Minneapolis – Kroll Ontrack, the leading provider of data recovery, ediscovery and information management products and services, today announced five of the most common IT administrator mistakes that can lead to data loss. Given the complexity and capacity of advanced storage devices and the criticality of organizational data, documentation and best practice implementation are critical when it comes to protecting data.
“With data stored in multiple locations and on multiple devices, loss at any level can be very detrimental, putting IT administrators in the hot seat to provide fast issue resolution and minimize downtime,” said Jeff Pederson, manager of data recovery operations, Kroll Ontrack. “Under such extreme pressure, IT teams may be overlooking established ITIL best practices for IT service management in the pursuit of urgent issue resolution, leaving organizations at risk for data loss.”
To reduce the potential for critical data loss when managing IT processes and responding to IT issues, avoid falling prey to these common IT mistakes:
- Failure to document and execute established IT, retention and backup procedures. Kroll Ontrack sees it time and time again. A test server moves into production, but no one has informed IT that it is now capturing valuable data, and the data is not being backed up. Or, inaccurate documentation has IT administrators decommissioning a SAN that is actually still in production, resulting in data loss.
- Failure to keep OS and anti-virus software up to date. Days are busy and resources are stretched, but failing to update OS security patches and anti-virus software can result in treacherous security breaches and extensive data loss.
- Failure to backup effectively. In a recent survey of Kroll Ontrack data recovery customers, 60 percent had a backup in place at the time of loss, but the backup was not working properly at the time of loss. Failure to establish and follow backup procedures, or test and verify backup integrity is a guaranteed recipe for data loss.
- Deleting data that is still in active use. This may be surprising, but you’d be astonished how often Kroll Ontrack performs data recovery on tapes or server networks that are thought to be out of use, but still contain active data. Do your due diligence and ensure the data you delete is no longer of value.
- Failure to test IT security policies. Even the smallest failure in IT security can lead to devastating results, including critical data loss and huge expense. Restrict IT administrator passwords only to required users, and change them when an IT administrator leaves the company. Some of Kroll Ontrack’s most compelling data loss cases are the result of a disgruntled employee with a live password intentionally deleting large amounts of critical company data.
Even the most seasoned IT teams will eventually face urgent issues and need to make quick decisions on how to respond and proceed. Follow these best practices to ensure the best chance of effective resolution and reduce the risk of data loss:
- Avoid panicking and rushing to action. Make good, informed decisions when determining a resolution. Consider repercussions and weigh consequences. Rash decision-making may result in more data loss and downtime, not to mention cost and resource overload. If data loss happens, don’t restore data to the source volume from backup – it is where the data loss occurred in the first place. And, don’t create new data on the source volume – it could be corrupt or damaged.
- Be confident in your skills and knowledge. You are part of the solution, not part of the problem. When pressured by organization leaders to get systems up and running at any cost, advocate as a subject matter expert. Help leaders avoid making decisions that do more harm than good. When specifically faced with a possible data lost event, take the volume off line, and be quick! Data is being overwritten at a rapid pace. And, don’t format the volume to resolve corruption.
- Have a plan. Follow established ITIL processes and ensure data center documentation is complete and revisited often to ensure it is up to date. In particular, do not run volume utilities (CHKDSK/FSCK) or update firmware during a data loss event.
- Know your environment (and your data!). Understand what your storage environment can handle and how quickly it can recover. Know what data is critical or irreplaceable, whether it can be re-entered or replaced, and the costs for getting that data up and running to a point of satisfaction. Weigh the costs and risks when determining what is most urgent – getting your system up and running quickly or protecting the data that is there.
- When in doubt, call a data recovery company. While your OEM may be a good starting point, the value of your data and the potential for data loss when getting your system back up and running may not be top of mind. Be sure to consult a reputable data recovery company if concerns over data loss potential arise.
About Kroll Ontrack Inc.
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, search, analyze, and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data destruction, electronic discovery and document review. Kroll Ontrack is a subsidiary of Altegrity, an industry-leading provider of information solutions. For more information about Kroll Ontrack and its offerings please visit: www.krollontrack.com.
Three-tiered approach provides visibility to optimize efficiency and availability
COLUMBUS, Ohio – Emerson Network Power, a business of Emerson and a global leader in maximizing availability, capacity and efficiency of critical infrastructure, today released a CIO Playbook focused on helping IT executive management gain the visibility required to improve data center efficiency and availability while better preparing for the future. According to the Spring 2013 Data Center Users’ Group survey, which asked its members to predict the skills data center managers will need in the next five years, the “ability to see across systems” (75 percent) and “improved ability to see the big picture” (73 percent) will be keys to effective management.
“When you analyze the obstacles managers face in improving data center performance, you always come back to lack of visibility,” said Blake Carlson, vice president, global strategy and business development for Emerson Network Power’s Avocent business. “For data center management to advance in maturity, data center managers need a single window into utilization and performance across systems—the data center equivalent of a crystal ball. With that tool, they can break down organizational silos and move to data-driven decision making and management.”
The Playbook, “Cultivating a Crystal Ball for Data Center Performance and Availability,” begins by acknowledging that data centers typically undergo significant change after commissioning. As a result, an assessment of electrical and thermal systems often is warranted to identify potential vulnerabilities and inefficiencies. The Playbook then presents a three-tiered approach to cultivating a crystal ball:
- Local Monitoring. The foundation for the data center crystal ball is the ability to remotely monitor and access systems across the data center to gain visibility into equipment operating status and receive real-time alerts and alarms.
- Data Aggregation: Aggregating data across the facility creates the ability to identify dependencies and optimize systems. Aggregated data also can be used to address key planning questions.
- Enterprise Intelligence: At the enterprise level, data is transformed into intelligence that can be accessed by IT and Facilities personnel, enabling greater collaboration and more effective management.
With such a system in place, data center managers can manage capacity proactively based on real-time visibility into IT and facilities infrastructures; identify and rectify data center issues before they affect operations; and increase asset utilization and productivity.
“Cultivating a Crystal Ball for Data Center Performance and Availability” is available at www.EmersonNetworkPower.com/CIOtopics. Carlson will be hosting a Critical Advantage Webcast on the topic June 25, 2013. For more information on the webcast, visit www.EmersonNetworkPower.com/webcasts. For more information on products and solutions from Emerson Network Power, visit www.EmersonNetworkPower.com.
About Emerson Network Power
Emerson Network Power, a business of Emerson (NYSE:EMR), delivers software, hardware and services that maximize availability, capacity and efficiency for data centers, healthcare and industrial facilities. A trusted industry leader in smart infrastructure technologies, Emerson Network Power provides innovative data center infrastructure management solutions that bridge the gap between IT and facility management and deliver efficiency and uncompromised availability regardless of capacity demands. Our solutions are supported globally by local Emerson Network Power service technicians. Learn more about Emerson Network Power products and services at www.EmersonNetworkPower.com.
Emerson (NYSE: EMR), based in St. Louis, Missouri (USA), is a global leader in bringing technology and engineering together to provide innovative solutions for customers in industrial, commercial, and consumer markets around the world. The company is comprised of five business segments: Process Management, Industrial Automation, Network Power, Climate Technologies, and Commercial & Residential Solutions. Sales in fiscal 2012 were $24.4 billion. For more information, visit www.Emerson.com.
Strategic Relationship to Provide Innovative Risk Management Solutions
NEW YORK – CastleLine Holdings, LLC ("CastleLine") announced that it has entered into a strategic relationship with Arthur J. Gallagher Risk Management Services, Inc., a subsidiary of Arthur J. Gallagher & Co. (NYSE: AJG), designed to provide a comprehensive suite of innovative products and services to clients involved in the origination, underwriting, and purchase of residential mortgages. Gallagher and CastleLine will draw on their respective expertise to deliver a broad array of integrated, value-added risk management solutions.
CastleLine and its subsidiaries will provide clients with a variety of alternative insurance solutions designed to protect mortgage originators and investors against losses arising out of repurchase demands due to errors, omissions and fraud during the mortgage underwriting process. Gallagher, one of the world's largest insurance brokerage and risk management services firms, will in turn provide mortgage industry clients with complementary risk management products, such as property/casualty, other E&O/D&O coverage as well as employee benefit and HR consulting services.
"We are excited to be partnering with a world-class organization like Arthur J. Gallagher," commented Bryan Binder, Chief Executive Officer of CastleLine. "Their national presence and scope of capabilities, coupled with our mortgage expertise and innovative new products, will enable us to collectively deliver highly customized and cost-effective risk management strategies to our customers."
About CastleLine Holdings, LLC
CastleLine Holdings, LLC, and its subsidiaries, provide financial products and services to parties and securitization of residential mortgages. www.castleline.com
CAMPBELL, Calif. - Exalt Communications, Inc., the leading innovator of next-generation packet microwave backhaul systems, today announced that Minnehaha County, South Dakota has deployed Exalt ExploreAir microwave backhaul systems to link its highway maintenance department with the county's administrative campus in Sioux Falls, South Dakota. The new, high-speed microwave link replaces a costly leased T1 line and enables new, Graphical Information Systems (GIS) applications for the highway maintenance department.
Minnehaha County is the most populous county in South Dakota, with its county seat at Sioux Falls. The county's highway maintenance department wanted to implement new GIS applications, but found that the leased T1 link between its facility and the county courthouse and administrative campus left it starved for bandwidth. By deploying a new, 200 megabits-per-second (Mbps) ExploreAir 18 GHz system from Exalt, the county now has more than enough bandwidth for speedy operation of GIS applications as well as VoIP and office productivity applications. The Exalt system has proven completely reliable during wind, rain, and heavy snowstorms and, with the system in place, the county also has eliminated the recurring lease costs of its legacy T1 line. Exalt partner Calhoun Communications of Sioux City, Iowa deployed the microwave link.
"When we decided to replace our leased T1 line with a microwave system, I knew that Exalt and Calhoun Communications could deliver the solution we needed based on my previous experience with both companies," said Monte Watembach, director of information technology for Minnehaha County. "The Exalt system has significantly improved productivity at our highway maintenance department by making it possible for the department to use new GIS applications and reduced our monthly operating costs as well."
"City and county governments across the United States depend on Exalt high capacity, secure, and reliable microwave systems to carry out the business of government," said Greg Gum, Exalt senior vice president of marketing and business development. "Like Minnehaha County, these municipal agencies are under pressure to improve worker productivity, support new applications, and streamline city services while holding the line on operating costs. We are pleased that Minnehaha County selected our ExploreAir systems to help them meet these requirements."
About Exalt Communications
Exalt Communications provides next-generation packet microwave backhaul systems to mobile operators, broadband service providers, government agencies, and enterprises worldwide. Exalt wireless systems are used most often as a complement or cost-effective alternative to fiber. They also have been inherently designed to support the rapid build out of the 4G/LTE mobile Internet infrastructure driven by ever growing user-generated traffic and fueled by the accelerated adoption rate of smartphones and tablets.
|Herndon, VA – EdgeConneX a leading provider of Infrastructure as a Service solutions, announces that it is currently constructing a small cellular (‘small cell’) network for a high-profile, ‘urban’ Northern Virginia mixed-use class ‘A’ residential and retail property development.
|On the heels of EdgeConneX’s announcement declaring the deployment of a ‘rural’ small cell network for CoverageCo throughout the State of Vermont, this second project illustrates the ready adoption of real estate developers and municipalities to leverage the technology in expanding cellular network coverage.
|“With several deployed small cell networks under our belt, EdgeConneX has become the leading provider of solutions in the market,” comments Doug Wiest, Executive Vice President of EdgeConneX. “Real estate developers continue to wrestle with solutions to expand and enhance cellular network coverage. EdgeConneX’s ability to design, construct and manage small cell networks for communities and businesses will improve communication capabilities within large developments throughout the country.”
Small cell networks solve the problem of mobile network expansion in the wake of exponential growth and demand of mobile video and data traffic. The networks are constructed with low-powered radio access nodes, strategically placed within small distances that extend service coverage into traditionally hard-to-reach areas such as mountainous regions, high-rise buildings and campus-style developments. Small cell networks are compatible with a wide range of air interfaces including GSM, SDMA, LTE, and WiMax, expanding the reach of both 3G and 4G networks.
|Wiest adds, “EdgeConneX continues to be an invaluable partner and advisor to those companies, communities and developers that seek to provide superior cellular coverage for their customers.”
|EdgeConneX’s small cell network solutions are groundbreaking in that they are proven to allow carriers, municipalities, corporate campus environments, building owner-operators, and others the opportunity to address capacity constraints and expand coverage capabilities while overcoming certain physical challenges faced by today’s wireless networks. Small cell solutions enable seamless connectivity for today’s increasingly connected consumer.
|For more information about EdgeConneX and its leading infrastructure deployment solutions for expanding and improving access to mobile and data communications, visit smallcell.edgeconnex.com or email firstname.lastname@example.org.
EdgeConneX provides Infrastructure as a Service (IaaS) – space, power and connectivity solutions that uniquely combine mobile, wireline and data center services to bring data to the edge of the network. As wireless and wireline networks saturate with big data such as video, EdgeConneX’s purpose-built Meet You Points™ for small cells and edge data centers optimize the delivery of data at network-critical locations – those nearest to consumers. Content providers, network operators, wireless carriers, services providers and colocation providers leverage EdgeConneX’s unique infrastructure solutions to create and redefine the edge of their networks, because closer proximity to consumers provides for superior performance and economics. For more information, visit small cell.edgeconnex.com.
Software-based, BYO hardware, scalability, compliance features ranked highly important and valuable
AUSTIN, Texas – A recent survey sent by Caringo® to customers, partners and prospects, sheds some light on object storage use by global companies, and revealed perceptions of its value, including scalability, data protection and compliance. Survey respondents represented organizations with data sets of multiple sizes: 10 to 100 terabytes (38 percent), 100 to 500 terabytes (24 percent), 500 terabytes to one petabyte (12 percent), and more than one petabyte (26 percent). Survey results also revealed a strong inclination toward software-based object storage solutions over appliances, with 90% saying they preferred software and only 10 percent prefer an appliance-based object storage system. These preferences also add context to the number of users who said it was either “important” or ‘very important’ to choose their own hardware, expressed by 61 percent, compared to eight percent who said this was not important. Along with these preferences, a significant number (58 percent) felt conserving electrical power (e.g. through adaptive power conservation features) was either ‘important’ or ‘very important.’ Not surprisingly, object storage software with power-saving features, deployed on the user’s choice of hardware, affords the greatest potential for power conservation. An overwhelming number (98 percent) see value in object storage, but when asked to name actual or perceived benefits, responses varied widely with the exception of scalability – mentioned by 86 percent of respondents. Among other benefits listed, 66 percent said data protection/security, 56 percent said providing access to cloud data stores, 54 percent ease of use or maintenance, and 34 percent meeting compliance goals. In related questions about the use and applications for object storage in their own environments, more than 71 percent listed active archiving, 53 percent cloud storage, 41 percent Big Data storage, and about 30 percent each compliance or disaster recovery. Regarding current and/or planned use of object storage for compliance, the top ranked features were WORM capability (68 percent), content integrity seal/the ability to prove a file hasn't been altered (66 percent), and the ability to audit file access (62 percent). About Caringo Caringo develops object storage software that combines ease of management, intelligent automation and elastic content protection transforming commodity servers into massively scalable, fault tolerant, cloud storage infrastructure. Caringo enables Enterprises and Service Providers to control the volume, velocity and variability of unstructured information associated with active archives, Big Data, private cloud storage and public cloud storage. For more information visit www.caringo.com.
PC sales continue to decline, mobile sales continue to climb, people work at home, and the notion of strict work/life separation for equipment is on its way out for many information workers. Yet most IT organizations and security vendors insist on applying legacy thinking for information security that simply cannot work in the modern world of heterogeneous, anywhere, and mixed personal/business computing. They keep trying to build mobile prisons, extending perimeter defenses across the digital world or creating satellite fortresses on every device. No one willingly enters a prison, and the gulag and straitjacket approaches favored by IT and security vendors simply will be bypassed by business users, who've been doing so for years on the desktop.
It's time to stop the madness and protect what really matters: the information that moves among all the devices. To do so, the industry needs to stop trying to turn smartphones into fortresses that people can't use and forcing the use of proprietary app containers that can't scale a heterogeneous, interconnected digital environment or that provide read-only access (what's the point, then, of having the file?). Instead, it's time we focus on protection at the information level, essentially using the notion of digital rights management (DRM) that travels with the data itself. The only way to make that work is through an industry standard.
The evolving mobile landscape, including the bring-your-own-device trend, is requiring banking institutions to be mindful of emerging risks, says Jim Pitts, who oversees mobile financial services and vendor management for BITS, the technology policy division of The Financial Services Roundtable. Pitts says financial institutions are more at risk when it comes to mobile services and practices than many other sectors because of the types of transactions and sensitive information they manage.
When it comes to their BYOD policies, banks must address data loss prevention, application security and exposure liability management, he says in an interview with Information Security Media Group [transcript below].
Cybercrime has become a national crisis, said South African Centre for Information Security CEO Beza Belayneh on Tuesday, equating the scale to that of South Africa’s prevalent HIV/Aids pandemic.
Speaking at a Neotel/Mail & Guardian business breakfast, he said that South Africa had ranked the third-most “fished” country in the world, and was open to attack in a well-connected society.
“Cybercrime is no longer a criminality, it is a national crisis,” he said, adding that this was an event that should bring together all the Cabinet Ministers, banks and consultants, besides others.
“Governments are hacked, police websites are hacked, banks are losing millions – the statistics are that South Africa loses R1-billion a year, and it now threatens human life,” he said.
The survey also indicated feds are facing unprecedented data growth and must address backup solutions nearing capacity.
Just 8 percent of federal executives are completely confident that their agency could recover 100 percent of its data in the event of a disaster, according to a report from MeriTalk, an online community and go-to resource for government IT. The study also revealed that while agencies might feel prepared, they are not testing their systems as often as they should and face challenges with data growth, mobile devices and on-site . Only one in four federal workers give their agency an "A" in data resilience and disaster recovery (DR2) preparedness.