The Premise: Backup is a Security Hole 


Backing up data is standard practice and one that both companies and individuals take part in regularly. Having your data at your fingertips to be able to restore any potential loss and keep your forward movement is a must in all of our quick moving industries. How do you make sure that your backup protocols are taking into account proper security measures? How do you know if encryption is taking place? Is malware slipping into your snapshots and being replicated? Do your backups include data access that you shouldn’t have? With every copy of your data being a potential security risk, the question we tackle in this conversation at the On-Premise IT Roundtable is: Is backup a security hole?

© Gestalt IT, LLC for Gestalt IT: Backup is a Security Hole


Backing up data is standard practice and one that both companies and individuals take part in regularly. Having your data at your fingertips to be able to restore any potential loss and keep your forward movement is a must in all of our quick moving industries. How do you make sure that your backup protocols are taking into account proper security measures? How do you know if encryption is taking place? Is malware slipping into your snapshots and being replicated? Do your backups include data access that you shouldn’t have? With every copy of your data being a potential security risk, the question we tackle in this conversation at the On-Premise IT Roundtable is: Is backup a security hole?


 





On-Premises for today’s roundtable:



Name

Stephen Foskett


Josh Fidel


Kori Younger


Karen Lopez


Twitter

@SFoskett


@JCEFidel


@SDNDaughter


@DataChick

Follow us on Twitter.


SUBSCRIBE to our newsletter for more great coverage right in your inbox.

© Gestalt IT, LLC for Gestalt IT: Backup is a Security Hole

Twitter Mentions