Each January 28, Data Privacy Day is observed, with business owners and managers, vendors and concerned citizens taking time to raise their awareness of the most up-to-date approaches to keeping their companies’ and their own data safe. It’s an education effort that feels especially urgent this year, given the public’s focus on how their data is handled by the companies and vendors they have dealings with, not to mention the government and their own employers.
Today, with all of that being the case, I spoke with Jay Livens, director of product and solutions marketing for Iron Mountain, about the current state of data protection and IT’s priorities for the coming year. Iron Mountain recently conducted a survey of IT professionals that found that “with 68 percent probability, … data loss and privacy breaches are the most prevalent concern for IT leaders over the next 12-18 months.”
A major factor behind this level of concern about data and privacy risks is that “the common thread we see all over is data growth,” said Livens. “IDC’s most recent data indicated 38 percent to 40 percent data growth, or a doubling every two years, but backup infrastructure is not growing at the same place.”
That growth in the volume of core data, plus retention schedules of seven years or more for some data, explained Livens, is compounding the risk, and the challenge of simply storing the data satisfactorily and in line with compliance requirements, year after year. When the budget isn’t growing, IT must still answer the question of how to store data securely and prevent unauthorized data disclosures. One way enterprises are approaching this aspect of the challenge is with a hybrid strategy that combines disk, tape and perhaps cloud storage. With the exponential growth of data volumes, said Livens, new use cases for this type of hybrid storage solution are arising regularly.
On the data security side, Livens provided a list of 10 key strategies for IT professionals charged with data protection and privacy measures for 2014. The strategies should be taken as a whole: “We have to take a holistic view of the enterprise. We can’t shine a spotlight on one area, such as securing mobile devices and usage, or we risk losing sight of what else is happening across the enterprise. We must be sure we’ve got a complete view of how to protect information,” Livens advised.