk to us about what to do when you work remotely? How can you stay protected then? A lot of people are very mobile; they work from home, but not all the time, and they travel with their laptops. What do you recommend in that scenario?

Domenic: Trying to manage the situation you describe is a real challenge for companies these days. And it’s not just about protecting the data they lose invariably on these devices because they are not performing local backup on their system nor is their data being transferred to the companies’ main servers for companywide backup.

There’s a local copy of the last couple of months’ worth of emails on my iPhone. From a data protection point of view, in this particular case, the email is not a big deal, right? If I lose my iPhone, I buy a new one, re-sync it, and I’m good. But what about from a security point of view?

What if those emails on my phone have protected information, and I’m in danger of violating various state and federal privacy regulations? Some regulations state if you have any two pieces of information, a social security number, bank account, first name, last name, insurance number then that combination of data needs to be protected and encrypted.

If you are HIPAA regulated and you lose your phone, and you know that there were emails on that phone with protected information and the phone wasn’t encrypted and locked, you are legally obligated to turn yourself in. And if you don’t turn yourself in, I’m legally obligated to turn you in.

Data on mobile devices is a big deal because it is mobile, and therefore can be lost easily. It is estimated that one out of every 10 laptops is going to be stolen. The problem is one of comprehension. Sometimes laptop owners do not seem to understand they have company information on their local drive.

Or maybe they do understand, and they’re just not careful. They copy to their laptop the three spreadsheets they want to work on over the weekend, and then their laptop is stolen. Or, maybe worse than that, they work the whole weekend and their laptop is stolen on Sunday night. So not only is there a possible data breach, but all that work they did is gone because they did not upload their modified sheets to the server.

There are a lot of data backup and malware considerations with mobile computing, which makes encryption a very big thing. I could lose this phone with 1,000 HIPAA regulated records, and if it is encrypted, I do not even have to report it. But if I had one piece of HIPAA protected information on it that was not encrypted, I’d have to report it as a data breach.

Not only are mobile devices easy to lose—they’re also easy to break.

These devices need to be backed up and protected from physical damage, which is much overlooked.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.