Mitigating risk with backup encryption

Backup data button on a keyboard

Organisations today are under more pressure than ever before to ensure that data is protected and secure. Yet with data volume growing rapidly and regulatory requirements mandating ever longer retention periods, the risk of a data breach is also growing. High profile cases such as the HMRC’s loss of 25m benefit records and new fears for patient data safety over a planned NHS shake-up, have attracted intense media scrutiny. Consequently, IT managers are being forced to reconsider how they protect data that goes off-site.

Companies involved in data breaches face more than just unwelcome headlines. Public disclosure of breaches can damage an organisation’s brand and reputation, and lead to remediation expenses, fines and civil litigation. With such high stakes, CIOs increasingly rely on channel partners to provide consultancy on the planning and redesign of existing storage strategies that align closely with security.

So how can this be achieved, and who is at risk? Resellers can ask the following questions to determine a customer’s risk level:

1. Are you storing proprietary information for your business?

2. Are you storing customers’ or employees’ personal information such as social security numbers, birthdates, financial records, health records, addresses?

3. Do you have offsite data retention requirements for disaster recovery?

Answering yes to any of the above questions means your customer is exposed to the risk of a data breach. Fortunately a sound data security policy, built around the encryption of backed up data can help mitigate this risk. Encryption at the backup stage effectively eliminates the damage associated with a data breach.

Securing data through encryption

The channel can help organisations implement a successful encryption solution by combining technology, processes and best practices for securing their backup tapes. If data is encrypted when taken off-site, it is inaccessible to anyone but the legitimate owners of the data.

There are three main types of encryption solutions available: software-based, appliance-based and drive-based and there are advantages and disadvantages associated with each approach.

Software-based encryption is the lowest cost solution but it slows data down in its movement from primary storage to removable storage devices or backup destinations.

Appliance-based encryption can address performance by sending backed up data through a hardware based appliance. However while this method is ideal for larger enterprises it is often too costly for smaller businesses.

The most effective option we recommend for businesses is drive-based encryption, a cost-effective and high-performance alternative. Drive-based encryption technology sits within the tape drive and encrypts data as it is written causing less slow down in data movement. This method solves the problems associated with other forms of encryption and is an ideal data protection solution for most businesses. Tape-level encryption also takes advantage of tape compression, which results in faster backup and lower costs without sacrificing performance. This can’t be achieved with software- and appliance-based methods.

Retrieving encrypted data

When data is encrypted it uses an algorithm to make the data inaccessible and creates a unique encryption key. Should the key be lost, the data is inaccessible but organisations can simply manage keys using the right tools.

For example key management solutions generate and allocate keys for all encrypted data. This enables an authorised user to seamlessly access encrypted data within their enterprise.

Implementing encryption best practices

Once an encryption and key management solution has been implemented, data is not necessarily secure. There is still a risk of hardware failure, disaster, or non-intentional or malicious action on the part of employees. To help prevent this, it is essential that best practices are followed on the use of encryption technology such as the following:

• Restrict key access

• Back-up the encryption key database on a daily basis

• Ensure backup copies of encryption keys are kept off-site

• Build redundancy into the encryption key management solution

• Ensure encryption key backups and redundant servers are secure

Maintaining trust

Data is the lifeblood of every business and its loss can cause substantial damage. Every company is a holder of sensitive data and is therefore wholly responsible for its security. By providing much needed guidance and consultancy on integrating backup encryption, key management and best practices into a wider storage strategy, the channel can leverage its expertise to build trust, strengthen relationships and capitalise from long term opportunities.

ITPro

ITPro is a global business technology website providing the latest news, analysis, and business insight for IT decision-makers. Whether it's cyber security, cloud computing, IT infrastructure, or business strategy, we aim to equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up to our daily newsletter and follow on us LinkedIn and Twitter.

Latest in Backup
Data backups concept art showing two men in a server room analyzing data on servers.
IT professionals are losing sleep over data backups – here's how to make sure you're prepared
The Synology ActiveProtect DP7400 on the ITPro background
Synology ActiveProtect DP7400 review: An affordable one-stop backup shop for enterprise data protection
The Nakivo logo on the ITPro background
Nakivo Backup & Replication 11 review: The on-prem backup host with the most
The Arctera Backup exc 24 logo
Arctera Backup Exec 24 review: Ticks all the right backup boxes
An icon of a cloud with two arrows pointing up and down symbolizing upload and download held in the palm of a business person who is out of focus and whose head is not in frame.
Why organizations need an integrated approach to enterprise backup and recovery
The Eon team outside its offices
Startup promises to 'reinvent cloud backups'
Latest in Feature
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?
A range of HP devices set on pedestals on the keynote stage at HP Amplify 2025 in Nashville, with a large screen in the background bearing the HP logo against a white background. The devices include AI PCs, laptops, and printers.
HP hones its edge AI ambitions at Amplify 2025