A survey of 300 IT professionals, commissioned by Quantum and conducted by Toluna, revealed some interesting – and disconcerting – information on IT organizations’ security threats and disaster recovery (DR) operations. For example, every one of the 300 respondents reported at least one data security incident in the past year, with most common being virus […]
A survey of 300 IT professionals, commissioned by Quantum and conducted by Toluna, revealed some interesting – and disconcerting – information on IT organizations’ security threats and disaster recovery (DR) operations.
For example, every one of the 300 respondents reported at least one data security incident in the past year, with most common being virus attacks (cited by 43% of the IT professionals), followed by hardware corruption (40%).
The rest of the security-related incidents included accidental deletion (28%), operating system failure (27%), natural disaster (21%), lost/stolen devices (20%), hacking or other electronic breaches (19%), firmware corruption (16%) and break-ins (13%).
A surprising 87% of the survey respondents think that their data is vulnerable in the event of security-related incidents, with almost 50% of them reporting that their data is “somewhat” or “extremely” vulnerable and the other half saying that their data is “slightly” or “not at all” vulnerable.
The survey also revealed the business impact of security-related incidents. For example, it takes IT organizations on average 10.5 hours to resume normal operations after a security incident, with more than 25% reporting that it takes 11 hours or more and 13% reporting delays of at least 24 hours.
The survey also queried the companies about how they implement disaster recovery. About 37% of the respondents replicate to a DR site, 27% send media offsite and replicate to a disaster recovery site, and 22% only send media offsite.
“The most common mistake that people make is to not treat DR as being separate from backup and long-term archiving,” says Steve Whitner, a product marketing manager at Quantum. To improve DR practices and reduce security risks, Whitner advises using disk-based deduplication for cost-efficient replication.
The survey also asked users about their backup practices. Almost half (47%) use a combination of disk and tape for backup, while 40% rely solely on disk and 13% only use tape for backup.
Follow Enterprise Storage Forum on Twitter.
Enterprise Storage Forum offers practical information on data storage and protection from several different perspectives: hardware, software, on-premises services and cloud services. It also includes storage security and deep looks into various storage technologies, including object storage and modern parallel file systems. ESF is an ideal website for enterprise storage admins, CTOs and storage architects to reference in order to stay informed about the latest products, services and trends in the storage industry.
Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved
Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.