Corporate data recovery: are you a man with a plan?

by Toncy Dunlop 22, Dec, 2016

You're in charge of corporate device management, and your laptop security software shows that there's nothing more you can do with those stolen protected devices.  You’ve made up your mind and realize that, even though you tracked the location of the company device, it is physically impossible to retrieve them.

Let’s wipe it all out!


But wait. We’re sure your company has some device management, good data recovery software and backup procedures, and a serious IT asset management and inventory- even for the BYOD… and you’ve tested it. Haven’t you?


Your backups are only as good as what's on the backup media.

Laptop data recovery: did you backup?

According to TechTarget, “Data backups are an essential element of good storage security, but they're often the source of security woes. In fact, a significant percentage of security breaches can be attributed to the mismanagement and mishandling of data backups.”


CIO.com reminds us that when it comes to data protection, “organizations are demanding faster recovery times than ever before.”

Dell’s Greg Davoll tells CIO.com that "organizations have to be strategic about the way they go about setting their application recovery objectives," he says.

"One-size-fits-all recovery simply isn't an option."

That’s why leadership involves having a plan. And thinking out of the box in the recovery of your IT assets.



Information security consultant Kevin Beaver tells TechTarget that the mere existence of a process to replicate sensitive data is only “half the battle.” That is why he recommends corporate information technologists:

  • To include data backup systems in incident response plans.
  • To store your backups offsite or at least in another building.
  • Find out what security measures your data vendors are taking to ensure that your backups remain safe in their hands.
  • Password-protect your backups at a minimum.
  • Encrypt your backups if your software and hardware support it.
  • Last but not .. Make sure you’re backing up everything that’s important!

A walk in the Cloud: make sure they’re worth your money

One of the best ways to back up your systems is on the Cloud. Security expert Kevin Beaver tells TechTarget that, despite its convenience, you still have security concerns.

  • First, there is always unstructured data scattered on local drives and can often fail to be backed up if you don’t do your job properly.
  • Second, outsourcing data backups can get a load off you, but you need to be careful.

“One of the reasons that companies outsource their data backups to cloud data backup service providers is to offload the burden of monitoring, maintaining and supporting the backup infrastructure. But, tracking key metrics can be helpful, and users are seeing improving options, depending on their cloud backup services”, he says.

Data recovery vs. data restoration: don’t mix them up

To Dell EMC’s The Core, forward-thinking organizations are focusing not just on creating backup copies but considering all it takes to carry on with the business as usual after you lose a device.

  • Data recovery “is like someone handing you a giant stack of photos with a rubberband around it for you to recreate a scrapbook you had lovingly put together in chronological order with notes, decorations, and keepsakes for each photo,” our beloved friends at Dell remind us.
  • Data restore “means having that scrapbook returned to you in mint condition with all your memories perfectly intact – even if the original copy was completely destroyed.” Beyond recovery, restore is how you can get back to business faster than ever.

“If you want to shrink your recovery time objective, then consider implementing a third-party backup and restore solution for your SaaS applications.”

That is why according to Computer Weekly you need to choose the right data recovery partner. “Data loss is a real concern for many businesses, and it’s critical that a backup policy is in place to deal with issues. That’s why service providers must know who to turn to when they can’t manage a crisis themselves.”

Does your data recovery partner:

  • Have the skills and resources to run around the clock?
  • Support the device and operating system in need of data recovery?
  • Run research and development are in a position to have the skills to recover data from new media?
  • Run for you on short notice?

Have you set up a data recovery plan for your company?

Device recovery and management

Toncy Dunlop
Toncy Dunlop

I'm a literature graduate who found her place in the company that will help you get your lost devices back. I'm into anime, weightlifting, and reading the kind of poetry that will make me wish I wrote myself.
Let's connect:   

check out our

Related Blog Posts

10 books every IT Manager should read

by Toncy Dunlop January 16, 2017

Don't worry, I get it. Reading an actual physical book is so ten years ago. Today with the technology there could even be an..

Read More

Worst data security breaches of 2016

by Toncy Dunlop January 13, 2017

2016 was a busy year for our arch-nemesis, The Hackers. Data security and theft recovery is a serious issue. Sometimes..

Read More

5 great Chrome extensions for IT Managers

by Toncy Dunlop January 10, 2017

Chrome is the world’s most used web browser, and whether you like it or not, 73% of Internet users have it as their..

Read More

5 Great Events and Keynotes for IT Managers this 2017

by Toncy Dunlop January 5, 2017

Being an IT Professional has its ups and downs, and one of the main perks of being one is that you must always be informed..

Read More

Corporate device security: Main threats that are lurking the industry

by Toncy Dunlop December 26, 2016

Are you ready to pay a ransom for your own personal data? You better have your digital weapons prepared, because cyber..

Read More

How to make device security in educational institutions unbreakable

by Toncy Dunlop December 21, 2016

Nearly 97% of U.S. college students have a cellphone, and 79% own a laptop. That’s a lot, right? Problem is that both..

Read More