Most Office 365 Admins Rely on Recycle Bin for Data Backup

  /     /     /  
Publicated : 22/11/2024   Category : security


Most Office 365 Admins Rely on Recycle Bin for Data Backup


Nearly 66% of Office 365 administrators use Recycle Bin to back up their data, a practice that could leave data lost and unrecoverable.



There are several reasons why Office 365 administrators should not use Recycle Bin to protect their data, but nearly two-thirds continue to do so. This risky and unreliable practice could lead to major loss and its popularity demands stronger protective strategies.
The Microsoft Recycle Bin is a nice feature, but its job is to help the organization safeguard against accidental data loss, says Rod Mathews, SVP and general manager of data protection at Barracuda Networks. Its not meant to be a data recovery solution.
Barracuda conducted a survey of general technologists responsible for data protection and recovery to learn about how they safeguard their information. Some of the results, which highlighted the Recycle Bin practice, were alarming, he notes.
Recycle Bin isnt equipped with the necessary features to protect data stored in OneDrive, Exchange, Sharepoint, and other business services. The information it does protect isnt safe for very long and becomes non-recoverable if its deleted or ages past the 30-day time limit.
You wont be able to recover that data in a realistic way by going to the Recycle Bin and restoring emails, Mathews explains. Youll want a more thoughtful recovery strategy.
Survey respondents represent companies across sizes and industries. While he acknowledges small businesses might not understand the risk of relying on Recycle Bin for data protection, Mathews adds there may be Fortune 500 companies using this method as well.
The rise in ransomware attacks is demanding security leaders to rethink their data protection strategies. Global incidents like
WannaCry
highlight the danger of not having plans for data backup and recovery. Data recovery may be the only way to avoid paying ransom, and could save a company if the attackers had no intention of restoring the data, as seen in
NotPetya
.
In an emergency, having backups isnt enough; being able to get to them is just as important. Seventy percent of respondents said data accessibility was equally as important as data availability.
Depending on the value of the data, companies will invest in different levels of infrastructure to make sure they can recover that data in an appropriate amount of time, says Mathews.
Accessibility is key because more than half (53.4%) of respondents are responsible for data recovery in multiple locations, meaning their systems have to be accessible from different places, using different methods.
About half of respondents said their backups are cloud-based and 76% replicate their data backups in the cloud. Data indicates that the 77.4% who have a disaster recovery plan are using the cloud for both redundancy and accessibility. Mathews predicts well see more discussions around how to protect cloud-based environments as more businesses adopt them.
You need to protect against user errors and malware in the cloud just as you do that kind of protection locally, he emphasizes, noting the
Amazon S3 leaks
exemplify this. Cloud providers have protected against a lot of that, but customers still need to think about it.
Researchers also discovered 81.2% of respondents dont test their data protection strategies more than once per year, and about half that number dont test them at all. Testing is critical to ensure data protection is effective but its also a huge thing people overlook, Mathews says.
If they have an issue, how long does it take to get the business back up and running? he asks. If you dont have a program, youre going to find out at the worst possible time.
Testing should happen on a regular basis because files change in value, data moves from place to place, and new applications may not be added to the data protection plan. Companies should do random spot checks: pick a server and make sure you can restore its information.

Last News

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Most Office 365 Admins Rely on Recycle Bin for Data Backup