2 May 2012
Kroll Ontrack Dispels Biggest Enterprise Data Recovery Myths
Preconceived notions hindering organisationsSydney. 2 May 2012 – Kroll Ontrack, the leading provider of information management, data recovery, and legal technology products and services, today announced the top five data recovery myths. From concerns over cost, system complexity and data protection to resource constraints and simple misunderstandings, preconceived notions are hindering organisations from obtaining a successful data recovery and protecting their data from future loss.
“Kroll Ontrack has 25 plus years of data recovery experience handling every kind of data loss from any kind of storage technology,” said Adrian Briscoe, general manager – APAC, Kroll Ontrack. “We’ve heard it all, seen it all and tackled it all, proving that data recovery myths can be disproved with the right technology, technical know-how and approach to service.”
Read more about consumer myths or small business myths.
The top five data recovery myths include:The most inexpensive data recovery quote will result in the same outcome as the other quotes:
Whether dealing with a business or household data loss, every client is looking for a cost-effective solution. All too often organisations are swayed by the appeal of free evaluations, capped prices or the cheapest option, regardless of the situation, only to find out the service provider passed through hidden fees, charged for an unsuccessful recovery or could not address the issue. Look for a provider that offers a free consultation and provides access to an actual data recovery engineer. Choose a provider that gives you a listing of all recoverable files before you make a purchase decision, and obtain an actual price quote in writing based on how difficult the recovery is, what files can be recovered and if spare parts are needed. Additional, separate charges should not be incurred for work performed in a cleanroom environment or spare parts. Finally, ensure post-recovery support is available to make sure migrating data back into your organisation’s environment goes smoothly.
My organisation has never experienced a significant data loss, so we don’t need a data recovery plan:
Looks can be deceiving. If your business has never experienced significant network down-time or a data loss, there may be a misconception that a proactive data loss plan is not needed. Implementing a data loss plan on top of having a backup system that is up-to-date and regularly checked is as important as purchasing home owner’s insurance. If a data loss ensues, it is critical to look beyond the professional feel of a website and contact a professional data recovery provider that can answer specific questions about the affected storage platform, database, e-mail system or virtual environment. Ensure the provider has vast engineering capabilities and geographic locations to support a multitude of languages, currencies and data protection laws. Additionally, investigate if the chosen provider invests in developing proprietary data recovery software and tools and has customised or specialised services to ensure the latest technologies and subsequent data recovery challenges are addressed successfully.
If a data loss ensues, my IT department can handle it:
Few organisations are prepared for the worst. When a data loss occurs, everyone looks to the IT department. However, not every organisation has the staff or depth of data recovery expertise to address the recovery, impacting the speed and quality of the recovery. Further, not every organisation has a data recovery plan in place. Looking to a third party may be the next logical step, but not all data recovery providers offer an assessment of what can be recovered or access to the actual engineers working on your case. Make sure the data recovery provider is willing and able to work with you step-by-step, keeping you apprised of the process and what can actually be recovered. It is also smart to find a data recovery provider that has the resources to perform emergency, remote or onsite recoveries and from systems that are proprietary or unique to your environment.
Data recovery is not possible in some situations and for some technologies:
Not all data recovery jobs, and thus, providers should be treated equally. It is a misnomer that data can only be recovered from hard drive failures, when in fact data recovery is possible when logical errors occur, from complex databases and virtual systems, and even when data is encrypted. Data loss is never a lost cause and should always be attempted with a trusted data recovery provider with demonstrated experience in varying situations with varying technologies. Because you may only have once chance to recover your data, it is essential to choose a provider that handles every job with the same level of concern, dedication and attention to cost-effectiveness, regardless of size, and can assist in prioritizing the recovery strategy according to the most critical needs and locate specific data on the used areas of the drive.
Due to the nature of their business, all data recovery companies know how to keep my data safe:
Data security is a key concern in the data recovery process. While some organisations believe that every data recovery provider offers the same trustworthy services, others are leery of shipping a damaged or corrupted hard drive offsite to a data recovery facility. Not every data recovery provider adheres to the same security protocols, so transparency into the provider’s data recovery process, protocols and track record is key to ensuring data is protected. Ensure your chosen provider employs the highest security and process standards for the entire data recovery process, not simply the actual recovery phase. Look for a provider with a strict information security policy and a comprehensive annual SAS 70 Type II certification. Also ensure the provider has a secure ISO-5/Class 100 cleanroom environment and is authorized by both private and government entities to handle highly sensitive data. Further, it is essential that the chosen recovery provider can recover encrypted data and return it in an encrypted form.
To learn more about these myths, visit: Data Recovery Myths