32% of IT Professionals Have Lost Corporate or Private Data

Research by the portable storage and digital encryption firm revealed 57 percent also admit to carrying unencrypted data on USB sticks, portable hard drives or optical media, despite 98 percent acknowledging data loss to be a ‘serious and growing’ concern. Furthermore, 96 percent believe encrypted hard drives are preferable to unprotected drives for daily data use.

“The survey’s results are disappointing and alarming at the same time because our respondents should be setting a better example,” said John Michael, Managing Director of iStorage.

“Despite nearly all of the IT experts we questioned acknowledging data loss to be a serious and growing concern it seems many are not connecting that to their own data security procedures, with nearly a third admitting to losing a portable device containing confidential data. This is putting themselves and their organisations at risk.”

Read More

Recovery Process for Encrypt HDD

Recovering from hard disk drives that are encrypted follows the same handling procedures as all other magnetic media. A strict process of handling and documentation starts right at the shipping door upon drive receipt and ends when the drive is shipped back to the customer. In most cases, when working with a top data recovery provider, all recovery processes are logged. This results in an audit trail of the recovery history and serves as verification that the recovery was conducted in a secure, compliant manner. Specifically, you want to ensure the process consists of the following high-level steps:

1. Triage drive; determine faults without opening drive
2. Clean room escalation for physical or electronic damage
3. Secure original media
4. Sector-by-sector copy of drive data
5. User Key used to decrypt data
6. Produce file listing of user file names
7. Repair file system
8. Prepare data for delivery
9. Encryption options for data delivery

After the first four stages listed above, the recovery engineer will begin to map all key file system structures that point to the user files. However, if the hard disk drive is encrypted, then the drive needs to be decrypted in order to proceed.

Decryption
If this is the case, a user key or decryption password is required. Fortunately, encryption software has come a long way over the years. Instead of using a master password for decryption, most professional encryption software provides a technician level pass-phrase that changes on a daily basis. This protects the user’s password and the organization’s master password.

Many organizations are comfortable providing these one-time use pass-phrases so that the recovery work can continue. However, this is not always the case. For some organizations, providing this information to an outside vendor, such as a data recovery provider, is against their security policy.  In these situations, a successful recovery is still possible. There are data recovery vendors that can perform recoveries while leaving the data in its encrypted form throughout the entire process. In this case, the data will be recovered and sent back to the client in its encrypted form; however, the specific results will be unknown until the files are opened by someone with access to the encryption key. Ultimately, this limits the ability for a data recovery provider to communicate the success of the recovery until the recovered data is delivered and opened, thereby placing some burden back on the customer.

As a result, it is clear that significant time and cost savings are associated with allowing your data recovery vendor to access your one-time use pass-phrase codes while attempting to recover your encrypted data. At the same time, it’s critical to ensure that your selected vendor also understands security protocols, is knowledgeable about encryption products and has privacy policies in place.

Resuming Recovery
Following the recovery, preparation for delivering the data begins. Since the original hard disk drive was encrypted, safely securing the recovered data is highly important. The recovered data is backed up to the media choice of the user and is re-encrypted. The new decryption key is communicated verbally to the user; email should not be used, as this could be a security risk. Some leading edge data recovery companies are able to deliver recovered data back to the customer in an encrypted format on external USB/Firewire hard disk drives. From the start of the recovery to the final delivery, data should be secure throughout the entire process.

Read More

Case Study: How to create a RAID 0 (stripped) Array

Raid 0 Array (Stripped) Create a RAID 0 (stripped) array using the Western Digital serial ATA RAID controller and two serial ATA drives.

Note: A RAID 0 array is not fault tolerant. It is recommended that you backup any important data that you decide to store on the array.

To create a RAID 0 array please follow the steps below:

  1. With the computer powered off, follow the instructions for installing the RAID controller correctly and connect both Serial ATA hard drives to the controller.
  2. Boot your computer with the controller and drives already installed.
  3. Watch your boot screens for a prompt that will ask you to press the Control and F keys at the same time to enter the Fastbuild utility and press those keys to enter.
  4. Press the 1 key to enter Auto Setup.
  5. Verify that the top of the screen says Optimize Array for: Performance.
  6. If the top of the screen says Security instead of performance, highlight the word Security and press the right arrow button to change the word to Performance.
  7. You should see that two hard drives are being used in the array and you will also see the total size of the array in MB.
  8. Press the Control and Y keys at the same time to save the array configuration.
  9. Press the Y key to create and quick initialize the array.
  10. You will be warned that all data on the drives will be erased, press the Y key to proceed.
  11. The array is now created, press any key to reboot.

To use the array for extra data storage only:

  • Install the latest service pack for your operating system to enable large drive support and use Disk Management to partition and format the array.

To use the array as your bootable system drive:

  • Set your BIOS to boot to CD first and boot from your Windows 2000/XP CD to load your operating system onto the array.
  • Windows will treat the array as one large drive and will install on the array just as it would on a single drive.
  • When you are prompted by Windows setup to press the F6 key to install SCSI or RAID drivers, you will need to press F6 and insert the driver disk that came with your RAID controller card.
  • Once the drivers for the card are installed you will be able to finish the installation of Windows 2000/XP onto the array. After the installation of Windows, please install the latest service pack for Windows to enable large drive support and avoid data corruption.

Note: Your system BIOS may require you to change the order of your boot sequence before you can boot your computer from a controller. For more information about adjusting options in your system BIOS, please contact the manufacturer of your computer or motherboard.

Read More

2060-701622-000 WD PCB Circuit Board

HDD Printed circuit board (PCB) with board number 2060-701622-000 is usually used on these Western Digital hard disk drives: WD1001FALS-00J7B1, DCM HANNNT2CB, Western Digital 1TB SATA 3.5 Hard Drive; WD1001FALS-00J7B1, DCM HBNNHV2CA, Western Digital 1TB SATA 3.5 Hard Drive; WD1001FALS-00J7B1, DCM HBNNHV2AB, Western Digital 1TB SATA 3.5 Hard Drive; WD1001FALS-00J7B1, DCM HARNHV2CB, Western Digital 1TB…

Read More

Top Backup Services And Charge

Backup Services www.mozy.com
Disk Space: Unlimited
Price:
MozyHome: $4.95/month
MozyPro:
Desktop Licenses: $3.95+$0.50/GB/month
Server Licenses: $6.95 + $0.50/GB /month
Home User: 2GB Free
(Get one month FREE when you sign up for an annual account or three months FREE with a biennial subscription.)
Trail: Yes
Mac: Yes

www.carbonite.com
Disk Space: Unlimited
Price:
Three Year Subscription: $129.95/Year
Two-Year Subscription: $99.95/Year
Two-Year Subscription: $54.95/Year
Trail: Yes
Mac: Yes

www.sosonlinebackup.com
Disk Space:
Price:
SOS Home Edition:
2 GB USD 19.95/Year
5 GB USD 29.95/Year
15 GB USD 49.95/Year
SOS Business Edition:
500 MB USD 4.50/Year
2 GB USD 36.00
10 GB USD 180.00
…….
Trail: Yes
Mac: No

www.idrive.com
Disk Space:
Price:
Idrive Basic: 2GB Free
Idrive Pro:
150 GB USD 49.50/Year (Personal Use)
500 GB USD 149.50/Year (Family Pack Up to 5 PCs)
Idrive Pro For Business
50 GB USD 99.50
100 GB USD 199.50
500 GB USD 499.50
Trail: Yes
Mac: Yes

www.backupandshare.com
Disk Space: Unlimited
Price:
Indivitual:
10 GB USD 49.95/Year
Business:
Unlimited USD 150.00/Year
Trail: No
Mac: Yes

www.keepit.com
Disk Space: Unlimited
Price: 4.95 $/month
Trail: 30 days money back
Mac: No

www.elephantdrive.com
Disk Space: Unlimited
Price:
Home User: 49.95 $/year (2 months free)
Home Plus Edition: 99.95 $/year (2 months free 4 computers)
Pro Edition: 349.95/year (2 months free 10 computers)
Pro Plus Edition: 99.95/month (20 computers)
Trail: Yes
Mac: No

www.memopal.com
Disk Space:  150GB
Price:
Personal:
150GB 49€/year
250GB 69€/year
Business:
49€(10GB) + 2.4€/GB per Year
Trail: Yes
Mac: Yes

www.symantec.com
Disk Space: 25GB
Price: $49.99/Year
Trail: Yes
Mac: No

Read More