Backup and Disaster Recovery Best Practices https://solutionsreview.com/backup-disaster-recovery/category/best-practices/ Solutions Review Fri, 16 May 2025 14:54:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.2 https://solutionsreview.com/backup-disaster-recovery/files/2024/01/cropped-android-chrome-512x512-1-32x32.png Backup and Disaster Recovery Best Practices https://solutionsreview.com/backup-disaster-recovery/category/best-practices/ 32 32 Software Buyers Beware: SaaS is About to Get Weird https://solutionsreview.com/backup-disaster-recovery/software-buyers-beware-saas-is-about-to-get-weird/ Tue, 13 May 2025 17:12:48 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=7090 SEON’s President, GTM Matt DeLauro offers commentary on how software buyers should beware; the world of  SaaS is about to get weird. This article originally appeared in Insight Jam, an enterprise IT community that enables human conversation on AI. Software-as-a-Service (SaaS) is poised for a significant shift driven by market consolidation and heightened buyer vigilance. […]

The post Software Buyers Beware: SaaS is About to Get Weird appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

SEON’s President, GTM Matt DeLauro offers commentary on how software buyers should beware; the world of  SaaS is about to get weird. This article originally appeared in Insight Jam, an enterprise IT community that enables human conversation on AI.

Software-as-a-Service (SaaS) is poised for a significant shift driven by market consolidation and heightened buyer vigilance. The post-pandemic surge in digital transformation, fueled in large part by venture capital, is giving way to an era of financial prudence and strategic realignment. This shift is driven by companies intensifying their focus on the efficiency and effectiveness of their tech stacks, a trend highlighted by notable contractions in the average SaaS portfolio. Companies are scrutinizing their tech investments more carefully than ever before.

These changes signify a move away from isolated and disparate point solutions toward integrated platforms that offer interconnected functionalities. This evolution is reflected in the elongation of B2B SaaS sales cycles, which have expanded from 33 days in 2020 to 43 days in 2024 (and 65 for enterprise-grade business), indicative of the more meticulous purchasing process. On the funding front, Crunchbase reports that we’re currently 10 quarters into a startup funding decline, heralding a cooling market that necessitates a more discerning investment approach.

As we depart from the frenetic pace of the past decade that favored rapid expansion over solid financial footings, the SaaS sector, once a playground for endless innovation and venture optimism, is set to enter a new phase. Buyers are adopting a more circumspect approach, aligning their strategies with the evolving dynamics of a more mature marketplace. As the industry braces for a potentially rocky transition, software buyers be advised: things are about to get weird, and navigating this new terrain will require a keen eye and a strong penchant for detailed due diligence.

The New Reality of Vendor Assessment

The SaaS landscape in 2025 is positioned for more mergers and acquisitions. See Visa’s purchase of Featurespace and Experian’s integration of NeuroID[1] as acceleration proof points in the fraud prevention space. This consolidation will further reshape the market and redefine the types of SaaS products that thrive under stringent market conditions. With an increasing focus on risk mitigation, security and compliance, applications are becoming critical components of the tech stack.

For software buyers, this consolidation necessitates a more sophisticated approach to vendor evaluation. Organizations must rigorously vet existing and potential vendors based on factors such as their current position and long-term viability. Standard due diligence must include questions about year-over-year growth, new client acquisition rates and overall financial health. Such scrutiny distinguishes vendors operating on stable revenue models from those primarily subsisting on investor funding.

The Right to Ask Hard Questions: Strategic Imperatives for Software Buyers

To navigate complexities, companies should consider implementing these strategic measures:

  • First, establish a systematic approach to software stack auditing. Regular evaluations help identify potential vulnerabilities in your technology infrastructure and assess the impact of market changes on your operations. Pay attention to mission-critical applications.
  • Second, prioritize integration capabilities when evaluating new solutions. The trend toward consolidated platforms means that standalone solutions must demonstrate clear value and seamless integration potential with your existing technology stack. This approach helps minimize operational risks and protect against service disruptions.
  • Third, develop robust contingency plans for potential vendor transitions. As market consolidation accelerates, having clear procedures for vendor changes or service discontinuations becomes crucial for maintaining business continuity.

Such plans ensure that businesses can maintain continuity, minimizing the impact on operations and preserving customer trust.

 SaaS Grows Up

The evolving SaaS industry presents both challenges and opportunities for software buyers. While the market may experience some turbulence during this transition, organizations that strategically approach vendor selection and management will be better positioned to capitalize on emerging opportunities. Success in this new environment requires balancing innovation with stability, carefully evaluating vendor partnerships and maintaining flexibility in your technology strategy.

For software buyers, the key to navigating this evolution lies in adopting a more measured, strategic approach to SaaS procurement and management. Organizations can build more resilient technology stacks that drive long-term value by establishing robust evaluation frameworks. Maintaining an open dialogue with vendors about their strategic direction and financial health further supports this effort. Buyers who adapt their procurement strategies to the changing  SaaS market will find themselves better equipped to navigate oncoming challenges and opportunities.

The post Software Buyers Beware: SaaS is About to Get Weird appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
What the AI Impact on Data Privacy Jobs Looks Like Right Now https://solutionsreview.com/backup-disaster-recovery/what-the-ai-impact-on-data-privacy-jobs-looks-like-right-now/ Mon, 05 May 2025 20:06:41 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=7080 Solutions Review’s Executive Editor Tim King highlights the overarching AI impact on data privacy jobs, to help keep you on-trend during this AI moment. One of the most consequential ways AI is reshaping the data landscape in 2025 is through its impact on data privacy jobs. While data privacy has always been a high-stakes domain—balancing […]

The post What the AI Impact on Data Privacy Jobs Looks Like Right Now appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

Solutions Review’s Executive Editor Tim King highlights the overarching AI impact on data privacy jobs, to help keep you on-trend during this AI moment.

One of the most consequential ways AI is reshaping the data landscape in 2025 is through its impact on data privacy jobs. While data privacy has always been a high-stakes domain—balancing regulatory compliance, risk mitigation, and ethical stewardship—AI is now forcing a redefinition of what it means to protect sensitive information. From AI-powered data discovery to autonomous policy enforcement and synthetic data generation, the job of safeguarding personal and proprietary data is no longer confined to manual audits and policy checklists. It’s becoming smarter, faster—and in many cases—less human.

To keep pace with these radical shifts, the Solutions Review editors have broken down how AI is altering data privacy job functions, what professionals can do to remain indispensable, and what a future-proof privacy career might look like in an era of algorithmic governance and machine-scale data flows.

Note: These insights were informed through web research using advanced scraping techniques and generative AI tools. Solutions Review editors use a unique multi-prompt approach to extract targeted knowledge and optimize content for relevance and utility.

AI Impact on Data Privacy Jobs: How Has AI Changed the Data Privacy Workforce?

AI is reshaping the data privacy profession on every front—from how data is classified and governed to how violations are detected and prevented. What used to require privacy analysts to manually audit data flows, map personal data across systems, and enforce static policies is now being reimagined through intelligent automation and predictive analytics. But with this transformation comes a double-edged sword: while AI offers unprecedented efficiency and coverage, it also introduces new threats, new skill gaps, and a shifting regulatory landscape that demands faster adaptation.

Automated Data Discovery and Classification

One of the biggest shifts is in how sensitive data is discovered, cataloged, and classified. AI-powered discovery tools can scan vast data estates, identify personal or regulated data (like PII, PHI, or financial information), and tag it with metadata—often in real time. Platforms like OneTrust, BigID, and Immuta now use natural language processing (NLP) and machine learning to automate what used to be a tedious, error-prone task.

This has streamlined privacy compliance dramatically, especially under regulations like GDPR, CCPA, and HIPAA. But it also means that entry-level roles focused on manual classification, mapping, or audit prep are being phased out. Instead, the value is shifting toward roles that can configure, interpret, and validate these AI models—understanding not just where data is, but why it matters in a legal and ethical context.

Real-Time Monitoring, Alerts, and Policy Enforcement

AI is also changing the way policy violations and data misuse are detected. Behavioral analytics models now monitor data access patterns, flag anomalies, and trigger real-time alerts when privacy risks arise—whether it’s an employee accessing sensitive data outside business hours or a system suddenly exfiltrating more information than usual. Tools like Securiti.ai and Privacera use machine learning to enforce access policies dynamically, based on context and usage, rather than static roles or rules.

This is a seismic shift for privacy pros who previously relied on logs and periodic reviews to spot issues. The new paradigm demands fluency in privacy-aware AI configuration, incident triage, and the nuanced interpretation of algorithmic risk scores. It also raises a host of new questions about explainability, model bias, and the potential for false positives to erode trust across teams.

Synthetic Data and Privacy-Preserving AI

To reduce compliance risk while enabling data sharing and model training, organizations are increasingly turning to AI-generated synthetic data. These are artificial datasets designed to mimic real data without exposing real individuals. Privacy teams are now tasked with validating the fidelity, fairness, and regulatory soundness of synthetic data sets used across analytics, product development, and AI training.

This adds a whole new layer to the privacy role. Professionals must understand how generative AI works, how to assess reidentification risk, and how to audit synthetic datasets for compliance with global privacy laws. In some cases, data privacy experts are becoming the arbiters of whether AI models are trained responsibly—especially as regulators begin scrutinizing AI supply chains more closely.

Regulatory Intelligence and AI-Driven Compliance

The global privacy regulatory landscape is expanding rapidly—and AI is being deployed to keep up. Tools now track and interpret changes to regulations across jurisdictions using natural language processing, surfacing relevant updates and mapping them to internal policies. This helps privacy teams maintain continuous compliance without manually tracking hundreds of regulatory updates each year.

But again, automation doesn’t mean elimination. It means evolution. Professionals need to move beyond memorizing legal clauses to interpreting AI-curated guidance, tailoring it to organizational risk profiles, and translating it into practical workflows and controls. The focus is shifting from rote compliance to strategic governance and risk modeling.

A 2024 report by the International Association of Privacy Professionals (IAPP) found that 59% of organizations using AI in their privacy programs reduced time spent on manual audits by over 50%. However, 68% reported increased demand for staff with expertise in AI governance, data ethics, and cross-border compliance risk—a clear sign that new jobs are emerging even as old ones shrink.

The Rise of AI-Native Privacy Roles

As with data engineering, AI isn’t just replacing old workflows—it’s giving rise to new job titles and functions. We’re seeing the emergence of roles like “AI Privacy Engineer,” “Synthetic Data Analyst,” and “Algorithmic Risk Advisor.” These are professionals who can bridge the gap between data science and regulatory compliance, embedding privacy into the AI development lifecycle rather than bolting it on after the fact.

In the coming years, privacy experts who understand AI tooling—how models are trained, how drift occurs, how privacy-enhancing technologies (PETs) work—will become critical to organizational resilience. But it’s important not to get complacent: as AI matures, these roles too may become less technical and more strategic. Long-term relevance will hinge on the ability to think holistically about data ethics, stakeholder trust, and adaptive governance in a fast-changing world.


Upskilling for the AI-Privacy Future

If privacy is your domain, AI fluency is no longer optional—it’s essential. The new skill set requires a hybrid mindset: technical enough to grasp the mechanics of AI, but regulatory-savvy enough to steer its use responsibly. That means investing in:

AI governance and ethics: Learn how AI systems make decisions, where bias can creep in, and how to audit them for compliance with evolving standards.

Data anonymization and PETs: Become proficient in tools and techniques that balance data utility and privacy—like differential privacy, secure enclaves, and federated learning.

Synthetic data tools and validation: Understand how synthetic data is generated, when it’s appropriate to use, and how to validate it against legal standards.

Cross-functional communication: Privacy teams will increasingly work alongside data scientists, security pros, and business leaders. Clear communication and risk translation are key.

Global regulatory fluency: Stay current with the expanding patchwork of privacy laws—and learn how to leverage AI tools to maintain compliance dynamically.

For organizations, the best privacy teams of the future won’t just enforce rules—they’ll architect systems where privacy is a design principle. That means embracing AI not just as a compliance accelerant, but as a co-pilot in delivering trustworthy innovation.


AI Will Elevate Privacy Jobs—But Only for the Adaptive

If there’s one constant in the AI-privacy conversation, it’s this: the field is being elevated, but the bar is rising fast. AI will take over repetitive risk management tasks—but it will never fully automate judgment, context, or accountability. The privacy pros who thrive in this new era will be the ones who evolve from policy enforcers to strategic advisors and system architects.

The next three to five years will bring more change to data privacy than the previous two decades combined. But for those who lean in—who develop AI intuition, embrace complexity, and champion ethics in the machine age—the future is full of opportunity.

Bottom line: AI will automate the checklists, but it won’t automate your judgment. To future-proof your career in data privacy, become the voice of reason, foresight, and integrity in an increasingly automated world.

The post What the AI Impact on Data Privacy Jobs Looks Like Right Now appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
Why the 3-2-1 Backup Rule Remains a Cornerstone of Cybersecurity in 2025 https://solutionsreview.com/backup-disaster-recovery/why-the-3-2-1-backup-rule-remains-a-cornerstone-of-cybersecurity-in-2025/ Mon, 14 Apr 2025 16:38:28 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=7069 Daniel Pearson, the CEO at KnownHost, explains why the 3-2-1 backup rule is just as important to cybersecurity today as it was when it was first created. This article originally appeared in Insight Jam, an enterprise IT community that enables human conversation on AI. Cyber incidents are expected to cost the US $639 billion in 2025. […]

The post Why the 3-2-1 Backup Rule Remains a Cornerstone of Cybersecurity in 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
Why the 3-2-1 Backup Rule Remains a Cornerstone of Cybersecurity in 2025

Daniel Pearson, the CEO at KnownHost, explains why the 3-2-1 backup rule is just as important to cybersecurity today as it was when it was first created. This article originally appeared in Insight Jam, an enterprise IT community that enables human conversation on AI.

Cyber incidents are expected to cost the US $639 billion in 2025. According to the latest estimates, this dynamic will continue to rise, reaching approximately $1.82 trillion in cyber-crime costs by 2028. These figures highlight the crucial importance of strong cybersecurity strategies, which businesses must build to reduce the likelihood of risks. 

As technology evolves at a dramatic pace, businesses are increasingly dependent on utilizing digital infrastructure, exposing themselves to threats such as ransomware, accidental data loss, and corruption. Despite the 3-2-1 backup rule being invented in 2009, this strategy has stayed relevant for businesses over the years, ensuring that the loss of data is minimized under threat, and it will be a crucial method in the upcoming years to prevent major data loss.   

What Is the 3-2-1 Backup Rule? 

The 3-2-1 backup rule is a simple yet highly effective data protection strategy that consists of the following setup: 

  • Keep three copies of your data, including the original and two backups. 
  • Storing the data in two different locations. For example, the cloud, on a disk, or a local drive. 
  • Storing a copy of the data off-site. 

This layered approach has long been considered a gold standard in IT security because it diversifies risk, minimizes points of failure, and increases the likelihood of successful data recovery in the event of a cyber-attack or system malfunction. 

Why is This Rule Still Relevant in Today’s Cyber Threat Landscape? 

In today’s environment, many businesses assume that storing data in the cloud is enough. However, it’s not a failsafe. Due to the rapid growth of cloud infrastructure, cyber-criminals are now actively targeting these using advanced ransomware techniques, leaving businesses with no clean recovery option. Statistics show that 80 percent of companies have encountered an increase in the frequency of cloud attacks. 

Because of this, more than ever, businesses need to invest in immutable backup solutions that ensure backup data cannot be modified, deleted, or accessed by unauthorized parties. 

Common Backup Mistakes Businesses Make 

Despite widespread awareness of data protection principles, organizations still make critical errors in how they approach backups. One of the most common mistakes is storing all backups on the same physical network. This means that once malware infiltrates the network, it can easily encrypt both primary and backup data. 

Organizations also often neglect offline or air-gapped backups. As they rely solely on always-connected cloud or on-premise storage solutions, recovery options may be easily wiped out during an attack. 

Finally, one of the most important steps businesses need to take yet fail to do so is to test backup restoration. Backups are only as good as their ability to be restored. Far too many organizations neglect regular testing, leading to the devastating realization that backup data is inaccessible or corrupted only after a breach has occurred. 

How to Implement the 3-2-1 Rule 

To effectively integrate the 3-2-1 backup rule into your cybersecurity practices, organizations should begin with diversifying their storage solutions. For the most secure option, businesses may wish to use a combination of local disks, cloud storage, and physical media such as external drives. 

Next, leverage technologies that ensure backup data is write-once, read-many (WORM), meaning it cannot be altered or deleted, even by administrative accounts. Organizations may then wish to utilize appropriate automation and AI-driven tools. These help with automated monitoring, anomaly detection, and predictive analytics to verify backup integrity and alert businesses to suspicious changes or failures in the backup process.  

Finally, businesses also need to ensure that they align with regulatory standards. GDPR in the UK, or CCPA in the United States, emphasizes data protection and backup integrity. Ensuring your backup strategy adheres to these standards reduces legal risk and strengthens overall security. 

By combining this proven strategy with modern innovations such as immutable storage and AI-driven backup monitoring, organizations can fortify their defenses and dramatically improve their resilience to cyber threats.


The post Why the 3-2-1 Backup Rule Remains a Cornerstone of Cybersecurity in 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
Why Cybercriminals Are Targeting Your Backups and How to Be Prepared https://solutionsreview.com/backup-disaster-recovery/why-cybercriminals-are-targeting-your-backups-and-how-to-be-prepared-2/ Mon, 07 Apr 2025 18:35:17 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=7055 Most organizations believe they’re prepared for ransomware attacks with a simple strategy: maintain good backups and use them to restore systems if cybercriminals encrypt their data. However, there’s a dangerous flaw in this approach that many overlook – attackers are increasingly targeting backup systems themselves, leaving organizations with no path to recovery. This trend is […]

The post Why Cybercriminals Are Targeting Your Backups and How to Be Prepared appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

Most organizations believe they’re prepared for ransomware attacks with a simple strategy: maintain good backups and use them to restore systems if cybercriminals encrypt their data. However, there’s a dangerous flaw in this approach that many overlook – attackers are increasingly targeting backup systems themselves, leaving organizations with no path to recovery.

This trend is becoming alarmingly common. Recent research from IDC reveals that in 2023, more than half of all ransomware attacks included attempts to compromise backup systems. Even more concerning, these attempts succeeded 60% of the time.

Understanding the Evolution of Ransomware Attacks

Traditional ransomware attacks focused on encrypting active production data – the information businesses use daily in their operations or, “live data”, such as customer databases, financial records, and email systems. When this data becomes encrypted, operations grind to a halt, pressuring organizations to pay the ransom to regain access.

However, companies began to make their backup strategies even more robust and have long served as an effective countermeasure. With recent, accessible backups, organizations could restore their systems without paying the ransom. However, this led cybercriminals to adapt their tactics. They began orchestrating long-term infiltrations specifically designed to compromise both production systems and backup infrastructure simultaneously. Their new objective became clear: render an organization’s entire safety net useless, leaving them with no choice but to pay the ransom or face catastrophic data loss.

Common Attack Methods on Backup Systems

Before launching their attacks, malicious actors are certainly smart about it. They often employ a “low and slow” approach, choosing to remain undetected within a company’s networks for weeks or even months. This gives them time to map out the entire backup infrastructure, including scheduled backup times, retention policies, storage locations, and access patterns. They can potentially see which administrators have access to which systems, monitor backup software configurations, and identify potential vulnerabilities in the backup chain.

This patient approach allows attackers to develop highly targeted strategies that can simultaneously compromise both production data and backup systems when they finally strike, maximizing the impact of their attack and the likelihood of ransom payment.

Cybercriminals employ various sophisticated techniques to initially compromise systems:

1. Administrative Credential Theft: Using stolen login information from IT staff to access and delete backups

2. Deceptive Social Engineering: Manipulating employees through sophisticated phishing schemes to compromise backup systems

3. Backup Software Vulnerabilities: Exploiting security weaknesses in backup tools

4. Storage System Breaches: Targeting the infrastructure where backups reside

Keep in mind, attackers don’t need to destroy all backup data to succeed. Even partial corruption can force organizations to pay the ransom, especially when facing pressure to restore operations quickly.

Assessing Your Backup Vulnerability

Several key factors influence how susceptible your backups are to attack:

  • The physical and logical separation between your production and backup environments.
  • How easy it is to identify your backup storage locations.
  • The effectiveness of your employee training against social engineering.
  • How often patch updates are implemented and security holes are scanned.
  • The implementation of advanced authentication methods like Multi-Factor Authentication (MFA) and the Principle of Least Privilege (POLP) on backup systems.

And perhaps most importantly…

  • How robust your backup and disaster recovery strategy is and whether your Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are optimized to minimize downtime and data loss.

Why Traditional Security Isn’t Enough

There is no doubt IT teams are working tirelessly – without a coffee break and even over the weekend to update their systems and run threat detection software. But modern cybercriminals have demonstrated their ability to bypass even the most advanced security measures. The question isn’t just about preventing attacks – it’s about maintaining operational continuity when they occur. This requires a shift in thinking: from prevention-only to prevention-plus-recovery.

Seven Critical Components of a Resilient Backup Strategy

Attackers have realized that compromising both production and backup data creates maximum leverage. When organizations lose access to both their current data and their backups, they face an impossible choice: pay the ransom or lose everything.

To maintain a business continuity plan, which goes beyond layered threat detection, here are seven strategies your IT team can implement immediately to ensure you have a healthy, immediate failover once a malicious infiltration has occurred.

1. Automated Recovery Testing

Gone are the days of manual backup testing. All businesses must have automated recovery drills integrated into their regular operations. These tests should verify not just data integrity, but the complete restoration of network configurations and system settings. Each test generates detailed audit trails, providing both compliance documentation and security validation. This automated approach not only ensures consistent testing procedures, it reduces the risk of human error and saves an enormous amount of time for backup IT admins.

2. Strategic Air-Gapping

Air-gapping has evolved beyond simple offline storage solutions. Businesses on the cloud need modern air-gapping solutions enable rapid restoration capabilities while maintaining critical data isolation. That means if you are only one cloud provider, implementing systems that can fail over immediately from any region or account. If you run a Multicloud environment, companies are beginning to ensure backup data remains completely segregated from production environments using cross-cloud air-gapping. Which brings us to…

3. Multi-Cloud Architecture

A distributed backup ecosystem provides essential protection against both targeted attacks and systemic failures. Businesses should spread their backup infrastructure across multiple cloud providers, using distinct authentication systems and separate environmental controls. This approach ensures that a compromise in one environment doesn’t cascade into others, while maintaining rapid recovery capabilities from any location.

4. Advanced Encryption Protocols

Modern backup encryption must protect data at multiple levels. This means securing not just the backup content itself, but also implementing sophisticated key management systems kept entirely separate from the backup infrastructure. Advanced encryption protocols prevent unauthorized users from even identifying backup locations, adding an essential layer of security through obscurity while maintaining full recoverability for authorized users.

5. Immutable Storage Implementation

Creating truly unchangeable backups requires more than just write protection. Modern immutable storage systems combine write-once-read-many technologies with sophisticated retention policies and integrity guarantees. This ensures that backup data remains pristine regardless of potential security breaches or accidental modifications. The system must maintain backup integrity while still enabling rapid recovery when needed.

6. Enhanced Access Controls

Access management for backup systems requires sophisticated role-based controls integrated with multi-factor authentication. Businesses must implement separate credential systems for backup access, maintaining detailed audit trails of all interactions with backup systems. This creates a secure environment where backup integrity is maintained without compromising recovery capabilities.

7. Cost-Effective Data Lifecycle Strategies

Rather than simply creating multiple copies of data, businesses need to implement intelligent redundancy strategies. This means developing sophisticated tiering systems that automatically store data based on age, importance, and recovery requirements. However, many companies shy away from this due to storage cost concerns.

Backup costs can be greatly optimized while maintaining security through intelligent data management. Modern solutions automatically transition incremental backups to lower-cost storage tiers while keeping them readily accessible. By only keeping the change in your last backup and utilizing a smart archiving approach, companies can significantly reduce storage costs without compromising security or recovery capabilities.

(Tip. most cloud providers store full backups and lack optimal tiering leading to unnecessarily high expenses).

Looking Ahead: The Role of Automation

As cyber threats continue to evolve, companies in every sector must maintain backup strategies that are both robust and adaptable. The focus should be on creating systems that not only protect data but ensure business continuity under any circumstances. Because the ability to recover quickly and completely isn’t just about security – it’s about maintaining the trust that forms the foundation of your customer relationships.

Automation has transformed backup management from a manual process into a sophisticated, self-managing system. Modern tools handle everything from routine backups to complex multi-cloud management, reducing human error and empowering backup IT admins. Companies and IT teams that embrace these advanced approaches and tools will be best positioned to maintain operations regardless of the challenges they face.

The post Why Cybercriminals Are Targeting Your Backups and How to Be Prepared appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
World Backup Day Quotes from Experts for 2025 https://solutionsreview.com/backup-disaster-recovery/world-backup-day-quotes-from-experts-for-2025/ Mon, 31 Mar 2025 11:00:55 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=7038 Solutions Review’s Executive Editor Tim King compiled this roundup of World Backup Day quotes from experts for 2025, part of our ongoing coverage of the enterprise storage and data protection market. In the age of AI, ransomware, and relentless cyber threats, data protection is no longer just an IT issue — it’s a boardroom imperative. […]

The post World Backup Day Quotes from Experts for 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

Solutions Review’s Executive Editor Tim King compiled this roundup of World Backup Day quotes from experts for 2025, part of our ongoing coverage of the enterprise storage and data protection market.

In the age of AI, ransomware, and relentless cyber threats, data protection is no longer just an IT issue — it’s a boardroom imperative. As part of Solutions Review’s ongoing coverage of the enterprise storage, data protection, and backup and disaster recovery markets, our editors bring you an exclusive curation of World Backup Day 2025 insights from our expert community.

These curated quotes have been carefully vetted for business value — offering real-world insights, actionable advice, and forward-thinking reflections on the evolving role of backup in today’s enterprise environments. Whether you’re safeguarding cloud workloads or securing petabytes of mission-critical data, the wisdom shared here is designed to inform, inspire, and elevate your data resilience strategy.

Note: World Backup Day quotes are listed in the order we received them.

World Backup Day Quotes: Expert Insights for 2025


Steve Petryschuk – Director, Product Market & Strategy at Auvik

“You back up the data you know about, but what about the data you don’t see?

Shadow IT and shadow AI remain a major source of headaches for IT teams. Without proper oversight, sanctioned and unsanctioned SaaS applications can leave sensitive business information exposed. Companies are more likely to experience a cybersecurity incident if they can’t see where their data resides. When backups of sanctioned SaaS applications do exist, overlooked SaaS data often goes unprotected. To build a robust SaaS backup strategy, start by giving IT teams full visibility into the apps being used, so they can proactively secure, manage, and back up critical data.

Network data presents another crucial piece of the puzzle. According to the Auvik IT Trends 2025 Report, 61 percent of IT professionals update network configurations weekly, yet nearly half only document those changes monthly or less often. This creates a four-week window where documentation lags behind. This gap exposes businesses to unnecessary risk, especially when a simple, automated network backup solution can close it. Rather than building your own system, rely on established network management tools to automate configuration backups, track and highlight changes in real time, and alert you when unauthorized modifications occur.

By centralizing both SaaS and network management, IT teams will expand their data visibility and safeguard this often overlooked but critical data.”


Stephen Kowski – Field CTO at SlashNext

“Backing up data is crucial, but it’s only half the battle – you also need to protect your data from threats like phishing, BEC, and smishing that can compromise backups in the first place. Modern security requires real-time protection across all communication channels including email, mobile, and messaging apps to stop zero-hour threats before they reach users. The best defense combines advanced AI technology that can detect sophisticated attacks with a multi-layered approach that works across your entire digital ecosystem. With World Backup Day approaching, it’s the perfect time to remind everyone that comprehensive security and regular backups go hand-in-hand for true data protection.”


Kelvin Lim – Senior Director, Head of Security Engineering (APAC) at Black Duck

“Data is the ultimate digital asset for organizations. Losing or corrupting data can severely disrupt workflows, obstruct decision-making, and even threaten the very survival of a business. As such, establishing a reliable data backup and recovery system is crucial as the ultimate safeguard against risks such as cyberattacks, human errors, hardware malfunctions, power failures, and natural disasters.

Additionally, in a time of increasing cyber threats, data backup plays a pivotal role in enhancing cyber resilience by facilitating quicker recovery. This minimizes downtime and operational disruptions caused by incidents like ransomware attacks. This not only saves financial resources but also ensures that critical data can be recovered promptly, minimizing operational downtime and disruption. Backups provide an effective strategy for combating ransomware, enabling businesses to restore their data without succumbing to ransom demands. This approach not only reduces financial losses but also strengthens organizational adaptability and responsiveness in challenging circumstances.

To maximize the effectiveness of data backup efforts, it is essential to follow established industry best practices:

  • Align backups with business and regulatory requirements: Ensure that your existing backup and restoration solutions meet the Recovery Time Objective (RTO) and Recovery Point Objective (RPO).

  • Secure backup copies: Store backups safely in a secured, climate-controlled environment and comply with retention period guidelines.

  • Encrypt backup data: Protect sensitive information by encrypting all backup data with strong encryption.

  • Verify recoverability: Regularly test backup data to confirm that the recovery process is error-free.

  • Differentiate between data backup and retention: Understand that these are distinct processes requiring tailored solutions.

  • Maintain detailed documentation: Keep comprehensive records of backup policies and storage media.

  • Account for proprietary formats: If backups are stored in a proprietary format, ensure you retain the tools needed to restore the data in the future.

  • Adopt the 3-2-1 backup rule:

    • Retain three copies of data: the original and at least two backups.

    • Use two different storage types, such as internal drives, external drives, tapes, or cloud storage.

    • Store at least one backup in a separate physical location from the primary data.

By adhering to these practices, organizations can enhance their data backup strategies and ensure resilience against potential risks.”


Tim Roddy – VP of Product Advocacy at Zimperium

“As organizations and individuals recognize World Backup Day, it’s critical to acknowledge that traditional backup strategies alone are not enough. Cybercriminals now take on a mobile-first attack strategy, targeting mobile devices with sophisticated threats, including mobile malware, phishing attacks, and zero-day exploits—putting sensitive data at risk before it can even be backed up.

To ensure data integrity, businesses must implement a proactive mobile security strategy that protects data at the source—on the devices and applications where it resides. AI-driven mobile threat defense, like Zimperium’s, helps detect and mitigate threats in real time, preventing attackers from accessing or corrupting critical business and personal data. On this World Backup Day, organizations should go beyond backups and reinforce their security posture with comprehensive mobile protection, ensuring that backups remain uncompromised and data stays secure.”


Corey Nachreiner – CISO at WatchGuard Technologies

“In a digital environment where 80 percent of organizations are vulnerable to ransomware attacks, implementing regular data backups across your organization’s critical components is key to your cybersecurity strategy. Backups significantly reduce downtime and accelerate recovery following an attack on your data or any other data-damaging disaster that a business might face. This practice prevents organizations from the severe financial losses and reputational damage that often come with experiencing data loss.

Consistent backups support data protection and business security. They can also ensure companies comply with regulatory requirements, which require backups. Good backups guarantee a business can survive a data loss event, like ransomware, and continue making business decisions based on its data. As an aside, you should also encrypt your data too. Backups can prevent data loss or destruction by offering a recovery option in the event of ransomware or some natural disaster that ruins data, but it does nothing to hide your data from unauthorized thieves. Encrypting your data should also prevent outsiders from using it in the case of a data breach.

 However, you already know all that. The industry has talked about the importance of data backups for decades. So, while World Backup Day is an important reminder about backups, I suggest we change it to World Backup Testing Day. While many organizations implement regular systematic backups, many do not go back in time to test their work and make sure their backups actually recover properly when needed. A corrupted backup that isn’t discovered until you need it is as bad as no backup at all. I recommend you spend this World Backup Day making sure your backups restore and then continue backing up regularly.”


Bob Fine – Senior Analyst Relations Manager at Quantum

“Businesses rely so heavily on data now that it’s simply impossible to operate without it. And if you need data, you need to be able to store it securely. In a crisis – such as a cyberattack or a natural disaster – a backup of these data stores must be secure, safe, and recoverable to ensure that the IT teams can get the business back up and running as quickly as possible. The longer it takes to restore the backup, the greater the consequences, including both financial and reputational losses. 
“The best protection that businesses can give their backups is to keep at least two copies, one offline and the other offsite. By keeping one offline, an airgap is created between the backup and the rest of the IT environment. Should a business be the victim of a cyberattack, the threat physically cannot spread into the backup as there’s no connection to enable this daisy-chain effect. By keeping another copy offsite, businesses can prevent the backup suffering due to the same disaster (such as flooding or wildfires) as the main office.

“Linear Tape Open (LTO) tape storage is a tried and tested example of a reliable airgapped storage system. As it celebrates its 25th anniversary this year, LTO tape storage is as popular as ever, as businesses are increasingly reliant on their backups. With research finding that a company falls victim to a ransomware attack every 14 seconds, and the UN Framework Convention on Climate Change reporting that the number of disasters has increased by a factor of five over a 50-year period, ensuring that your company has the right backup measures in place is a fundamental requirement of a successful business in 2025.”


Carl D’Halluin – CTO at Datadobi

“This World Backup Day serves as a crucial reminder for organizations to prioritize data preservation and intelligent management. First, ensure you maintain a ‘golden copy’ of your data—an immutable, secure backup that protects against loss, corruption, or threats. Second, focus on understanding your data. In today’s digital landscape, every part of a business generates data, often managed in silos. You can’t protect what you don’t know exists. By implementing robust data management solutions, organizations can reduce risk and strengthen their operational resilience.”


Martin Kunze – Co-Founder and CMO at Cerabyte

“In a world where every digital moment carries weight, World Backup Day is more than a reminder to protect our files – it’s a call to safeguard the digital legacy that shapes our era and our society. True data preservation isn’t just about storage; it’s about ensuring that today’s knowledge, culture, and discoveries remain accessible for generations to come.
 Information is the spine of our society, and it is threatened more than ever. Preserving this legacy demands more than traditional backup methods. It requires a future-proof strategy that resists degradation, overcomes obsolescence, and guarantees permanent access. This isn’t just about saving data. It’s about securing digital immortality.”


Lance Ohara – Vice President of Endpoint Marketing at Seagate Technology

“Your devices hold irreplaceable photos and videos, creative work and passion projects, business information, and important financial and medical documents. Without a backup, you risk losing this crucial data.

World Backup Day is the perfect time to examine your data storage and make sure the information that matters to you is backed up. In preparation, I recommend the following strategies to help secure what matters most.

You’re storing so much more than just data. Your data includes precious photos and memories of your family vacations. For creative professionals and hobbyists, like photographers and musicians, their data includes years of creative work. For gamers, it’s hours of gameplay and entertainment. Imagine that data lost forever. To put the data volume into perspective, one Seagate LaCie Rugged solid-state drive (SSD) Pro5 4TB can store:

  • 400,000 of photos – that’s precious memories of families and friends you can’t get back once they’re gone or a significant portion of professional photographer’s portfolio
  • 800,000 of songs – that’s hours of creativity and inspiration from musicians, singers and songwriters
  • Over 83,000 30-second videos and over 13,000 3-minute videos – that’s hours and hours of recordings of your children’s ballet recitals and soccer games or the hard work influencers put into the content that connects them with their audiences
  • 400 saved video games – so gamers can play their favorite titles and save their progress

Follow the 3-2-1 rule for data storage: This means keeping three versions of your data in a few different places – the original and two copies on two different media, with one offsite. For consumers, this means the original data on your laptop, a backup to a storage device, and a cloud backup.

Backup your devices to safeguard your data: A lost or stolen device is a stressful ordeal, but a recent data backup gives you peace of mind that your most precious data isn’t lost forever. Backups also make it easier to transfer your data, streamlining the process of setting up a new device with the information and settings you need. External data storage also gives users the option to free up space on devices to improve performance and speed.

Backups protect and speed your game play: Video games take up a lot of storage – an SSD backup is great for gamers who want to access their full gaming library quickly. And backups mean gamers don’t lose their hard-earned progress and achievements.

Data backups also protect against cybersecurity threats: Bad actors can take over a recent backup and encrypt your files, demanding ransom. If a backup system is not properly secured, they can gain access to it, essentially rendering your recovery option useless and forcing you to pay to decrypt your data. This is a tactic used to maximize pressure on victims to pay the ransom. If you have an immutable backup of your important information in your cloud service (like Seagate’s Lyve Cloud), you can still access your critical information without paying the bad actors.”


Jimmy Tam – CEO at Peer Software

“World Backup Day serves as a crucial reminder that data resilience isn’t just about having a copy of your data, it’s about ensuring business continuity with minimal disruption. Many organizations still rely on centralized storage models, but these systems pose risks. A single point of failure, slow recovery from outages, and the increasing complexity of modern data environments demand a re-evaluation of storage strategies. The rise of distributed storage models, which keep data where it is created and used most, provides an opportunity to enhance resilience. However, simply decentralizing data isn’t enough. Businesses must also adopt robust data orchestration strategies to ensure efficient access, security, and performance. As data volumes grow and compliance demands become more stringent, companies must rethink how they store, manage, and protect their critical assets to minimize downtime and financial loss.

By understanding data flows, leveraging AI-driven storage optimization, and ensuring strong security measures, organizations can build a storage infrastructure that withstands disruptions and safeguards business operations. This World Backup Day, organizations need to take the time to evaluate their storage strategy because the cost of downtime is too high to ignore.”


Molly Presley – SVP of Global Marketing at Hammerspace

“World Backup Day emphasizes the critical role of data in various aspects of our lives and underscores the importance of protecting and maintaining our valuable digital assets and information, a topic of significant relevance today. It reinforces the importance of automation in protecting and backing up data across a company’s global infrastructure is increasing with the rise of cyber-attack threats, data breaches, and unrelenting data growth, underscoring automation’s crucial role in data management and cybersecurity.

Managing vast unstructured data across diverse storage systems, multiple global locations, and cloud platforms requires considerable effort and resources. Relying on manual processes is increasingly time-consuming and risky, exposing critical data to human error and missed backups.

By implementing global-level data protection services, organizations will defend global datasets and maximize their value through automated policies. As organizations become increasingly driven by artificial intelligence, where data is essential to accurate analysis and drive informed decisions and innovative breakthroughs, automation is becoming indispensable.

Automated data protection policies bolster enforcement across distributed geographies, strengthening an organization’s data resiliency and business continuity. They also enable organizations to manage their global data environments and maintain the efficacy of their AI systems and data pipelines.

A streamlined, policy-driven data management approach can transform how organizations manage and protect data by distinguishing newly created data, ensuring global data protection across distributed locations, automating data copy creation controls and services, and enforcing compliance with corporate governance standards.”


Sterling Wilson – Field CTO at Object First

“Here we are, one of my favorite days, World Backup Day. For me, World Backup Day is not about remembering to back up your data. It’s a call to be proactive, to review your data resilience strategy and ensure your ability to protect your data against the ‘ever-evolving’ threats.

Where to start? The basics, of course. True data resilience begins with data you can trust. That starts with immutable storage. Immutable storage protects your data from ransomware’s encryption or deletion, among other things.

But that isn’t all. Certifying account separation between the backup application and the backup storage protects you from account compromise attacks. And of course, copies of your data in different resiliency zones/locations give you options should one path fail.

Ok, so data protection basics are covered, and your data is safe. What about bringing it back swiftly when the unthinkable happens? Exporting large amounts of critical business data and applications out of the cloud can take days, if not weeks, possibly bringing extra fees with it. Providing secure, on-prem storage as one of your resiliency zones lets you recover your data at the fastest speed possible no matter the status of your external connections. This is often overlooked as cloud adoption as grown but remains a key pillar in a successful resiliency plan.

So, on World Backup Day, let this be your reminder to be proactive. Make sure your data is truly protected and resilient by today’s standards. Starting with the basics, of course.”


Eric Schott – Chief Product Officer at Object First

“Each year, World Backup Day serves as a crucial reminder of the growing importance of data protection in an era where cyber threats like ransomware are increasingly sophisticated. With data breaches, cyberattacks and human error contributing to increased business outages, it’s essential to adopt a comprehensive backup strategy built on zero trust principles. By implementing zero trust, organizations ensure that no device, user, or system is trusted by default, minimizing the risk of ransomware and other threats from gaining access to critical data, while continuous, immutable backups serve as the last line of defense.

Today, organizations should prioritize modern backup solutions that go beyond traditional approaches, incorporating encrypted backups, version control, and real-time synchronization across cloud and on-premises environments. These strategies, combined with zero trust, prevent unauthorized access and data manipulation, ensuring that even if ransomware breaches a system, the most recent, uncorrupted backup remains secure and recoverable. By embracing zero trust and immutable backup technologies, organizations can quickly restore operations and ensure business continuity.”


​Frank DeBenedetto – GTM General Manager of Backup at Kaseya

“Cloud and virtual tech bring flexibility and efficiency gains for companies, but they also introduce security gaps that hackers exploit. Attackers have shifted focus to target backup systems first, leaving businesses more vulnerable in the digital era. The rush to adopt these technologies has outpaced security planning, often leaving organizations defenseless.

World Backup Day highlights an urgent truth: traditional backup methods fail in these modern environments. Businesses doing things right deploy specialized strategies that protect their assets independently from their main systems. Businesses who don’t follow this framework risk permanent data loss.”


Emilio Sepulveda – Information Security Manager at Deepwatch

“World Backup Day, observed on March 31st, acts as a crucial reminder that data loss is inevitable, encouraging us to take proactive steps to protect our information. In today’s digital landscape, businesses rely heavily on data, yet many organizations neglect backup strategies until disaster strikes. Whether due to a ransomware attack, accidental deletion, or hardware failure, waiting until an incident occurs can be expensive.

Ensuring an efficient backup strategy is not just a checkbox on the compliance checklist; it is a critical business necessity. The ability to recover data swiftly can mean the difference between a minor setback and significant operational downtime. Adhering to the 3-2-1 rule (three copies of data, two different storage types, one offsite) provides a strong foundation, but it is not enough. Businesses must also account for modern threats such as misconfigured backups, cloud storage failures, and insider threats, which can render backups useless when needed.

Beyond simply having a backup strategy, organizations must regularly test their business continuity and disaster recovery (BCDR) plans to ensure they function as intended. A backup that fails to restore is no better than having no backup at all. BCDR testing should be conducted at least annually, with more frequent assessments for critical data, to validate recovery timelines, verify data integrity, and identify overlooked vulnerabilities. This World Backup Day, take the time to review your backup and disaster recovery strategies.”


Heath Renfrow – Co-Founder at Fenix24

“World Backup Day serves as a timely reminder that backups are more than a best practice—they are a business imperative.

We’ve rebuilt hundreds of environments after ransomware attacks, and time and again, the difference between recovery and ruin comes down to one thing: backup resilience. Ransomware attacks are faster, smarter, and more destructive than ever. Traditional detection-and-response strategies alone aren’t enough.

To truly withstand today’s threat landscape, we advocate for our 5-4-3-2-1 backup methodology.

This strategy ensures data is not just duplicated, but hardened, diversified, and distributed in a way that aligns with today’s adversarial tactics. We’ve seen firsthand that even organizations with “immutable” backups are often vulnerable due to misconfigurations, exposed credentials, or lack of network segmentation. Backups must be redundant, isolated, and access-controlled. If threat actors can reach them, they will destroy them.

If your backups aren’t resilient, your business isn’t either. This World Backup Day, take a hard look at your strategy. It’s not just about checking a box, it’s about surviving the worst day your organization might face.”


Loren Johnson – Senior Director of Product Marketing at Aravo Solutions

“In the world of third-party risks, businesses that are deeply interconnected and interdependent will often share information that’s critical to optimizing their performance. It can mean they access the same systems, records, and processes, including customer records and other private data around which organizations often employ governance, policies, and access restrictions. That data can include information that is sensitive, proprietary, or otherwise ‘secret.’

As so many organizations face cybersecurity challenges that include attacks on data systems, defenses, integrity, and more than 35% of successful breaches are accomplished through third parties, it makes sense for businesses to collaborate with their third parties to protect, audit defenses, and back up their data on World Backup Day. Depending on the degree of interdependencies and data sensitivity, an organization may insist that their third-parties complete additional backups, conduct random system audits and stress testing to ensure that their data is protected.

Further, especially as some market analysts today suggest that “data is the new oil,” there are external pressures to ensure hypervigilance on data protection across the extended enterprise. Not only do regulators and enforcement agencies expect more data protection diligence and compliance, but the marketplace is consistently seeking additional transparency and accountability from the companies they do business with, especially when it comes to personally identifiable information. Companies that fail to back up their data and ensure its integrity risk losing data and suffering long-term damage to their reputations.”


Roger Williams – Community Manager at Kinsta

“The biggest mistake businesses make with website backups is assuming they’re covered without verifying. A backup is only as good as its restore process—if you can’t recover your site quickly, it’s not useful.

Website maintenance is often overlooked because it’s ‘out of sight, out of mind’—until something goes wrong. Many businesses see it as an IT task rather than a critical part of performance, security, and customer experience. The shift comes from recognizing that a well-maintained website means fewer disruptions, better SEO, and a stronger brand reputation.

Businesses should prioritize these key maintenance tasks:

  • Backups – Ensure you have recent, restorable backups in case of an emergency.
  • Security & Malware Scans – Check for vulnerabilities and take advantage of free malware cleanup if needed.
  • Performance Optimization – Use tools like Kinsta’s Application Performance Monitoring (APM) to identify slow-loading pages.
  • Update & Test – Keep WordPress, themes, and plugins updated, using a staging environment to test changes safely.
  • Fix Broken Links & Redirects – Use a search and replace tool for typos or rebrands and a redirect manager to fix 404 errors and improve SEO.”

Jim Liddle, Chief Innovation Officer Data and AI Strategy at Nasuni

“The inclination to delete historical data as a means of cutting costs or managing storage has been growing, particularly as data volumes surge with the rise of artificial intelligence. However, removing data can lead to unintended consequences, such as generating inaccurate results due to missing context, or introducing new compliance challenges. In fact, failing to follow proper data disposal procedures or timelines can result in fines, especially in industries like manufacturing and Architecture, Engineering, and Construction (AEC). 

Instead of treating data management as a binary decision between deletion and retention, organizations should explore intelligent strategies that preserve valuable data while controlling costs and minimizing unnecessary clutter. For instance, more refined methods like smart archiving or privacy-preserving techniques offer effective alternatives. Smart archiving moves data to more affordable storage tiers, allowing companies to retain high-value unstructured data while discarding redundant or low-importance information. Meanwhile, privacy-preserving methods—such as anonymization and pseudonymization—help maintain data usefulness while easing regulatory concerns. 

A successful strategy boils down to having a flexible infrastructure that supports dynamic data management. This enables organizations to preserve their data safely and efficiently, without resorting to deletion.


Simon Jelley – General Manager & Vice President, Data Protection at Arctera

“Amid the rapid acceleration of artificial intelligence (AI) use and development, the technology has emerged as a tool for enhanced data security, monitoring and productivity. Along with these incredible developments, though, comes new risks as the technology has dramatically increased an organization’s data loss risk and accelerated cybercriminals’ ability to disrupt networks.. Additionally, the ability to identify and exploit vulnerabilities using automated scanning and sophisticated phishing attacks introduces new challenges into an already complex and evolving cybersecurity landscape.

It’s more complicated—and more important—for organizations to be on top of today’s threat landscape, which changes constantly. While traditional threats like ransomware, data breaches, natural disasters and human error remain constant, the use of AI by bad actors has amplified not only the frequency of these attacks but their intensity, sophistication and potential damage as well.

World Backup Day 2025 provides a timely reminder that organizations cannot be complacent when it comes to security. Data protection is too complex today and data protection solutions are only built to empower data protection specialists. Instead, data protection should be accessible to all IT professionals – inclusive of those in new players in the IT field such as cloud and cyber security specialists.

Here are three key considerations when reviewing your data protection strategy on World Backup Day and every day:

  • Cloud data is not immune to loss. In the cloud, security is a shared responsibility. Gaps between the cloud service provider, an organization’s IT and end users can lead to network breaches if one of the parties assumes the others are handling certain responsibilities. Because the cloud allows multiple devices to access many different applications, each of which could serve as a back door into the network, it’s crucial to maintain a resilient security posture using an integrated ecosystem of data security, protection and governance to ensure comprehensive coverage.
  • Data is the lifeblood of every organization. Data fuels operational success and innovation. Protecting this asset from AI-enhanced threats is essential. Organizations must implement advanced data security measures to safeguard their intellectual property, customer information and overall business integrity. This is doubly important in highly regulated industries such as financial services, government and healthcare. Implementing advanced data protection and resilience strategies is table stakes to ensure data remains secure and resilient against evolving cyber threats.
  • Ransomware continues to be relevant, particularly to SMBs. Small and medium sized businesses (SMBs) can be easy marks for AI-powered attacks due to limited IT resources and the growing complexity of today’s networks. SMBs need resilience solutions that balance ease of use and cost-effectiveness with state-of-the-art backup and recovery capabilities that include proactive detection of threats and round-the-clock monitoring. Adopting these comprehensive measures, SMBs can reduce their vulnerability to ransomware and other cyber threats.”

Kyle Edsall – Technical Product Marketing Manager at CTERA

“Unlike other annual events that allow us to indulge in a pumpkin spice latte or receive chocolates from an admirer, World Backup Day is a reminder for organizations and the technology professionals who work for them to reflect on the efficacy of their backup and recovery strategies.

There’s never a bad time for some self-evaluation. Sure, it may sound less exciting than searching for the hazelnut butter toffee in a box of mixed chocolates, but for nerds like me, the opportunity to reflect on my backup strategy is just as sweet.

5 Backup Must-Haves

Let’s make this easy!  Here are the 5 checkboxes that every backup solution should tick:

Immutable: This is just a fancy tech term for saying your snapshot data is locked down. There’s no chance of accidental or deliberate modifications to your snapshot backups. Your content stays safe and accessible, even if the worst happens and someone gains access to your system with stolen credentials.

Immediate:
 When you need your files back, don’t get caught waiting for a retrieval. Restoration should be instantaneous, full stop. The faster you get back to work, the better.

User Accessible: Users should be able to retrieve their own file versions without leaving Windows Explorer or having to install or learn a new tool. Plus, getting staff back to work faster by eliminating the wait for help-desk ticket response is an empowering win/win!

Continuous Automatic Backups: Forget complex data-backup schedules. Instead, just focus on retention. How long does your business need to keep snapshots and deleted data? Once you make that decision, go ahead and put your feet up because every time a user saves a file, boom, that’s another version secured. Job well done, IT!

Space-Saving: You might have 100+ versions of a file, but you shouldn’t need to store it 100 times. Block-level changes ensure only the modified part is saved or updated since the last snapshotted version. Adding deduplication and compression and you’ve got yourself some ridiculously efficient snapshot retention!

What do all the above elements have in common?

Cost Savings

Needing less storage space for backups means fewer storage requirements, which translates into lower costs.   Plus, when backup is integrated into the file system itself, there’s no separate systems to maintain and pay for. And don’t forget that the previously mentioned user-accessible snapshots have reduced help desk overhead.  So, tuck a few of those bills back into your wallet.

Lastly, continuous backups provide you with more recent versions to restore, which means less lost work, and since the restore is immediate, you’re back to work faster than you can say “oops!

The Bottom Line of Backups

Just like the (now half-eaten) box of chocolates, you never know what you’re going to get when a data threat strikes. Backups are the foundation of your data protection strategy. Why not make them as effortless as they are resilient?  Nothing is more valuable than peace of mind, and from experience, nothing is more satisfying that executing a well-built plan.”


Ilia Sotnikov – VP of User Experience at Netwrix Corporation

“For me, World Backup Day is an opportunity to remember that backups are not just a goal in and of themselves—they are a cornerstone of business continuity. Yet, they don’t stand alone. Integrating other security measures ensures your organization’s backups are both robust and effective. Here are just a couple examples:

  • Data Discovery and Classification: Aligning backups with recovery objectives is crucial. By identifying and classifying your organization’s most valuable data, you can distinguish critical system components from less important ones, crafting tailored backup and recovery strategies. This approach not only saves time and money but ensures that restoring crucial systems is prioritized over less urgent data, minimizing downtime.
  • Change Auditing and Activity Monitoring: Prioritizing recovery efforts post-incident can make a huge difference. While restoring extensive data can span from hours to weeks, a focused strategy accelerates the getting the essential operations up and running. Understanding which data has been affected allows security teams to react swiftly. Utilizing change tracking and system auditing solutions helps identify undesirable changes, enabling recovery tools to efficiently roll them back.

In today’s SaaS-driven world, segments of your systems are backed up by cloud service providers. When you are working on the recovery or business continuity strategy, it’s essential to outline responsibilities within the incident response plan. Ensure clarity on which tasks fall to internal teams, and which are handled by providers. While most cloud services guarantee platform and data availability, they might not offer granular rollback or restore options.

Lastly, in the realm of security, securing backups is as critical as protecting the original data. There is no shortage of instances of threat actors ‘poisoning’ backups—either to prolong recovery times or to maintain a foothold in the environment.”


James Van Patten – Director, Memory and Storage Product Line Management at Micron Technology

“Data loss can strike at any moment, catching both consumers and businesses off guard. It’s crucial to take proactive steps to back up your data and avoid the chaos that comes with losing important information. World Backup Day is a perfect reminder to protect our digital memories and prioritize data safety. Invest in reliable backup solutions like cloud storage, internal drives, or external drives to keep your data secure and easily accessible.”


Rekha Shenoy – CEO at BackBox

“Happy to be here as a new member, especially on World Backup Day! It’s interesting to reflect on how much the IT security landscape has changed since World Backup Day started in 2011. What initially focused on protecting against hardware failures and basic data loss has become a much more complex fight against increasingly sophisticated cyber threats.

The Escalating Threat Landscape

Think back to 2011 – the threats we faced then seem almost rudimentary compared to today’s reality. We’ve moved from relatively simple attacks to intricate, multi-stage campaigns. Ransomware, which used to be primarily about encryption, now commonly involves “double extortion” tactics, where attackers threaten to leak data publicly in addition to encrypting it. And let’s not forget the rise of state-sponsored attacks and cyber warfare, which are now targeting critical infrastructure.

Expanding Attack Surfaces

The explosion of mobile devices and widespread cloud adoption has significantly widened our attack surface. Securing remote workforces and data residing in the cloud presents a whole new set of challenges. The sheer volume of data we’re dealing with only amplifies these concerns, requiring more robust data protection and backup strategies, especially when you factor in stringent regulations like GDPR.

The Double-Edged Sword of Technology

While advancements like AI and automation offer us enhanced security capabilities through anomaly detection and automated responses, they also empower attackers. We’re seeing more sophisticated malware and phishing techniques leveraging these same technologies. The sheer volume of security alerts we face necessitates automation, but this also introduces the risk of automated attacks slipping through the cracks. Similarly, the growing Internet of Things (IoT) and increased interconnectedness of our systems create new vulnerabilities and make lateral movement within networks easier for attackers.

The Evolving Role of Backup and Beyond

World Backup Day’s initial emphasis on protecting against hardware-related data loss has fundamentally shifted. Backup is now a crucial line of defense against ransomware, and that demands immutable backups to prevent attackers from encrypting or deleting them. This shift reflects a broader evolution from a primarily perimeter-focused security model to a more holistic approach that prioritizes data protection, threat intelligence, and overall resilience.

Cyber Resilience in 2025 and Beyond

Today, achieving true cyber resilience goes way beyond just having backups. Our network security teams need to be proactive in assessing risk. This includes things like sensitive data scanning and categorization, risk recommendations, and implementing remediation strategies. We need tools that can detect cyber deception tactics, provide early warnings of potential breaches, and facilitate comprehensive incident response planning, including recovery point validation and regular cyber recovery testing. When an incident does occur, the recovery process must include thorough forensic analysis, the ability to restore from known clean points and verify their integrity, and scalable recovery options.

The modern IT security landscape demands a multi-layered and proactive approach. While robust backup remains a critical component, it’s now just one piece of a larger cyber resilience strategy. What are your thoughts on the biggest challenges and best practices for building cyber resilience in today’s environment? “

The post World Backup Day Quotes from Experts for 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
Why Cybercriminals Are Targeting Your Backups and How to Be Prepared https://solutionsreview.com/backup-disaster-recovery/why-cybercriminals-are-targeting-your-backups-and-how-to-be-prepared/ Fri, 28 Feb 2025 20:19:08 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=7022 n2ws’s Sebastian Straub offers insights on why cybercriminals  are targeting backups and how to be prepared. This article originally appeared on Solutions Review’s Insight Jam, an enterprise IT community enabling the human conversation on AI. Most organizations believe they’re prepared for ransomware attacks with a simple strategy: maintain good backups and use them to restore […]

The post Why Cybercriminals Are Targeting Your Backups and How to Be Prepared appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

n2ws’s Sebastian Straub offers insights on why cybercriminals  are targeting backups and how to be prepared. This article originally appeared on Solutions Review’s Insight Jam, an enterprise IT community enabling the human conversation on AI.

Most organizations believe they’re prepared for ransomware attacks with a simple strategy: maintain good backups and use them to restore systems if cybercriminals encrypt their data. However, there’s a dangerous flaw in this approach that many overlook – attackers are increasingly targeting backup systems themselves, leaving organizations with no path to recovery.

This trend is becoming alarmingly common. Recent research from IDC reveals that in 2023, more than half of all ransomware attacks included attempts to compromise backup systems. Even more concerning, these attempts succeeded 60 percent of the time.

Understanding the Evolution of Ransomware Attacks

Traditional ransomware attacks focused on encrypting active production data – the information businesses use daily in their operations or, “live data”, such as customer databases, financial records, and email systems. When this data becomes encrypted, operations grind to a halt, pressuring organizations to pay the ransom to regain access.

However, companies began to make their backup strategies even more robust and have long served as an effective countermeasure. With recent, accessible backups, organizations could restore their systems without paying the ransom. However, this led cybercriminals to adapt their tactics. They began orchestrating long-term infiltrations specifically designed to compromise both production systems and backup infrastructure simultaneously. Their new objective became clear: render an organization’s entire safety net useless, leaving them with no choice but to pay the ransom or face catastrophic data loss.

Common Attack Methods on Backup Systems

Before launching their attacks, malicious actors are certainly smart about it. They often employ a “low and slow” approach, choosing to remain undetected within a company’s networks for weeks or even months. This gives them time to map out the entire backup infrastructure, including scheduled backup times, retention policies, storage locations, and access patterns. They can potentially see which administrators have access to which systems, monitor backup software configurations, and identify potential vulnerabilities in the backup chain.

This patient approach allows attackers to develop highly targeted strategies that can simultaneously compromise both production data and backup systems when they finally strike, maximizing the impact of their attack and the likelihood of ransom payment.

Cybercriminals employ various sophisticated techniques to initially compromise systems:

  1. Administrative Credential Theft: Using stolen login information from IT staff to access and delete backups
  2. Deceptive Social Engineering: Manipulating employees through sophisticated phishing schemes to compromise backup systems
  3. Backup Software Vulnerabilities: Exploiting security weaknesses in backup tools
  4. Storage System Breaches: Targeting the infrastructure where backups reside

Keep in mind that attackers don’t need to destroy all backup data to succeed. Even partial corruption can force organizations to pay the ransom, especially when facing pressure to restore operations quickly.

Assessing Your Backup Vulnerability

Several key factors influence how susceptible your backups are to attack:

  • The physical and logical separation between your production and backup environments.
  • How easy it is to identify your backup storage locations.
  • The effectiveness of your employee training against social engineering.
  • How often patch updates are implemented and security holes are scanned.
  • The implementation of advanced authentication methods like Multi-Factor Authentication (MFA) and the Principle of Least Privilege (POLP) on backup systems.

And perhaps most importantly…

  • How robust your backup and disaster recovery strategy is and whether your Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are optimized to minimize downtime and data loss.

Why Traditional Security Isn’t Enough

There is no doubt IT teams are working tirelessly – without a coffee break and even over the weekend to update their systems and run threat detection software. But modern cybercriminals have demonstrated their ability to bypass even the most advanced security measures. The question isn’t just about preventing attacks – it’s about maintaining operational continuity when they occur. This requires a shift in thinking: from prevention-only to prevention-plus-recovery.

7 Critical Components of a Resilient Backup Strategy

Attackers have realized that compromising both production and backup data creates maximum leverage. When organizations lose access to both their current data and their backups, they face an impossible choice: pay the ransom or lose everything.

To maintain a business continuity plan that goes beyond layered threat detection, here are seven strategies your IT team can implement immediately to ensure you have a healthy, immediate failover once a malicious infiltration has occurred.

1. Automated Recovery Testing

Gone are the days of manual backup testing. All businesses must have automated recovery drills integrated into their regular operations. These tests should verify not just data integrity, but the complete restoration of network configurations and system settings. Each test generates detailed audit trails, providing both compliance documentation and security validation. This automated approach not only ensures consistent testing procedures, it reduces the risk of human error and saves an enormous amount of time for backup IT admins.

2. Strategic Air-Gapping

Air-gapping has evolved beyond simple offline storage solutions. Businesses on the cloud need modern air-gapping solutions enable rapid restoration capabilities while maintaining critical data isolation. That means if you are only one cloud provider, implementing systems that can fail over immediately from any region or account. If you run a Multicloud environment, companies are beginning to ensure backup data remains completely segregated from production environments using cross-cloud air-gapping. Which brings us to…

3. Multi-Cloud Architecture

A distributed backup ecosystem provides essential protection against both targeted attacks and systemic failures. Businesses should spread their backup infrastructure across multiple cloud providers, using distinct authentication systems and separate environmental controls. This approach ensures that a compromise in one environment doesn’t cascade into others, while maintaining rapid recovery capabilities from any location.

4. Advanced Encryption Protocols

Modern backup encryption must protect data at multiple levels. This means securing not just the backup content itself, but also implementing sophisticated key management systems kept entirely separate from the backup infrastructure. Advanced encryption protocols prevent unauthorized users from even identifying backup locations, adding an essential layer of security through obscurity while maintaining full recoverability for authorized users.

5. Immutable Storage Implementation

Creating truly unchangeable backups requires more than just write protection. Modern immutable storage systems combine write-once-read-many technologies with sophisticated retention policies and integrity guarantees. This ensures that backup data remains pristine regardless of potential security breaches or accidental modifications. The system must maintain backup integrity while still enabling rapid recovery when needed.

6. Enhanced Access Controls

Access management for backup systems requires sophisticated role-based controls integrated with multi-factor authentication. Businesses must implement separate credential systems for backup access, maintaining detailed audit trails of all interactions with backup systems. This creates a secure environment where backup integrity is maintained without compromising recovery capabilities.

7. Cost-Effective Data Lifecycle Strategies

Rather than simply creating multiple copies of data, businesses need to implement intelligent redundancy strategies. This means developing sophisticated tiering systems that automatically store data based on age, importance, and recovery requirements. However, many companies shy away from this due to storage cost concerns.

Backup costs can be greatly optimized while maintaining security through intelligent data management. Modern solutions automatically transition incremental backups to lower-cost storage tiers while keeping them readily accessible. By only keeping the change in your last backup and utilizing a smart archiving approach, companies can significantly reduce storage costs without compromising security or recovery capabilities.

(Tip. most cloud providers store full backups and lack optimal tiering, leading to unnecessarily high expenses).

Looking Ahead: The Role of Automation

As cyber threats continue to evolve, companies in every sector must maintain backup strategies that are both robust and adaptable. The focus should be on creating systems that not only protect data but ensure business continuity under any circumstances. Because the ability to recover quickly and completely isn’t just about security – it’s about maintaining the trust that forms the foundation of your customer relationships.

Automation has transformed backup management from a manual process into a sophisticated, self-managing system. Modern tools handle everything from routine backups to complex multi-cloud management, reducing human error and empowering backup IT admins. Companies and IT teams that embrace these advanced approaches and tools will be best positioned to maintain operations regardless of the challenges they face.

Sebastian is the Principal Solutions Architect at N2W bringing in more than 2 decades of experience in enterprise technology, data protection and cybersecurity. With previous critical roles at Dell, Oracle, the FBI and the Department of Defense, he has established himself as a leading expert in enterprise security, backup & DR and identity management solutions. He has helped hundreds of clients simplify and bulletproof their data protection processes by helping them implement strategies that are not only robust and resilient, but also cost-effective.

The post Why Cybercriminals Are Targeting Your Backups and How to Be Prepared appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
Data Privacy Week 2025: Insights from Over 60 Industry Experts https://solutionsreview.com/backup-disaster-recovery/data-privacy-week-2025-insights-from-over-60-industry-experts/ Thu, 30 Jan 2025 16:41:12 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=6987 Solutions Review’s Tim King curated this guide to 2025 Data Privacy Week insights, featuring a selection of commentary from industry leaders. In honor of Data Privacy Week 2025, January 27-31, we’ve curated the definitive thought leader guide, drawing on the collective expertise of over 50 industry leaders and privacy professionals. This curation brings together in-depth […]

The post Data Privacy Week 2025: Insights from Over 60 Industry Experts appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

Solutions Review’s Tim King curated this guide to 2025 Data Privacy Week insights, featuring a selection of commentary from industry leaders.

In honor of Data Privacy Week 2025, January 27-31, we’ve curated the definitive thought leader guide, drawing on the collective expertise of over 50 industry leaders and privacy professionals. This curation brings together in-depth insights and commentary from some of the most respected voices in data privacy, offering a comprehensive view of the current landscape and the evolving challenges facing businesses, regulators, and individuals alike.

As privacy concerns continue to grow (see DeepSeek), navigating the complexities of data protection has become more critical than ever. From emerging technologies like AI and blockchain to shifting regulatory frameworks and the increasing threat of cyberattacks, privacy is at the forefront of conversations across industries.

Through this guide, we aim to provide practical strategies, actionable advice, and forward-looking perspectives to help you not only stay compliant but also build trust with your customers, safeguard sensitive information, and foster a culture of privacy within your organization.

Whether you’re looking to deepen your understanding of data privacy laws, enhance your organization’s privacy policies, or simply stay ahead of industry trends, this collection of expert insights is your go-to resource for navigating the constantly evolving world of data privacy.

Data Privacy Week 2025 Insights


Jamie Moles, ExtraHop

“Data Privacy Week highlights the importance of data protection amid today’s evolving threat landscape. As we saw in 2024, high-profile data breaches reached record highs, costing organizations millions of dollars. This is our new reality, and large-scale attacks that compromise sensitive data will continue this year across all industries, considering rising geopolitical conflicts and cybercrime groups’ more advanced strategies.

Recent research from ExtraHop found that bad security hygiene and improper training, enabling attackers to steal and use credentials to enter an organization’s network, was a common point of entry for security breaches – with long-term costs averaging $677 million. Improving security hygiene to prevent these breaches is essential, and Data Privacy Week is the perfect reminder for companies to equip their employees with the knowledge to keep sensitive data secure and uphold privacy standards.

One critical investment is prioritizing cyber training for all employees. Everyone should be aware of the latest risks – such as social engineering and phishing attempts – and be required to follow basic security hygiene protocols like using unique complex passwords, activating multifactor authentication, remaining wary of suspicious emails or texts, and enabling regular software updates. Following these steps, in tandem with investments in cyber resilience, can protect organizations from a costly security incident.”


Gary Orenstein, Bitwarden 

“Protecting privacy starts with being proactive. For businesses, integrating privacy at the core of operations—whether at the organizational level or for individual employees—is crucial for establishing a robust security foundation in an increasingly complex digital landscape.

This approach isn’t just about compliance; it’s about empowering teams with the tools and knowledge needed to protect sensitive data, quickly address potential security concerns, and cultivate strong security practices across the board. One of the most effective first steps in this journey is the adoption of password managers. These tools help reinforce better security habits, ensuring that employees use strong, unique passwords across various accounts, which significantly reduces the risks tied to weak or reused credentials.

However, security and privacy require more than just password management. A multi-layered strategy—incorporating additional tools like privacy-centric browsers, email alias providers, and VPNs—further enhances protection and minimizes the likelihood of data misuse or breaches. Some of the most recommended this year have been Brave and Firefox browsers, DuckDuckGo for search, and Signal for messaging.

In a continuously evolving cybersecurity landscape shaped by advancements in AI and emerging regulatory shifts, it’s critical for businesses to stay ahead of these changes to protect organizational and personal data. Staying informed and proactive will help businesses secure their digital assets, build trust with customers, and minimize the risks to their operations.”


Chris Gibson, FIRST

Data privacy challenges & AI

“AI will undoubtedly dominate data privacy conversations in 2025, but it’s a double-edged sword. On one side, AI empowers defenders with real-time threat detection, predictive modeling, and automated responses through tools like SOAR (Security Orchestration, Automation, and Response). These capabilities can cut detection times from hours to minutes, making a significant difference in preventing breaches that threaten sensitive personal data.

However, understanding and anticipating the flip side is just as critical. Bad actors are using AI to automate sophisticated phishing campaigns, identify vulnerabilities faster, and evade detection with AI-designed malware. This means organizations must adopt AI-based threat detection tools to counter these evolving tactics and protect the personal information they manage. Success in 2025 will come to those who balance AI’s potential with the vigilance to address its risks, all while keeping data privacy at the forefront.”


Rob Truesdell, Pangea

Systemic data exposure

“In 2025, we’re seeing a concerning trend where sensitive data exposure through AI isn’t primarily coming from sophisticated attacks – it’s happening through basic oversights in authorization and data access controls. Organizations are discovering that their AI systems are inadvertently sharing confidential information simply because they haven’t defined who should have access to what.”


Shrav Mehta, Secureframe

Only store the data you need

“Data minimization is fundamental to effective risk reduction. Organizations must develop a clear prioritization strategy—identifying their most critical assets and building targeted security measures around them. While organizations should aim for comprehensive security across all systems, strategic prioritization ensures critical assets receive appropriate protection. The most effective approach often starts with a simple principle: if you don’t need to store certain data, don’t collect it in the first place.”


Greg Clark, OpenText Cybersecurity

“From the U.S. government’s robust new cybersecurity executive order (which could or could not be implemented with a new administration) to HIPAA, GDPR and AI privacy policies, organizations are navigating increasingly stringent and complex rules that span industries and borders. These challenges can strain resources and create operational risks.
This Data Privacy Week underscores the urgency of embracing an organization-wide privacy-first approach to shift away from complexity, ensure compliance and protect data from persistent cyberattacks.
  • What all organizations can do: Adopt clear, company-wide policies that ensure the secure use and handling of information. This is crucial with the rapid adoption of GenAI tools. A recent OpenText survey found only 27 percent of employed respondents use privacy tools and settings to protect workplace information when using GenAI.
  • What data privacy and security teams should do: At a practitioner level, simplifying security stacks can help protect information by reducing fragmentation, improving cross-team communication, leveraging contextually relevant threat insights, and increasing transparency within data and other business systems. It also allows them to unify threat detection and response, data discovery and protection, modernizing data privacy and strengthening privacy and security postures.
  • What employees should do: Individual employees play a critical role in protecting data. Phishing scams and insider threats are only getting more sophisticated. Whether a large enterprise or a small business, education and awareness across all departments need to be layered on top of AI-powered technologies that detect threats.
A privacy-first approach doesn’t have to slow innovation. By streamlining security stacks and policies, organizations can move beyond complexity to unlock more efficient, integrated workflows.”

Gary Barlet, Illumio 

“January 28 is Data Privacy Day. And it’s come at an appropriate time. Just weeks ago, the U.S. Treasury revealed a breach that exposed sensitive personal data, including 3,000 unclassified files. A new year with the same old story of massive data breaches and leaked personal information. Yet organizations and agencies are taking the same security measures year after year. We need to fundamentally rethink how we protect the data that powers our lives, starting with Zero Trust as the foundation. And if there’s one thing this year’s Data Privacy Day reminds us, it’s this: it’s time to stop talking about securing data and start actually doing it.”


David McInerney, Syrenis

“AI is reshaping the world as we know it, and global enterprises are pouring money into its development. But as AI becomes ubiquitous, so too do the growing concerns about its impact on data privacy. As a result, we’ll see an explosion of AI regulation in 2025 – and businesses must be ready to act fast.

For many it’ll be an uphill battle because simply complying with new regulations won’t cut it. In fact, with 64 percent of consumers feeling their country’s privacy regulations don’t do enough to protect them, it’s the bare minimum. To truly gain consumer trust, companies must embrace transparency, consent, and preference management. AI is here to stay, but if consumers feel their right to privacy is being abused, they won’t hesitate to walk away.”


Nicky Watson, Syrenis

“After a year of data privacy scandals dominating headlines, it’s become clear that data breaches and misuse are wearing down consumers’ trust in businesses. Heading into 2025, companies aren’t just under the microscope of the government, they’re facing growing demands from the public for straightforward, ethical data practices. They can’t treat data privacy like a box to check when it’s become such a public priority. And the AI boom hasn’t helped any of this consumer skepticism, with 78 percent of Americans finding AI data-sharing policies confusing.

The message is loud and clear: consumers demand transparency and control over their data. The companies that heed the call are poised to succeed and thrive, building direct relationships. Those that don’t are risking the customer’s trust – not to mention their reputation.”


Greg Ives, Nutrient

“Document data privacy is becoming an increasingly critical issue, particularly in highly regulated industries such as finance, healthcare, legal and government, where the proper handling of sensitive information is paramount. Emerging AI technologies are transforming how we manage sensitive data in documents. AI-driven tools, leveraging natural language processing (NLP) and large language models (LLMs), can enable efficient redaction and anonymization of sensitive information such as personally identifiable information (PII), financial data, and healthcare records within documents. These tools automate the redaction process, minimizing human error and speeding up document preparation for secure sharing or archiving, while ensuring compliance with regulations like GDPR, HIPAA, and CCPA.

Beyond redaction, AI can support pseudonymization, generalization, and data masking, converting sensitive data into formats that maintain utility while protecting privacy. Continuous improvements in LLMs allow these systems to adapt to emerging patterns and threats, ensuring data integrity and privacy. By harnessing AI, organizations can manage their document data securely and responsibly.”


Darren Guccione, Keeper Security

“Global cyber threats are growing more prevalent and sophisticated every day. As we prepare to mark Data Privacy Day, there’s no better time to reflect on the pivotal role of zero-knowledge encryption in protecting your business against cyber threats.

Zero-knowledge encryption is as secure as it gets. It ensures that only the user has access to their data – period. With true zero-knowledge encryption, your information is encrypted and decrypted directly on your device, meaning the service provider doesn’t hold the keys, even for recovery or troubleshooting. This level of control goes beyond what traditional security tools, or even “almost” zero-knowledge solutions, can offer. “Almost” solutions still leave potential vulnerabilities, with access points or backdoors that undermine your security. With zero-knowledge, there are no loopholes – just absolute confidentiality.

As businesses, we hold a responsibility to protect client data, intellectual property and everything in between. Zero-knowledge encryption plays a pivotal role in fulfilling that duty. When your data is protected at every stage – whether in storage, transit or in use – you’re reducing the risk of exposure from every angle. True zero-knowledge encryption is a crucial step for businesses in building a comprehensive security strategy. As cyber threats grow in frequency and complexity, taking decisive action to protect your data is essential to staying ahead of bad actors.”


Devin Ertel, Menlo Security

“The growing use of SaaS and AI has shattered the illusion of a centralized, easily managed data repository. Gone are the days when we have our data in one place and can wrap our arms around it. Our sensitive information is scattered across countless platforms and products, making tracking its flow and ensuring its protection incredibly challenging. Furthermore, the sheer volume and variety of data we generate and store today eclipses anything we’ve seen before. Where once a single business unit might have been responsible for a dataset, now multiple departments access and utilize the same information, creating a complex web of permissions and potential vulnerabilities. Understanding who should have access to what and how they should be using it is more complicated than ever.”


Eric Schwake, Salt Security

“Data Privacy Week serves as an important reminder of the need to protect sensitive information in our connected world. As businesses rely more on data for innovation and enhanced customer interactions, safeguarding this vital resource becomes essential. This effort involves not just following data privacy laws but also putting effective security protocols in place to prevent unauthorized access and data breaches.

API security is closely tied to data privacy. APIs, which facilitate data transfer in modern applications, are key to ensuring that sensitive data is managed securely and ethically. Organizations should embrace a thorough strategy for API security, which includes API discovery, posture governace, and runtime threat protection, to reduce the chances of data breaches and uphold privacy compliance. By focusing on API security, companies can show their dedication to data privacy and foster trust with customers and partners.”


Philip George, Infosec Global Federal

“This year, Data Privacy Week falls on the heels of Biden’s Executive Order on cybersecurity, reminding us that post quantum cryptography (PQC) and data privacy should remain at the forefront of every organization’s list of priorities.

With recent supply chain attacks targeting trusted vendors and their government customers (see the US Treasury-Beyond trust breach), the integrity of our software supply-chain has once again been thrust into focus. This latest Executive Order will help to establish a common standard for submitting machine readable software attestations, support artifacts like software and cryptographic bill of materials, and ultimately, secure more data.

The order calls for a concerted effort to expand awareness around PQC-ready products by providing a list of product categories that support PQC. Subsequently, agencies will be required to include a requirement for products that support PQC preparedness and adoption in future solicitations. Lastly, agencies will be required to start adopting new PQC standards after identifying network security products and services that are actively employed within their systems. There will also be direct outreach from the U.S. government to its allies and partners to encourage similar action within their technology environments.

This does not only apply to government agencies. Private organizations that still have not completed their inventory and mapping of cryptographic dependencies must also do so quickly. This is important to understand which new standard will work best for their various assets and his inventory is critical to creating detailed migration plans that prioritize the most sensitive and critical assets, ensuring they are first in line for upgrades to PQC standards.

Data Privacy Week reminds us that government agencies and private organizations alike should not stay complacent. The “steal now, decrypt later” approach by adversaries remains true and quantum computing-based attacks will become a reality. Let this be yet another wake-up call to prepare your organization and conduct cryptographic inventory before it’s too late.”


Boris Cipot, Black Duck

“In a world of sophisticated cyber threats and rigorous regulations like GDPR and CCPA, it is important to highlight data privacy and the protection of sensitive information. As today’s trends lean toward remote work practices, cloud adoption and widespread webservice offers, we as users have the desire for transparency about data generation, storage, and its usage. On the other hand, businesses offering those services should feel the pressure to implement robust protection of this information.

Therefore, Data Privacy Week is not something that happens once a year and is over and forgotten about after five days, but should rather give us a starting point, a kickoff, to see what has happened in the past, what we can expect in the future and how we should act in order to avoid the bad and embrace the good in the field of data privacy.

The main security trends we see in the industry are:

  • Adaptation of Zero Trust Architecture, where organizations are following the “never trust, always verify” approach to protect data access.
  • Focus on Open-Source Security to secure the usage of OSS dependencies and comply with their licensing obligations.
  • Usage of Privacy-Enhancing Technologies (PETs) where organizations are using tools to mask, encrypt, and anonymize data to minimize risks without compromising usability.
  • Proactive Testing Across the SDLC to embed security and privacy checks into every stage of software development lifecycle to ensure compliance and minimize the likelihood of exploitable vulnerabilities.

Businesses have constant pressure to enhance their data privacy therefore it would be recommended that they conduct regular data audits to map out what data they collect, why, and where it’s stored, ensuring that unnecessary data is not retained. Another important topic is privacy awareness. Secure handling of data and recognizing threats is a must in employee training. As supporting mechanisms, businesses should consider automating their compliance violations and implement runtime protections, for example, Runtime Application Self-Protection (RASP) tools that can detect and mitigate attacks in real time.

When it comes to software development, businesses must also think about robust AppSec practices. Here the implementation of technologies like Static Application Security Testing (SAST) and Software Composition Analysis (SCA) is a must. SAST tools will help discover and mitigate vulnerabilities in your own code where SCA tools will help organizations to identify used open source in their development and mitigate its vulnerabilities and license compliance risks. Additionally, Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST) help organizations uncover vulnerabilities in code, configurations, and dangerous application behavior. Fuzzing techniques that simulate attacks can further help to uncover hidden flaws that traditional testing technologies may miss.

Organizations can adopt a holistic approach to data privacy and application security by integrating AppSec tools into their CI/CD pipelines and their Dev(Sec)Ops workflows.”


Stephen Kowski,  SlashNext

“Data Privacy Week reminds us that phishing attacks designed to steal personal information or credentials are no longer just an email problem. Attackers are finding new ways to compromise our data through QR codes, AI voice scams, and multi-channel attacks. We’re seeing a dramatic rise in QR code scams since late 2023, particularly targeting business leaders, while AI voice scams are increasingly targeting those over the age of 60. The most concerning trend in early 2025 is how sophisticated these attacks have become, with criminals using multiple channels simultaneously – as seen in recent cases where fraudsters combined email bombing with chat and voice phishing.

The key message for Data Privacy Week is simple: we need to expand our understanding of phishing, specifically how your data privacy can be compromised beyond just email-based attacks. Whether it’s scanning QR codes, answering phone calls, or responding to messages on various platforms, every form of digital communication needs the same level of scrutiny we’ve learned to apply to our emails. Staying informed about these emerging threats is our best defense in protecting our personal information.”


Brandon Williams, Fenix24

“In today’s hyper-connected world, data is the lifeblood of every business. We collect vast amounts of personal and sensitive information from our customers, employees, and partners, which helps fuel innovation, but it also presents significant risks. A single data breach can have devastating consequences, from financial losses and reputational damage to legal liabilities and even criminal charges.

As the leaders of our organizations, we have a duty to protect this valuable asset. This responsibility transcends mere compliance with regulations like GDPR or CCPA. It demands a proactive and comprehensive approach to security.

  • Shifting the Paradigm: We must move beyond simply reacting to threats. We need to adopt a “security-first” mindset, where data protection is embedded into every aspect of our business, from product development to customer service. This requires a fundamental shift in our thinking, prioritizing security by default and minimizing unnecessary data collection.
  • Investing in Robust Security: This includes implementing robust security controls, such as multi-factor authentication, encryption, and regular security assessments. We must also invest in our people, providing them with the training and resources they need to identify and respond to potential threats.
  • Building Trust: Transparency and trust are paramount. We must be transparent with our customers about how we collect, use, and protect their data. We must also actively engage with our customers and stakeholders on data privacy issues.

Data Privacy Week is not just a week of awareness; it’s a call to action. It’s an opportunity for us as business leaders to demonstrate our commitment to data security and build a more trustworthy and resilient digital future.

Key Considerations:

  • Go Beyond Compliance: While compliance is essential, it’s not enough. We must continuously evaluate and adapt our security measures to address the ever-evolving threat landscape.
  • Bolster your Backups: Despite common beliefs, 93 percent of attacks target backups, with 68% successfully destroying critical data. It’s crucial to invest in a resilient, continuously hardened backup solution that can scale with your growth before it’s too late.
  • Enhance Recovery and Resilience: Develop and implement a realistic recovery strategy to ensure quick restoration of operations and data integrity after an attack. Focus on building resilience to withstand and recover from disruptions effectively.
  • Invest in Cybersecurity Talent: Cultivate a strong security culture within your organizations and attract and retain top cybersecurity talent.

By prioritizing data privacy and security, we can build a more secure and trustworthy digital future for our customers, our employees, and our businesses.”


Agnidipta Sarkar, ColorTokens

“Data Privacy Week highlights the need for continuous improvement in our data protection strategies. Privacy laws across the world expect “reasonable security measures” to be implemented to ensure personal and sensitive data remains out of reach from hackers and the dark web. Over the years the industry has been investing in many tools, and yet breaches are not decreasing. It is time to think of foundational mechanisms like zero trust to ensure data protection. Dividing the digital environment into smaller, isolated micro-perimeters, each containing a specific group of resources, users, or applications, using software-defined policies or rules, limits the scope of a potential data breach. Staying breach-ready is crucial, as it not only helps in complying with data privacy regulations.”


Brian Reed, Proofpoint

“Data Privacy Week highlights a critical challenge: the AI data privacy paradox. While generative AI offers immense potential, it also introduces significant data loss risks. Inputting confidential information or Personally Identifiable Information (PII) into these systems is like handing attackers a loaded weapon, and businesses are understandably worried. Proofpoint’s 2024 Data Loss Landscape Report reveals that 40 percent of Australian CISOs identify GenAI tools as a top organizational risk, underscoring the need for robust data protection strategies.”

In order to protect themselves, organizations must take a human-centric approach to cybersecurity to defend their data. This approach brings together an understanding of data classification, user intent, and threat context and applies it consistently across all communications channels, including email, cloud, endpoint, web, and GenAI tools. This also means guiding employees with relevant, in-the-moment interventions and personalized learning paths based on an individual’s unique risk profile to cultivate a behavior change, where everyone understands the risks and plays a role in safeguarding the organization.”


Yoram Novick, Zadara 

“Data privacy and security are critical in today’s increasingly digital world. The rapid growth of cloud computing, with global spending forecasted to be well above $1 trillion, underscores the importance of protecting data within these systems. Organizations must prioritize robust security strategies to secure data storage and transfers, including selecting trusted hosting providers and implementing data protection and disaster recovery solutions. Moreover, sovereign AI should be evaluated to overcome the shortcomings of traditional public cloud offerings for AI use cases.
Data is one of the most valuable organizational assets, yet its protection remains insufficient in many cases. The significant negative impact of ransomware in the past year underscores the vital need for integrating cyber vaults and disaster recovery plans to all organizations. These measures ensure data integrity and minimize downtime during cyber attacks, particularly as ransomware threats continue to rise.
Zero trust models and smart security solutions are essential to counter advanced threats. Implementing multi-factor authentication (MFA) and identity-aware systems reduces vulnerabilities such as credential stuffing. These measures help organizations safeguard sensitive information while optimizing business operations.The role of AI in data privacy and data security introduces both opportunities and challenges.
While AI-driven tools simplify processes, they also heighten risks if improperly managed. Maintaining human oversight in AI implementations and adhering to basic security practices are crucial to mitigating threats. As organizations increasingly adopt cloud services for AI, addressing cloud-specific security concerns is critical. The use of advanced sovereign AI cloud solutions will significantly reduce the number of public cloud security incidents.
Data Privacy Day serves as a reminder that safeguarding sensitive data is a shared responsibility among businesses, governments, and individuals. By staying proactive, embracing compliant solutions, and prioritizing education, organizations can navigate the complexities of data privacy and security in an increasingly interconnected world where AI is playing an increasingly vital role.”

Michelle King, Index Engines

“Data Privacy Day is all about championing the protection of personal information and spreading the word on best practices in data security. By focusing on trusted data integrity, adopting a recovery-first mindset, and leveraging new technology including AI, we can truly support these goals. Prioritizing data recovery means we’re always prepared to resume operations after breaches with minimal data loss, and AI-driven security measures give us the edge in detecting and responding to the most sophisticated attacks. Together, these principles build trust and create a safer digital world for everyone.”

Jennifer Mahoney, Optiv

“Data Privacy Week is a great reminder that the onus for protecting customers’ personal data is on the companies that collect, use and share it. Companies have a responsibility to protect consumers, secure their data and do right by them morally, ethically and legally. Handling data privacy the right way drives consumer trust and builds long-lasting relationships.

Consumers are increasingly aware of the value of their data and are seeking ways to reduce their data footprints. They are exercising their data subject rights to opt out of certain data processing and are becoming more informed about the data companies collect and use.

The growing integration of AI-enabled solutions to collect and process data highlights the importance of maintaining safe data practices, responsible AI use and nurturing and growing positive consumer sentiment. Here are four areas companies can prioritize immediately to head down the right path:

  • Transparency: Maintain transparency around AI use, data collection, processing and sharing activities. Without transparency around the use of personal information, organizations run the risk of alienating their customers. Companies must also be transparent in their privacy notices and terms of conditions, writing them in a way that’s consumable and easy to understand.
  • Choice: Offer individuals choices about how their data is processed and used for marketing purposes. For example, enable them to opt out of sharing data with third parties, advanced advertising practices (i.e., geolocation or behavioral indicators) or processing of certain sensitive data. Increased choice not only helps companies address regulatory requirements but also allows customers to feel valued and respected.
  • Control: Offer control through a tailored experience that allows users to adjust their data-sharing preferences. For example, choosing which activities are connected to their account, purging information when possible and configuring settings that align with personal preferences or comfort levels. By retaining control of their data, consumers will feel more secure and comfortable when sharing personal information.
  • Education: Ensure your personnel can recognize what personal data is and the obligations they have when accessing or otherwise processing personal data. Likewise, help consumers become educated about the data you collect and process and how to exercise their rights around that data.

The strongest data privacy programs are founded on transparency, choice and control, and this should be companies’ focus this Data Privacy Week. Making this a priority keeps data secure, builds trust with customers and drives business outcomes.”


Rebecca Herold, IEEE

Practical steps consumers can take to protect their data

“When purchasing a product that includes digital capabilities:

  • Check to ensure the product you are considering has capabilities to determine, and provide you with choices for, where your data is stored, how is it shared, and the ways in which is it processed. If you don’t like the answers (e.g., your data is sent to marketers…often referenced as “trusted partners” in the privacy notice…or it is being used to train AI, etc.) then find out or ask the manufacturer or seller how you can opt-out of the actions that you do not want your data used for. If the manufacturer and/or vendor supporting the product indicates you do not have any choices or ways to do this, then don’t get the product. This is a red flag that your data is probably being used for many purposes, and shared with far more entities than you would ever want it to be shared. The more personal data is shared and used, the greater the risk that your data will be breached and compromised in other ways. And once you hand over your data to others, you’ve completely given up any control for how that data is being secured, shared, or used.
  • Check to see if the product has the strongest security and privacy protections enabled by default. It is common for digital products to market on their packaging and in ads that they have many different types of personal data protections. However, they often do not have them enabled. This results is consumers being misled, and just assuming that the products are secure out of the box. If they do not have these protections enables by default, then either don’t purchase the product, or if you really want it, make sure you know how what are the products privacy and security capabilities are, and enable them before you start using the product.

When using a computing device, or any type of digital-enabled product of any type:

  • Make sure you are using strong passwords/PINs/pass phrases/etc., and multi-factor authentication to access your data, such as on your device, in the portal where it is stored, accessed, etc.
  • Make sure the data is strongly secured when being collected, transmitted and stored. This would include being strongly encrypted, and using security tools to protect the data in transit. Never use unsecured public networks. If you use a VPN that helps quite a bit, but VPNs still have vulnerable areas that can be exploited.
Stay up-to-date on the latest privacy breaches and cybersecurity scams, attacks and other problems:
  • Enable automatic security and code updates for your product, directly from the manufacturer or a vendor they vouch for. New vulnerabilities are discovered almost every day in technologies, so applying those patches as soon as they are available will help to protect your data.
  • Never use public USB chargers without using a juice jack blocker type of device (they are very inexpensive), check for skimmers at gas pump payment panels, ATMs, etc., by seeing of any part of the device is loose or wiggles, or you see something odd, like a device pointing toward where payment cards go; someone may have installed a video to capture your card number and PIN. Don’t swipe or insert your payment card if you run across such situations.
  • Watch out for scams to take your data that have been around for decades.
  • Monitor the news for newly discovered privacy breaches, network and data attacks, why and how they occurred, and how to protect against them going forward.
The role of tools and technologies in enhancing data privacy

There are many different types of tools that can enhance data privacy that are very effective. They are also needed, because you can’t have privacy without the use of security technologies (along with physical and opterational/administrative protections) to support protecting privacy by protecting the access to, confidentiality, availability, and integrity of personal data, which is vital for ensuring privacy protections. It is very important to keep in mind, though, that these tools and technologies are not perfect. In fact, some are quite flawed.

For example, no AI tool used to support privacy and security are 100 percent accurate or effective. They are, at best, around 80 percent accurate and effective. Whatever types of tools and technologies are being used to enhance privacy, there still needs to be human validation of the outputs and results to ensure algorithms are not spitting out incorrect conclusions, alarms, etc.

Common misconceptions surrounding data privacy and tips to address them

There are many misconceptions about data privacy. One that I have heard throughout my entire career is that if there are no laws, regulations, or other legal requirements against using, collecting, selling, etc., personal data, then that means there are no associated privacy concerns or risks, and that it is okay to do so, often with impunity. This is not correct! It is also a dangerous belief for organizations to have if they are collecting and want to use personal data. Keep in mind that data protection, aka privacy, laws/etc., are generally reactionary. However, the misuse of personal data can have devastating consequences on the associated individuals.”


Kayne McGladrey, IEEE

Practical steps consumers can take to protect their data

“To protect their personal data, consumers can take several practical steps to remove their information from data broker websites and opt-out of marketing. First, they should identify where their data is held by searching major data broker sites, public records, and credit reports. Once identified, consumers can use the “Opt Out” or “Remove My Data” links provided on these websites to submit removal requests, ensuring they confirm their identity and track the progress.

Additionally, they should familiarize themselves with regulations like the California Consumer Privacy Act (CCPA), which allows them to request the deletion of their personal data and opt-out of its sale. Consumers can also use online tools and services designed to automate the opt-out process from marketing lists and data brokers.

The role of tools and technologies in enhancing data privacy

Tools like online services that automate opting out of marketing and removing consumer data from data broker websites play a crucial role in enhancing data privacy by streamlining managing personal information. These services automatically handle the often needlessly complex and time-consuming task of submitting removal requests to multiple data brokers, ensuring that consumers’ data is deleted or withheld from sale, reducing the risk of unauthorized access and misuse.

Additionally, browser extensions and apps that block trackers and enhance privacy further improve data protection by preventing the collection of browsing habits and personal information by third-party advertisers and websites. These tools work by blocking cookies, scripts, and other tracking technologies, limiting the amount of data that can be collected without the user’s consent.

Common misconceptions surrounding data privacy and tips to address them

Many consumers mistakenly believe that using a VPN magically provides complete anonymity and protection from all online threats. While VPNs encrypt internet traffic and mask IP addresses, they do not make users completely anonymous, especially when logging into social media and other websites that inherently track user activity through cookies and account logins.

VPNs primarily secure data in transit but do not protect against malware, phishing, or data breaches on the websites themselves. To improve data privacy, consumers should use privacy-focused browsers and extensions that block trackers, regularly clear their cookies and cache, and be cautious about the personal information shared on social media.”


Houbing Herbert Song, IEEE

Practical steps consumers can take to protect their data

“To protect data, best practices for consumers include multi-factor authentication, de-identification, and anonymization, among others.

The role of tools and technologies in enhancing data privacy

To enhance data privacy, tools and technologies are important but they alone are not enough. Data privacy is socio-technical in nature. Both technical and social factors impact data privacy.

Common misconceptions surrounding data privacy and tips to address them

One common misconception is that only sensitive data needs privacy protection. In fact cybercriminals are able to mine sensitive data from data seemingly insensitive. We should be cautious about data sharing. Another common misconception is that incognito mode makes us completely anonymous. In fact cybercriminals are able to steal users’ browsing history from internet service providers or websites visited. We have better use privacy-preserving search engines and browsers.”


Carl D’Halluin, Datadobi

“The number one data privacy best practice is simple: ensure the right data is in the right place at the right time. Throughout its lifecycle, data should be protected and only accessible as needed. While this is easier said than done, it’s imperative to implement the right strategies and technologies. Data is an organization’s most valuable asset and its greatest potential risk.

“Balancing these aspects is key. Effective data management optimizes business intelligence, enables smarter decision-making, and provides a competitive edge. It also ensures compliance with internal governance, legal mandates, external regulations, and financial goals.”


Joel Burleson-Davis, Imprivata

“In recent years, cyberattacks targeting critical US sectors, especially healthcare, have become more sophisticated and impactful. For instance, attacks on organizations like Change Healthcare and Ascension disrupted care delivery and cost millions. With these threats likely to persist, healthcare organizations must prepare. As mobile technology becomes central to healthcare, organizations must consider the impact on both data security and privacy

Mobile devices deliver significant benefits, such as better patient care and reduced staff burnout, but they also introduce new risks, particularly related to the loss or theft of devices. In healthcare, where each device can be an entry point to sensitive data, the consequences of a lost or stolen device are severe. Beyond just securing the devices, organizations need to implement stringent device management plans that include tracking, monitoring, and proper disposal of PHI when a device is not in active use. This ensures that devices are not only secure but also free of sensitive data when not in use, reducing privacy risks. Effective device management and access controls are critical to safeguarding PHI, improving visibility and control over devices, and ultimately enhancing both care quality and operational efficiency.”


Tina D’Agostin, Alcatraz AI

“This Data Privacy Day, we are seeing a significant focus on protecting Personally Identifiable Information (PII) as companies address the growing risks of data breaches. Many organizations are adopting privacy-preserving security measures, such as advanced access control systems, to prevent unauthorized access and ensure compliance with data protection standards.

This also aligns with safeguarding data and keeping it private, becoming mission critical within the priorities for the security industry, as business executives look to reevaluate and upgrade their security protocols to mitigate potential risks.

Industry research shows that 10 percent of data breaches are caused by physical security compromises and that the average cost of a data breach from a physical security penetration is nearly $5 million.

Augmenting cybersecurity with physical security and access control solutions is vital to ensure users’ PII is not being compromised. In turn, this will both save the enterprise from the hassle of a security breach, and keep user data protected from the perimeter to within the data center itself.

Companies–especially data centers–looking to have comprehensive data security posture should look to access control solutions purpose built for preserving privacy.

Businesses must move beyond outdated access control models and embrace a future where security is user-friendly and privacy-centric.”


Srujan Akula, The Modern Data Company

“Data privacy and governance have evolved from compliance checkboxes to AI fundamentals. The current challenge with data governance is fragmentation—privacy rules and protections often vanish during handoffs, especially with AI systems. Security platforms protect stored data but stop there, access controls only work within specific systems, and activation layers operate in isolation. These disconnected pieces can create major gaps when data moves between systems.

This fragmentation creates real problems for AI initiatives. Data scientists may train models using datasets without fully considering their privacy compliance or usage rights. Access levels become murky: what AI insights should an entry-level employee get vs a senior executive? Conversational interfaces need to handle these nuances while staying GDPR and CCPA compliant.

Treating data as a product changes this dynamic. By embedding privacy controls and governance from the start, you maintain visibility of lineage, permissions, and usage rights throughout the data’s journey. This context flows naturally into AI and analytics applications, ensuring compliance at every step–smart data that knows its own rules and boundaries, versus data that loses its identity every time it moves.

A data product approach accelerates AI innovation while maintaining trust. When context and governance are built in from the start, you unlock your data’s potential for AI without compromising privacy.”


Nick Mistry, Lineaje

“On Data Privacy Day, we are reminded that the integrity of our data depends on the strength and transparency of our software supply chains. With an increasing reliance on open-source components, especially for AI models and other critical systems, the risk of supply chain attacks continues to grow. Malicious or compromised code hidden within software dependencies can have far-reaching consequences, affecting not just the organizations that create them, but also the users and industries that depend on them. Alarmingly, 95 percent of all vulnerabilities come from open-source, and approximately 50 percent of open-source components are not maintained, leaving systems vulnerable to exploitation and creating significant risks to both security and privacy.

Organizations must prioritize monitoring and securing their software supply chains to mitigate risks effectively. Key strategies include:

  • Understanding what’s in your software including all dependencies and transitive dependencies.
  • Identifying vulnerabilities in open-source components, including those used in AI applications.
  • Implementing continuous monitoring of the software supply chain to proactively detect threats.
  • Detecting tampering and ensuring software integrity by verifying that all components remain unaltered and trustworthy throughout the supply chain.
  • Analyzing the origin and history of open-source dependencies to evaluate potential risks tied to their lineage and provenance.

Additionally, maintaining a comprehensive and up-to-date Software Bill of Materials (SBOM) is critical. A detailed SBOM provides full visibility into all components within the software, empowering organizations to verify software integrity and respond quickly in the event of a vulnerability or breach. By enabling swift identification and remediation of compromised or tampered components, organizations can minimize disruption and safeguard their systems effectively.

On Data Privacy Day and beyond, let’s commit to strengthening our security practices and building more resilient systems. A secure software supply chain is not just about protecting data, it is about safeguarding the integrity and trust of the digital world.”


Sascha Giese, SolarWinds

“‘I have nothing to hide,’ they say, and accept all kinds of intrusion into their digital life and beyond. Guess what? Even if there’s nothing to hide, privacy is a right we fought hard for, should insist on, and defend when required. No one needs to become paranoid, but we should pay attention to what information we provide voluntarily and if it’s really necessary to provide all the intel that some web portals ask for. Surely, you have heard ‘data is the new gold,’ too, so think of spending your personal information the same way you spend your money.”


Freddy Kuo, Luminys

“Data Privacy Day serves as an essential reminder of the importance of protecting both personal and organizational data. As we look toward 2025, AI’s impact on data privacy and security will continue to grow, transforming how we analyze data, detect threats, and safeguard information. Innovations like Video Surveillance as a Service (VSaaS) are leading the way, setting new standards for security and efficiency.

In the video security sector, AI-powered VSaaS solutions are driving transformative advancements. With self-learning capabilities and AI-integrated image signal processing (AI-ISP), these technologies adapt to evolving environments, providing businesses with more effective and efficient threat detection.

By embracing privacy-by-design principles and embedding them into every layer of product development, organizations can establish a stronger security posture. A resilient framework that prioritizes simplicity, control, and a commitment to safety empowers users to protect their data while fostering trust and confidence.

This Data Privacy Day, let us reaffirm our dedication to leveraging AI-driven advancements to safeguard data and privacy with greater precision, efficiency, and impact.”


Ratan Tipirneni, Tigera

“Data Privacy Awareness Week serves as a reminder that having robust Kubernetes security is paramount, especially as organizations increasingly deploy GenAI applications with Kubernetes. Building and deploying GenAI applications creates security risks when it comes to data privacy, integrity, and security. Built using sensitive data sources from inside an enterprise, once an organization deploys such applications, their attack surface increases greatly.

Let this Data Privacy Week be a wake-up call to organizations deploying GenAI applications on Kubernetes to make security a priority. To achieve comprehensive security for GenAI applications deployed on Kubernetes, organizations should prioritize: implementing network security access controls, adopting vulnerability management practices to proactively identify and address vulnerabilities, preventing and addressing misconfigurations, and maintaining observability.”


Sean Costigan, Red Sift

“Spectacular cyberattacks have shown that poor information security represents a critical vulnerability, harming reputations of people, governments, and businesses, and pushing many entities into insolvency. Among the most attractive targets for cybercriminals today is healthcare data, comprising one of the most sensitive, rich and interconnected sectors.

While enforcement of HIPAA has steadily risen, penalties for poor information security around PHI do not yet match impacts. In a long overdue shift, HIPAA regulations – which date from 1996 – have been proposed to expand to include more robust cybersecurity. As such, the proposed rules will aim to treat a variety of risks to PHI and healthcare operations through the adoption of controls such as enforcing MFA, encryption of data, and good cyber hygiene, among others. Recent research shows that an astonishing 80 percent of cyber-attacks against hospitals were identity based, social-engineering attacks. For cybercriminals seeking PHI and payouts, clearly phishing is their killer app.

While there is no national, federal, or comprehensive data privacy law in the US currently, the scope of the problem should be treated as a national crisis. As such, waiting for one regulation to rule them all isn’t a winning strategy: the financial impact, reputational harm and operational disruptions caused by recent privacy breaches should be sufficient to encourage organizations to adopt reasonable, proactive cybersecurity measures to protect us all.”


Paul Underwood, Neovera

“In today’s heightened cybersecurity landscape, threat actors are on the hunt for the most vulnerable, yet lucrative asset in organizations. Data – made up of customer information, financial records, and intellectual property – is an invaluable asset that has become the lifeblood of any organization and requires robust protection.

As data becomes increasingly targeted, one key concern has often been ignored: protecting your consumer’s data. The cost of a data breach and privacy violation is continuing to grow. The cost to remediate these compromises is also growing at an exponential rate. It is critical for organizations to focus on protecting the data they have been entrusted with and ensure customers know it’s a priority.

Although there is no “one-size-fits-all” approach to security, organizations can develop simple strategies to safeguard data. Start by encrypting your data and requiring two-factor authentication, not on just your customers but ALL your employees. No exceptions! The exception will cause your data breach. It’s critical to perform penetration testing on your applications as well as your networks. Most compromises happen through applications and not accidental exposure of a network service nowadays. Make sure to monitor your data for exfiltration. And, of course, investing in a good vulnerability management program to patch your systems is key for remediation.”


Ram Mohan, Identity Digital

“Protecting sensitive information online begins with robust domain security. Domains, as the primary entry points to the internet, are constantly under attack from phishing and impersonation attempts designed to exploit vulnerabilities and undermine trust. A proactive approach is therefore paramount. Proactive measures like those outlined in ICANN’s Security Framework and other collaborative initiatives are essential to defend against these threats. By deploying advanced tools that block risky lookalike domains, we can neutralize malicious activity before it impacts businesses and individuals.

The digital economy’s rapid expansion intensifies the critical need for scalable, reliable, and secure domain infrastructures. Failure to address this need leaves us vulnerable to escalating cybersecurity risks. The migration of crucial domains like .ai to modernized platforms is a vital step in building the necessary resilience. This Data Privacy Week is a stark reminder: inaction is not an option. Let’s commit to building a safer, more trusted internet—before the consequences of inaction become irreversible.”


Shiva Nathan, Onymos

“The majority of technology leaders (84 percent) report they depend on low-code/no-code capabilities provided by SaaS solutions to achieve their application development goals. These solutions absolutely benefit enterprises, but they also introduce a critical issue: ensuring data privacy.

When enterprises work with almost any SaaS vendor, they are required to share their data in exchange for accessing their solutions. This practice enables those SaaS vendors to leverage that data for their own benefit. This has become standard practice. What is often overlooked is that this exposes SaaS customers — and, in turn, their own customers — to significant risks. We are entrusting our data to black boxes. These are honeypots for bad actors. Just look at what happened with Change Healthcare earlier this year, the largest healthcare data breach ever.

As we recognize Data Privacy Week and Data Privacy Day this year, we in the technology industry must take a serious look at our data privacy and security practices. Our current practices are no longer acceptable. We must find a way to preserve the integrity of our data and that of our customers while still enabling all of us to innovate quickly. One way we can do that is by employing no-data architecture principles, where SaaS companies build products that don’t capture or store their customers’ data.”


Karl Bagci, Exclaimer  

“As Data Privacy Day approaches, it’s a timely reminder that security must be an intrinsic part of any technology strategy, not an afterthought. The rise of ‘Bring Your Own AI’ models and interconnected tech ecosystems has introduced incredible efficiencies but also heightened security risks.
Protecting data now requires a shared responsibility model where companies work closely with their vendors to ensure rigorous encryption, real-time monitoring, and strict access controls.
The stakes couldn’t be higher: reputational damage from a single breach can ripple through an entire ecosystem, undermining customer trust and financial stability.
To meet these challenges, organizations must embrace security as a foundational principle, embedding it into every stage of development. This proactive approach not only mitigates risks but also sets a new standard for customer trust and operational resilience.”

Candice Frost, Nightwing

“In 2025, protecting data from the digital footprints left on the floor of the internet landscape remains a challenge, especially as we witness significant changes worldwide in data protection laws and AI regulation.

That said, while complete data protection may not be possible, there are steps businesses can take to proactively plan and create an established defense. First, evaluate what is exposed and where the location of risks to information is. The knowledge of what is at stake and where risks exist helps to mitigate vulnerabilities. Second, guard data through services that offer traffic monitoring, protection specific to the application or work at hand, and the ability to reach back to a response team that fortifies data. Third, create a response strategy. Thinking through the identification, mitigation, and recovery coordinates in advance is the best path to move forward from possible data loss. Fourth, share the game plan with trusted partners to assist in garnering the confidence of others in the handling of data. Lastly, learn from any data loss event to increase privacy in the future.

By collecting only essential data and designing with privacy in mind at every stage of development, all stakeholders will be able to better protect their own data. Implications of customer-centric privacy policies are a significant differentiator in a crowded marketplace. Embracing the challenges of compliance provides a competitive advantage to those businesses demonstrating privacy as a bedrock of their business strategy.”


Chris Montgomery, Commvault

“Each Data Privacy Week, the core theme remains the same: cyberattacks are not only increasing in volume but are also becoming more sophisticated. In fact, the average organization saw approximately eight cyber incidents in 2024. Since attacks are clearly inevitable, it is no longer enough to only invest in solutions that proactively ward off these threats. All enterprises must invest in cyber resilient solutions that prioritize recovery, so business operations can resume quickly following an attack, with limited downtime, financial burdens, reputational damage or worse.

This supports the ultimate business goal of becoming a minimum viable company or having the ability to maintain essential operations and services even in the event of a breach. Cyber criminals have gotten smarter about finding ways to break into traditional backups, often making them unusable, so this is a critical piece of the puzzle.

This is only part of the equation. Each organization needs several layers of defenses to maintain resilience against today’s complex cyber threats. By starting with solutions that arm businesses with an active defense against intrusions to recover rapidly and accurately when an attack does happen, you’re set up for success.”


Lamont Orange, Cyera

Protecting consumer data is no longer just a best practice—it’s a business imperative. With increasing data collection and new regulations on the horizon, organizations must move beyond traditional methods like encryption and audits. While these are critical, businesses face heightened risks from third-party vulnerabilities and supply chain threats that expose sensitive information to bad actors.

In light of evolving laws and a growing emphasis on consumer privacy rights, companies must adopt a proactive, privacy-by-design approach—ensuring robust vendor oversight, continuous risk assessments, and a culture of accountability. The organizations that treat data privacy as an ongoing commitment will not only stay ahead of new regulations but also build lasting trust with customers. The future of business depends on secure data.”


Idan Plotnik, Apiiro

AI has taken the world by storm, and with it, data holds immense value as the organizational currency. AI has transformed not only how we interact with each other, but also how organizations develop software and build applications, inadvertently creating new challenges around data privacy. As AI accelerates the velocity of coding and design, organizations increasingly become the culprits of new AI-driven risks. To build trust and ensure security, organizations must prioritize a baseline of data privacy from the start. The solution lies in embedding privacy and security measures early in the development process, preventing potential issues before they take root.”


Jim Flynn, CivicPlus

“As we observe Data Privacy Day, it’s crucial to recognize the growing cybersecurity challenges faced by local governments, as ransomware, data breaches, and phishing attacks continue to be daily concerns. Local governments, often holding sensitive resident data, are prime targets for cybercriminals seeking financial gain or causing disruption because if they are successful, they will obtain unauthorized access to sensitive resident data and have the ability to impact large groups of people. Moreover, with the rise of sophisticated malware and AI-driven attacks, criminals are able to launch more evasive and damaging attacks, meaning the security landscape becomes even more volatile.

With human error accounting for 95 percent of breaches, it is essential that both local governments and their residents take steps to safeguard their data. For local governments, regular staff training on secure data handling practices is vital, as is investing in robust cybersecurity measures and comprehensive incident response plans. Additionally, residents need to be educated on best practices to protect their data and avoid human error, so local governments need to share this information as well as work with technology providers to mitigate the risk of attacks.  As cyber threats evolve, fostering a culture of cybersecurity awareness and investing in advanced security tools will be key to safeguarding government data and maintaining public trust.”


Brett Wujek, SAS

Expect synthetic data to become more mainstream this year. Organizations need data to feed AI. However, very often organizations are restricted from using the data for AI development because of privacy issues. With synthetic data generation techniques, privacy concerns can be avoided by generating highly representative data that cannot be traced back to the real data. Moreover, synthetic data can be used to attain balance among all represented groups, which is critical to ensuring AI models are fair and unbiased.”

The post Data Privacy Week 2025: Insights from Over 60 Industry Experts appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
Data Privacy Day 2025: Insights from Over 60 Industry Experts https://solutionsreview.com/backup-disaster-recovery/data-privacy-day-insights-from-industry-experts/ Tue, 28 Jan 2025 18:10:27 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=6986 The editor’s at Solutions Review curated this guide to 2025 Data Privacy Day insights, featuring a selection of commentary from industry leaders. In honor of Data Privacy Day 2025 on January 28, we’ve curated the definitive thought leader guide, drawing on the collective expertise of over 60 industry leaders and privacy professionals. This guide brings […]

The post Data Privacy Day 2025: Insights from Over 60 Industry Experts appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

The editor’s at Solutions Review curated this guide to 2025 Data Privacy Day insights, featuring a selection of commentary from industry leaders.

In honor of Data Privacy Day 2025 on January 28, we’ve curated the definitive thought leader guide, drawing on the collective expertise of over 60 industry leaders and privacy professionals. This guide brings together in-depth insights and commentary from some of the most respected voices in data privacy, offering a comprehensive view of the current landscape and the evolving challenges facing businesses, regulators, and individuals alike.

As privacy concerns continue to grow (see DeepSeek), navigating the complexities of data protection has become more critical than ever. From emerging technologies like AI and blockchain to shifting regulatory frameworks and the increasing threat of cyberattacks, privacy is at the forefront of conversations across industries.

Through this guide, we aim to provide practical strategies, actionable advice, and forward-looking perspectives to help you not only stay compliant but also build trust with your customers, safeguard sensitive information, and foster a culture of privacy within your organization.

Whether you’re looking to deepen your understanding of data privacy laws, enhance your organization’s privacy policies, or simply stay ahead of industry trends, this collection of expert insights is your go-to resource for navigating the constantly-evolving world of data privacy.

Data Privacy Day 2025 Insights


Jamie Moles, ExtraHop

“Data Privacy Week highlights the importance of data protection amid today’s evolving threat landscape. As we saw in 2024, high-profile data breaches reached record highs, costing organizations millions of dollars. This is our new reality, and large-scale attacks that compromise sensitive data will continue this year across all industries, considering rising geopolitical conflicts and cybercrime groups’ more advanced strategies.

Recent research from ExtraHop found that bad security hygiene and improper training, enabling attackers to steal and use credentials to enter an organization’s network, was a common point of entry for security breaches – with long-term costs averaging $677 million. Improving security hygiene to prevent these breaches is essential, and Data Privacy Week is the perfect reminder for companies to equip their employees with the knowledge to keep sensitive data secure and uphold privacy standards.

One critical investment is prioritizing cyber training for all employees. Everyone should be aware of the latest risks – such as social engineering and phishing attempts – and be required to follow basic security hygiene protocols like using unique complex passwords, activating multifactor authentication, remaining wary of suspicious emails or texts, and enabling regular software updates. Following these steps, in tandem with investments in cyber resilience, can protect organizations from a costly security incident.”


Gary Orenstein, Bitwarden 

“Protecting privacy starts with being proactive. For businesses, integrating privacy at the core of operations—whether at the organizational level or for individual employees—is crucial for establishing a robust security foundation in an increasingly complex digital landscape.

This approach isn’t just about compliance; it’s about empowering teams with the tools and knowledge needed to protect sensitive data, quickly address potential security concerns, and cultivate strong security practices across the board. One of the most effective first steps in this journey is the adoption of password managers. These tools help reinforce better security habits, ensuring that employees use strong, unique passwords across various accounts, which significantly reduces the risks tied to weak or reused credentials.

However, security and privacy require more than just password management. A multi-layered strategy—incorporating additional tools like privacy-centric browsers, email alias providers, and VPNs—further enhances protection and minimizes the likelihood of data misuse or breaches. Some of the most recommended this year have been Brave and Firefox browsers, DuckDuckGo for search, and Signal for messaging.

In a continuously evolving cybersecurity landscape shaped by advancements in AI and emerging regulatory shifts, it’s critical for businesses to stay ahead of these changes to protect organizational and personal data. Staying informed and proactive will help businesses secure their digital assets, build trust with customers, and minimize the risks to their operations.”


Chris Gibson, FIRST

Data privacy challenges & AI

“AI will undoubtedly dominate data privacy conversations in 2025, but it’s a double-edged sword. On one side, AI empowers defenders with real-time threat detection, predictive modeling, and automated responses through tools like SOAR (Security Orchestration, Automation, and Response). These capabilities can cut detection times from hours to minutes, making a significant difference in preventing breaches that threaten sensitive personal data.

However, understanding and anticipating the flip side is just as critical. Bad actors are using AI to automate sophisticated phishing campaigns, identify vulnerabilities faster, and evade detection with AI-designed malware. This means organizations must adopt AI-based threat detection tools to counter these evolving tactics and protect the personal information they manage. Success in 2025 will come to those who balance AI’s potential with the vigilance to address its risks, all while keeping data privacy at the forefront.”


Rob Truesdell, Pangea

Systemic data exposure

“In 2025, we’re seeing a concerning trend where sensitive data exposure through AI isn’t primarily coming from sophisticated attacks – it’s happening through basic oversights in authorization and data access controls. Organizations are discovering that their AI systems are inadvertently sharing confidential information simply because they haven’t defined who should have access to what.”


Shrav Mehta, Secureframe

Only store the data you need

“Data minimization is fundamental to effective risk reduction. Organizations must develop a clear prioritization strategy—identifying their most critical assets and building targeted security measures around them. While organizations should aim for comprehensive security across all systems, strategic prioritization ensures critical assets receive appropriate protection. The most effective approach often starts with a simple principle: if you don’t need to store certain data, don’t collect it in the first place.”


Greg Clark, OpenText Cybersecurity

“From the U.S. government’s robust new cybersecurity executive order (which could or could not be implemented with a new administration) to HIPAA, GDPR and AI privacy policies, organizations are navigating increasingly stringent and complex rules that span industries and borders. These challenges can strain resources and create operational risks.
This Data Privacy Week underscores the urgency of embracing an organization-wide privacy-first approach to shift away from complexity, ensure compliance and protect data from persistent cyberattacks.
  • What all organizations can do: Adopt clear, company-wide policies that ensure the secure use and handling of information. This is crucial with the rapid adoption of GenAI tools. A recent OpenText survey found only 27 percent of employed respondents use privacy tools and settings to protect workplace information when using GenAI.
  • What data privacy and security teams should do: At a practitioner level, simplifying security stacks can help protect information by reducing fragmentation, improving cross-team communication, leveraging contextually relevant threat insights, and increasing transparency within data and other business systems. It also allows them to unify threat detection and response, data discovery and protection, modernizing data privacy and strengthening privacy and security postures.
  • What employees should do: Individual employees play a critical role in protecting data. Phishing scams and insider threats are only getting more sophisticated. Whether a large enterprise or a small business, education and awareness across all departments need to be layered on top of AI-powered technologies that detect threats.
A privacy-first approach doesn’t have to slow innovation. By streamlining security stacks and policies, organizations can move beyond complexity to unlock more efficient, integrated workflows.”

Gary Barlet, Illumio 

“January 28 is Data Privacy Day. And it’s come at an appropriate time. Just weeks ago, the U.S. Treasury revealed a breach that exposed sensitive personal data, including 3,000 unclassified files. A new year with the same old story of massive data breaches and leaked personal information. Yet organizations and agencies are taking the same security measures year after year. We need to fundamentally rethink how we protect the data that powers our lives, starting with Zero Trust as the foundation. And if there’s one thing this year’s Data Privacy Day reminds us, it’s this: it’s time to stop talking about securing data and start actually doing it.”


David McInerney, Syrenis

“AI is reshaping the world as we know it, and global enterprises are pouring money into its development. But as AI becomes ubiquitous, so too do the growing concerns about its impact on data privacy. As a result, we’ll see an explosion of AI regulation in 2025 – and businesses must be ready to act fast.

For many it’ll be an uphill battle because simply complying with new regulations won’t cut it. In fact, with 64 percent of consumers feeling their country’s privacy regulations don’t do enough to protect them, it’s the bare minimum. To truly gain consumer trust, companies must embrace transparency, consent, and preference management. AI is here to stay, but if consumers feel their right to privacy is being abused, they won’t hesitate to walk away.”


Nicky Watson, Syrenis

“After a year of data privacy scandals dominating headlines, it’s become clear that data breaches and misuse are wearing down consumers’ trust in businesses. Heading into 2025, companies aren’t just under the microscope of the government, they’re facing growing demands from the public for straightforward, ethical data practices. They can’t treat data privacy like a box to check when it’s become such a public priority. And the AI boom hasn’t helped any of this consumer skepticism, with 78 percent of Americans finding AI data-sharing policies confusing.

The message is loud and clear: consumers demand transparency and control over their data. The companies that heed the call are poised to succeed and thrive, building direct relationships. Those that don’t are risking the customer’s trust – not to mention their reputation.”


Greg Ives, Nutrient

“Document data privacy is becoming an increasingly critical issue, particularly in highly regulated industries such as finance, healthcare, legal and government, where the proper handling of sensitive information is paramount. Emerging AI technologies are transforming how we manage sensitive data in documents. AI-driven tools, leveraging natural language processing (NLP) and large language models (LLMs), can enable efficient redaction and anonymization of sensitive information such as personally identifiable information (PII), financial data, and healthcare records within documents. These tools automate the redaction process, minimizing human error and speeding up document preparation for secure sharing or archiving, while ensuring compliance with regulations like GDPR, HIPAA, and CCPA.

Beyond redaction, AI can support pseudonymization, generalization, and data masking, converting sensitive data into formats that maintain utility while protecting privacy. Continuous improvements in LLMs allow these systems to adapt to emerging patterns and threats, ensuring data integrity and privacy. By harnessing AI, organizations can manage their document data securely and responsibly.”


Darren Guccione, Keeper Security

“Global cyber threats are growing more prevalent and sophisticated every day. As we prepare to mark Data Privacy Day, there’s no better time to reflect on the pivotal role of zero-knowledge encryption in protecting your business against cyber threats.

Zero-knowledge encryption is as secure as it gets. It ensures that only the user has access to their data – period. With true zero-knowledge encryption, your information is encrypted and decrypted directly on your device, meaning the service provider doesn’t hold the keys, even for recovery or troubleshooting. This level of control goes beyond what traditional security tools, or even “almost” zero-knowledge solutions, can offer. “Almost” solutions still leave potential vulnerabilities, with access points or backdoors that undermine your security. With zero-knowledge, there are no loopholes – just absolute confidentiality.

As businesses, we hold a responsibility to protect client data, intellectual property and everything in between. Zero-knowledge encryption plays a pivotal role in fulfilling that duty. When your data is protected at every stage – whether in storage, transit or in use – you’re reducing the risk of exposure from every angle. True zero-knowledge encryption is a crucial step for businesses in building a comprehensive security strategy. As cyber threats grow in frequency and complexity, taking decisive action to protect your data is essential to staying ahead of bad actors.”


Devin Ertel, Menlo Security

“The growing use of SaaS and AI has shattered the illusion of a centralized, easily managed data repository. Gone are the days when we have our data in one place and can wrap our arms around it. Our sensitive information is scattered across countless platforms and products, making tracking its flow and ensuring its protection incredibly challenging. Furthermore, the sheer volume and variety of data we generate and store today eclipses anything we’ve seen before. Where once a single business unit might have been responsible for a dataset, now multiple departments access and utilize the same information, creating a complex web of permissions and potential vulnerabilities. Understanding who should have access to what and how they should be using it is more complicated than ever.”


Eric Schwake, Salt Security

“Data Privacy Week serves as an important reminder of the need to protect sensitive information in our connected world. As businesses rely more on data for innovation and enhanced customer interactions, safeguarding this vital resource becomes essential. This effort involves not just following data privacy laws but also putting effective security protocols in place to prevent unauthorized access and data breaches.

API security is closely tied to data privacy. APIs, which facilitate data transfer in modern applications, are key to ensuring that sensitive data is managed securely and ethically. Organizations should embrace a thorough strategy for API security, which includes API discovery, posture governace, and runtime threat protection, to reduce the chances of data breaches and uphold privacy compliance. By focusing on API security, companies can show their dedication to data privacy and foster trust with customers and partners.”


Philip George, Infosec Global Federal

“This year, Data Privacy Week falls on the heels of Biden’s Executive Order on cybersecurity, reminding us that post quantum cryptography (PQC) and data privacy should remain at the forefront of every organization’s list of priorities.

With recent supply chain attacks targeting trusted vendors and their government customers (see the US Treasury-Beyond trust breach), the integrity of our software supply-chain has once again been thrust into focus. This latest Executive Order will help to establish a common standard for submitting machine readable software attestations, support artifacts like software and cryptographic bill of materials, and ultimately, secure more data.

The order calls for a concerted effort to expand awareness around PQC-ready products by providing a list of product categories that support PQC. Subsequently, agencies will be required to include a requirement for products that support PQC preparedness and adoption in future solicitations. Lastly, agencies will be required to start adopting new PQC standards after identifying network security products and services that are actively employed within their systems. There will also be direct outreach from the U.S. government to its allies and partners to encourage similar action within their technology environments.

This does not only apply to government agencies. Private organizations that still have not completed their inventory and mapping of cryptographic dependencies must also do so quickly. This is important to understand which new standard will work best for their various assets and his inventory is critical to creating detailed migration plans that prioritize the most sensitive and critical assets, ensuring they are first in line for upgrades to PQC standards.

Data Privacy Week reminds us that government agencies and private organizations alike should not stay complacent. The “steal now, decrypt later” approach by adversaries remains true and quantum computing-based attacks will become a reality. Let this be yet another wake-up call to prepare your organization and conduct cryptographic inventory before it’s too late.”


Boris Cipot, Black Duck

“In a world of sophisticated cyber threats and rigorous regulations like GDPR and CCPA, it is important to highlight data privacy and the protection of sensitive information. As today’s trends lean toward remote work practices, cloud adoption and widespread webservice offers, we as users have the desire for transparency about data generation, storage, and its usage. On the other hand, businesses offering those services should feel the pressure to implement robust protection of this information.

Therefore, Data Privacy Week is not something that happens once a year and is over and forgotten about after five days, but should rather give us a starting point, a kickoff, to see what has happened in the past, what we can expect in the future and how we should act in order to avoid the bad and embrace the good in the field of data privacy.

The main security trends we see in the industry are:

  • Adaptation of Zero Trust Architecture, where organizations are following the “never trust, always verify” approach to protect data access.
  • Focus on Open-Source Security to secure the usage of OSS dependencies and comply with their licensing obligations.
  • Usage of Privacy-Enhancing Technologies (PETs) where organizations are using tools to mask, encrypt, and anonymize data to minimize risks without compromising usability.
  • Proactive Testing Across the SDLC to embed security and privacy checks into every stage of software development lifecycle to ensure compliance and minimize the likelihood of exploitable vulnerabilities.

Businesses have constant pressure to enhance their data privacy therefore it would be recommended that they conduct regular data audits to map out what data they collect, why, and where it’s stored, ensuring that unnecessary data is not retained. Another important topic is privacy awareness. Secure handling of data and recognizing threats is a must in employee training. As supporting mechanisms, businesses should consider automating their compliance violations and implement runtime protections, for example, Runtime Application Self-Protection (RASP) tools that can detect and mitigate attacks in real time.

When it comes to software development, businesses must also think about robust AppSec practices. Here the implementation of technologies like Static Application Security Testing (SAST) and Software Composition Analysis (SCA) is a must. SAST tools will help discover and mitigate vulnerabilities in your own code where SCA tools will help organizations to identify used open source in their development and mitigate its vulnerabilities and license compliance risks. Additionally, Dynamic Application Security Testing (DAST), and Interactive Application Security Testing (IAST) help organizations uncover vulnerabilities in code, configurations, and dangerous application behavior. Fuzzing techniques that simulate attacks can further help to uncover hidden flaws that traditional testing technologies may miss.

Organizations can adopt a holistic approach to data privacy and application security by integrating AppSec tools into their CI/CD pipelines and their Dev(Sec)Ops workflows.”


Stephen Kowski,  SlashNext

“Data Privacy Week reminds us that phishing attacks designed to steal personal information or credentials are no longer just an email problem. Attackers are finding new ways to compromise our data through QR codes, AI voice scams, and multi-channel attacks. We’re seeing a dramatic rise in QR code scams since late 2023, particularly targeting business leaders, while AI voice scams are increasingly targeting those over the age of 60. The most concerning trend in early 2025 is how sophisticated these attacks have become, with criminals using multiple channels simultaneously – as seen in recent cases where fraudsters combined email bombing with chat and voice phishing.

The key message for Data Privacy Week is simple: we need to expand our understanding of phishing, specifically how your data privacy can be compromised beyond just email-based attacks. Whether it’s scanning QR codes, answering phone calls, or responding to messages on various platforms, every form of digital communication needs the same level of scrutiny we’ve learned to apply to our emails. Staying informed about these emerging threats is our best defense in protecting our personal information.”


Brandon Williams, Fenix24

“In today’s hyper-connected world, data is the lifeblood of every business. We collect vast amounts of personal and sensitive information from our customers, employees, and partners, which helps fuel innovation, but it also presents significant risks. A single data breach can have devastating consequences, from financial losses and reputational damage to legal liabilities and even criminal charges.

As the leaders of our organizations, we have a duty to protect this valuable asset. This responsibility transcends mere compliance with regulations like GDPR or CCPA. It demands a proactive and comprehensive approach to security.

  • Shifting the Paradigm: We must move beyond simply reacting to threats. We need to adopt a “security-first” mindset, where data protection is embedded into every aspect of our business, from product development to customer service. This requires a fundamental shift in our thinking, prioritizing security by default and minimizing unnecessary data collection.
  • Investing in Robust Security: This includes implementing robust security controls, such as multi-factor authentication, encryption, and regular security assessments. We must also invest in our people, providing them with the training and resources they need to identify and respond to potential threats.
  • Building Trust: Transparency and trust are paramount. We must be transparent with our customers about how we collect, use, and protect their data. We must also actively engage with our customers and stakeholders on data privacy issues.

Data Privacy Week is not just a week of awareness; it’s a call to action. It’s an opportunity for us as business leaders to demonstrate our commitment to data security and build a more trustworthy and resilient digital future.

Key Considerations:

  • Go Beyond Compliance: While compliance is essential, it’s not enough. We must continuously evaluate and adapt our security measures to address the ever-evolving threat landscape.
  • Bolster your Backups: Despite common beliefs, 93 percent of attacks target backups, with 68% successfully destroying critical data. It’s crucial to invest in a resilient, continuously hardened backup solution that can scale with your growth before it’s too late.
  • Enhance Recovery and Resilience: Develop and implement a realistic recovery strategy to ensure quick restoration of operations and data integrity after an attack. Focus on building resilience to withstand and recover from disruptions effectively.
  • Invest in Cybersecurity Talent: Cultivate a strong security culture within your organizations and attract and retain top cybersecurity talent.

By prioritizing data privacy and security, we can build a more secure and trustworthy digital future for our customers, our employees, and our businesses.”


Agnidipta Sarkar, ColorTokens

“Data Privacy Week highlights the need for continuous improvement in our data protection strategies. Privacy laws across the world expect “reasonable security measures” to be implemented to ensure personal and sensitive data remains out of reach from hackers and the dark web. Over the years the industry has been investing in many tools, and yet breaches are not decreasing. It is time to think of foundational mechanisms like zero trust to ensure data protection. Dividing the digital environment into smaller, isolated micro-perimeters, each containing a specific group of resources, users, or applications, using software-defined policies or rules, limits the scope of a potential data breach. Staying breach-ready is crucial, as it not only helps in complying with data privacy regulations.”


Brian Reed, Proofpoint

“Data Privacy Week highlights a critical challenge: the AI data privacy paradox. While generative AI offers immense potential, it also introduces significant data loss risks. Inputting confidential information or Personally Identifiable Information (PII) into these systems is like handing attackers a loaded weapon, and businesses are understandably worried. Proofpoint’s 2024 Data Loss Landscape Report reveals that 40 percent of Australian CISOs identify GenAI tools as a top organizational risk, underscoring the need for robust data protection strategies.”

In order to protect themselves, organizations must take a human-centric approach to cybersecurity to defend their data. This approach brings together an understanding of data classification, user intent, and threat context and applies it consistently across all communications channels, including email, cloud, endpoint, web, and GenAI tools. This also means guiding employees with relevant, in-the-moment interventions and personalized learning paths based on an individual’s unique risk profile to cultivate a behavior change, where everyone understands the risks and plays a role in safeguarding the organization.”


Yoram Novick, Zadara 

“Data privacy and security are critical in today’s increasingly digital world. The rapid growth of cloud computing, with global spending forecasted to be well above $1 trillion, underscores the importance of protecting data within these systems. Organizations must prioritize robust security strategies to secure data storage and transfers, including selecting trusted hosting providers and implementing data protection and disaster recovery solutions. Moreover, sovereign AI should be evaluated to overcome the shortcomings of traditional public cloud offerings for AI use cases.
Data is one of the most valuable organizational assets, yet its protection remains insufficient in many cases. The significant negative impact of ransomware in the past year underscores the vital need for integrating cyber vaults and disaster recovery plans to all organizations. These measures ensure data integrity and minimize downtime during cyber attacks, particularly as ransomware threats continue to rise.
Zero trust models and smart security solutions are essential to counter advanced threats. Implementing multi-factor authentication (MFA) and identity-aware systems reduces vulnerabilities such as credential stuffing. These measures help organizations safeguard sensitive information while optimizing business operations.The role of AI in data privacy and data security introduces both opportunities and challenges.
While AI-driven tools simplify processes, they also heighten risks if improperly managed. Maintaining human oversight in AI implementations and adhering to basic security practices are crucial to mitigating threats. As organizations increasingly adopt cloud services for AI, addressing cloud-specific security concerns is critical. The use of advanced sovereign AI cloud solutions will significantly reduce the number of public cloud security incidents.
Data Privacy Day serves as a reminder that safeguarding sensitive data is a shared responsibility among businesses, governments, and individuals. By staying proactive, embracing compliant solutions, and prioritizing education, organizations can navigate the complexities of data privacy and security in an increasingly interconnected world where AI is playing an increasingly vital role.”

Michelle King, Index Engines

“Data Privacy Day is all about championing the protection of personal information and spreading the word on best practices in data security. By focusing on trusted data integrity, adopting a recovery-first mindset, and leveraging new technology including AI, we can truly support these goals. Prioritizing data recovery means we’re always prepared to resume operations after breaches with minimal data loss, and AI-driven security measures give us the edge in detecting and responding to the most sophisticated attacks. Together, these principles build trust and create a safer digital world for everyone.”

Jennifer Mahoney, Optiv

“Data Privacy Week is a great reminder that the onus for protecting customers’ personal data is on the companies that collect, use and share it. Companies have a responsibility to protect consumers, secure their data and do right by them morally, ethically and legally. Handling data privacy the right way drives consumer trust and builds long-lasting relationships.

Consumers are increasingly aware of the value of their data and are seeking ways to reduce their data footprints. They are exercising their data subject rights to opt out of certain data processing and are becoming more informed about the data companies collect and use.

The growing integration of AI-enabled solutions to collect and process data highlights the importance of maintaining safe data practices, responsible AI use and nurturing and growing positive consumer sentiment. Here are four areas companies can prioritize immediately to head down the right path:

  • Transparency: Maintain transparency around AI use, data collection, processing and sharing activities. Without transparency around the use of personal information, organizations run the risk of alienating their customers. Companies must also be transparent in their privacy notices and terms of conditions, writing them in a way that’s consumable and easy to understand.
  • Choice: Offer individuals choices about how their data is processed and used for marketing purposes. For example, enable them to opt out of sharing data with third parties, advanced advertising practices (i.e., geolocation or behavioral indicators) or processing of certain sensitive data. Increased choice not only helps companies address regulatory requirements but also allows customers to feel valued and respected.
  • Control: Offer control through a tailored experience that allows users to adjust their data-sharing preferences. For example, choosing which activities are connected to their account, purging information when possible and configuring settings that align with personal preferences or comfort levels. By retaining control of their data, consumers will feel more secure and comfortable when sharing personal information.
  • Education: Ensure your personnel can recognize what personal data is and the obligations they have when accessing or otherwise processing personal data. Likewise, help consumers become educated about the data you collect and process and how to exercise their rights around that data.

The strongest data privacy programs are founded on transparency, choice and control, and this should be companies’ focus this Data Privacy Week. Making this a priority keeps data secure, builds trust with customers and drives business outcomes.”


Rebecca Herold, IEEE

Practical steps consumers can take to protect their data

“When purchasing a product that includes digital capabilities:

  • Check to ensure the product you are considering has capabilities to determine, and provide you with choices for, where your data is stored, how is it shared, and the ways in which is it processed. If you don’t like the answers (e.g., your data is sent to marketers…often referenced as “trusted partners” in the privacy notice…or it is being used to train AI, etc.) then find out or ask the manufacturer or seller how you can opt-out of the actions that you do not want your data used for. If the manufacturer and/or vendor supporting the product indicates you do not have any choices or ways to do this, then don’t get the product. This is a red flag that your data is probably being used for many purposes, and shared with far more entities than you would ever want it to be shared. The more personal data is shared and used, the greater the risk that your data will be breached and compromised in other ways. And once you hand over your data to others, you’ve completely given up any control for how that data is being secured, shared, or used.
  • Check to see if the product has the strongest security and privacy protections enabled by default. It is common for digital products to market on their packaging and in ads that they have many different types of personal data protections. However, they often do not have them enabled. This results is consumers being misled, and just assuming that the products are secure out of the box. If they do not have these protections enables by default, then either don’t purchase the product, or if you really want it, make sure you know how what are the products privacy and security capabilities are, and enable them before you start using the product.

When using a computing device, or any type of digital-enabled product of any type:

  • Make sure you are using strong passwords/PINs/pass phrases/etc., and multi-factor authentication to access your data, such as on your device, in the portal where it is stored, accessed, etc.
  • Make sure the data is strongly secured when being collected, transmitted and stored. This would include being strongly encrypted, and using security tools to protect the data in transit. Never use unsecured public networks. If you use a VPN that helps quite a bit, but VPNs still have vulnerable areas that can be exploited.
Stay up-to-date on the latest privacy breaches and cybersecurity scams, attacks and other problems:
  • Enable automatic security and code updates for your product, directly from the manufacturer or a vendor they vouch for. New vulnerabilities are discovered almost every day in technologies, so applying those patches as soon as they are available will help to protect your data.
  • Never use public USB chargers without using a juice jack blocker type of device (they are very inexpensive), check for skimmers at gas pump payment panels, ATMs, etc., by seeing of any part of the device is loose or wiggles, or you see something odd, like a device pointing toward where payment cards go; someone may have installed a video to capture your card number and PIN. Don’t swipe or insert your payment card if you run across such situations.
  • Watch out for scams to take your data that have been around for decades.
  • Monitor the news for newly discovered privacy breaches, network and data attacks, why and how they occurred, and how to protect against them going forward.
The role of tools and technologies in enhancing data privacy

There are many different types of tools that can enhance data privacy that are very effective. They are also needed, because you can’t have privacy without the use of security technologies (along with physical and opterational/administrative protections) to support protecting privacy by protecting the access to, confidentiality, availability, and integrity of personal data, which is vital for ensuring privacy protections. It is very important to keep in mind, though, that these tools and technologies are not perfect. In fact, some are quite flawed.

For example, no AI tool used to support privacy and security are 100 percent accurate or effective. They are, at best, around 80 percent accurate and effective. Whatever types of tools and technologies are being used to enhance privacy, there still needs to be human validation of the outputs and results to ensure algorithms are not spitting out incorrect conclusions, alarms, etc.

Common misconceptions surrounding data privacy and tips to address them

There are many misconceptions about data privacy. One that I have heard throughout my entire career is that if there are no laws, regulations, or other legal requirements against using, collecting, selling, etc., personal data, then that means there are no associated privacy concerns or risks, and that it is okay to do so, often with impunity. This is not correct! It is also a dangerous belief for organizations to have if they are collecting and want to use personal data. Keep in mind that data protection, aka privacy, laws/etc., are generally reactionary. However, the misuse of personal data can have devastating consequences on the associated individuals.”


Kayne McGladrey, IEEE

Practical steps consumers can take to protect their data

“To protect their personal data, consumers can take several practical steps to remove their information from data broker websites and opt-out of marketing. First, they should identify where their data is held by searching major data broker sites, public records, and credit reports. Once identified, consumers can use the “Opt Out” or “Remove My Data” links provided on these websites to submit removal requests, ensuring they confirm their identity and track the progress.

Additionally, they should familiarize themselves with regulations like the California Consumer Privacy Act (CCPA), which allows them to request the deletion of their personal data and opt-out of its sale. Consumers can also use online tools and services designed to automate the opt-out process from marketing lists and data brokers.

The role of tools and technologies in enhancing data privacy

Tools like online services that automate opting out of marketing and removing consumer data from data broker websites play a crucial role in enhancing data privacy by streamlining managing personal information. These services automatically handle the often needlessly complex and time-consuming task of submitting removal requests to multiple data brokers, ensuring that consumers’ data is deleted or withheld from sale, reducing the risk of unauthorized access and misuse.

Additionally, browser extensions and apps that block trackers and enhance privacy further improve data protection by preventing the collection of browsing habits and personal information by third-party advertisers and websites. These tools work by blocking cookies, scripts, and other tracking technologies, limiting the amount of data that can be collected without the user’s consent.

Common misconceptions surrounding data privacy and tips to address them

Many consumers mistakenly believe that using a VPN magically provides complete anonymity and protection from all online threats. While VPNs encrypt internet traffic and mask IP addresses, they do not make users completely anonymous, especially when logging into social media and other websites that inherently track user activity through cookies and account logins.

VPNs primarily secure data in transit but do not protect against malware, phishing, or data breaches on the websites themselves. To improve data privacy, consumers should use privacy-focused browsers and extensions that block trackers, regularly clear their cookies and cache, and be cautious about the personal information shared on social media.”


Houbing Herbert Song, IEEE

Practical steps consumers can take to protect their data

“To protect data, best practices for consumers include multi-factor authentication, de-identification, and anonymization, among others.

The role of tools and technologies in enhancing data privacy

To enhance data privacy, tools and technologies are important but they alone are not enough. Data privacy is socio-technical in nature. Both technical and social factors impact data privacy.

Common misconceptions surrounding data privacy and tips to address them

One common misconception is that only sensitive data needs privacy protection. In fact cybercriminals are able to mine sensitive data from data seemingly insensitive. We should be cautious about data sharing. Another common misconception is that incognito mode makes us completely anonymous. In fact cybercriminals are able to steal users’ browsing history from internet service providers or websites visited. We have better use privacy-preserving search engines and browsers.”


Carl D’Halluin, Datadobi

“The number one data privacy best practice is simple: ensure the right data is in the right place at the right time. Throughout its lifecycle, data should be protected and only accessible as needed. While this is easier said than done, it’s imperative to implement the right strategies and technologies. Data is an organization’s most valuable asset and its greatest potential risk.

“Balancing these aspects is key. Effective data management optimizes business intelligence, enables smarter decision-making, and provides a competitive edge. It also ensures compliance with internal governance, legal mandates, external regulations, and financial goals.”


Joel Burleson-Davis, Imprivata

“In recent years, cyberattacks targeting critical US sectors, especially healthcare, have become more sophisticated and impactful. For instance, attacks on organizations like Change Healthcare and Ascension disrupted care delivery and cost millions. With these threats likely to persist, healthcare organizations must prepare. As mobile technology becomes central to healthcare, organizations must consider the impact on both data security and privacy

Mobile devices deliver significant benefits, such as better patient care and reduced staff burnout, but they also introduce new risks, particularly related to the loss or theft of devices. In healthcare, where each device can be an entry point to sensitive data, the consequences of a lost or stolen device are severe. Beyond just securing the devices, organizations need to implement stringent device management plans that include tracking, monitoring, and proper disposal of PHI when a device is not in active use. This ensures that devices are not only secure but also free of sensitive data when not in use, reducing privacy risks. Effective device management and access controls are critical to safeguarding PHI, improving visibility and control over devices, and ultimately enhancing both care quality and operational efficiency.”


Tina D’Agostin, Alcatraz AI

“This Data Privacy Day, we are seeing a significant focus on protecting Personally Identifiable Information (PII) as companies address the growing risks of data breaches. Many organizations are adopting privacy-preserving security measures, such as advanced access control systems, to prevent unauthorized access and ensure compliance with data protection standards.

This also aligns with safeguarding data and keeping it private, becoming mission critical within the priorities for the security industry, as business executives look to reevaluate and upgrade their security protocols to mitigate potential risks.

Industry research shows that 10 percent of data breaches are caused by physical security compromises and that the average cost of a data breach from a physical security penetration is nearly $5 million.

Augmenting cybersecurity with physical security and access control solutions is vital to ensure users’ PII is not being compromised. In turn, this will both save the enterprise from the hassle of a security breach, and keep user data protected from the perimeter to within the data center itself.

Companies–especially data centers–looking to have comprehensive data security posture should look to access control solutions purpose built for preserving privacy.

Businesses must move beyond outdated access control models and embrace a future where security is user-friendly and privacy-centric.”


Srujan Akula, The Modern Data Company

“Data privacy and governance have evolved from compliance checkboxes to AI fundamentals. The current challenge with data governance is fragmentation—privacy rules and protections often vanish during handoffs, especially with AI systems. Security platforms protect stored data but stop there, access controls only work within specific systems, and activation layers operate in isolation. These disconnected pieces can create major gaps when data moves between systems.

This fragmentation creates real problems for AI initiatives. Data scientists may train models using datasets without fully considering their privacy compliance or usage rights. Access levels become murky: what AI insights should an entry-level employee get vs a senior executive? Conversational interfaces need to handle these nuances while staying GDPR and CCPA compliant.

Treating data as a product changes this dynamic. By embedding privacy controls and governance from the start, you maintain visibility of lineage, permissions, and usage rights throughout the data’s journey. This context flows naturally into AI and analytics applications, ensuring compliance at every step–smart data that knows its own rules and boundaries, versus data that loses its identity every time it moves.

A data product approach accelerates AI innovation while maintaining trust. When context and governance are built in from the start, you unlock your data’s potential for AI without compromising privacy.”


Nick Mistry, Lineaje

“On Data Privacy Day, we are reminded that the integrity of our data depends on the strength and transparency of our software supply chains. With an increasing reliance on open-source components, especially for AI models and other critical systems, the risk of supply chain attacks continues to grow. Malicious or compromised code hidden within software dependencies can have far-reaching consequences, affecting not just the organizations that create them, but also the users and industries that depend on them. Alarmingly, 95 percent of all vulnerabilities come from open-source, and approximately 50 percent of open-source components are not maintained, leaving systems vulnerable to exploitation and creating significant risks to both security and privacy.

Organizations must prioritize monitoring and securing their software supply chains to mitigate risks effectively. Key strategies include:

  • Understanding what’s in your software including all dependencies and transitive dependencies.
  • Identifying vulnerabilities in open-source components, including those used in AI applications.
  • Implementing continuous monitoring of the software supply chain to proactively detect threats.
  • Detecting tampering and ensuring software integrity by verifying that all components remain unaltered and trustworthy throughout the supply chain.
  • Analyzing the origin and history of open-source dependencies to evaluate potential risks tied to their lineage and provenance.

Additionally, maintaining a comprehensive and up-to-date Software Bill of Materials (SBOM) is critical. A detailed SBOM provides full visibility into all components within the software, empowering organizations to verify software integrity and respond quickly in the event of a vulnerability or breach. By enabling swift identification and remediation of compromised or tampered components, organizations can minimize disruption and safeguard their systems effectively.

On Data Privacy Day and beyond, let’s commit to strengthening our security practices and building more resilient systems. A secure software supply chain is not just about protecting data, it is about safeguarding the integrity and trust of the digital world.”


Sascha Giese, SolarWinds

“‘I have nothing to hide,’ they say, and accept all kinds of intrusion into their digital life and beyond. Guess what? Even if there’s nothing to hide, privacy is a right we fought hard for, should insist on, and defend when required. No one needs to become paranoid, but we should pay attention to what information we provide voluntarily and if it’s really necessary to provide all the intel that some web portals ask for. Surely, you have heard ‘data is the new gold,’ too, so think of spending your personal information the same way you spend your money.”


Freddy Kuo, Luminys

“Data Privacy Day serves as an essential reminder of the importance of protecting both personal and organizational data. As we look toward 2025, AI’s impact on data privacy and security will continue to grow, transforming how we analyze data, detect threats, and safeguard information. Innovations like Video Surveillance as a Service (VSaaS) are leading the way, setting new standards for security and efficiency.

In the video security sector, AI-powered VSaaS solutions are driving transformative advancements. With self-learning capabilities and AI-integrated image signal processing (AI-ISP), these technologies adapt to evolving environments, providing businesses with more effective and efficient threat detection.

By embracing privacy-by-design principles and embedding them into every layer of product development, organizations can establish a stronger security posture. A resilient framework that prioritizes simplicity, control, and a commitment to safety empowers users to protect their data while fostering trust and confidence.

This Data Privacy Day, let us reaffirm our dedication to leveraging AI-driven advancements to safeguard data and privacy with greater precision, efficiency, and impact.”


Ratan Tipirneni, Tigera

“Data Privacy Awareness Week serves as a reminder that having robust Kubernetes security is paramount, especially as organizations increasingly deploy GenAI applications with Kubernetes. Building and deploying GenAI applications creates security risks when it comes to data privacy, integrity, and security. Built using sensitive data sources from inside an enterprise, once an organization deploys such applications, their attack surface increases greatly.

Let this Data Privacy Week be a wake-up call to organizations deploying GenAI applications on Kubernetes to make security a priority. To achieve comprehensive security for GenAI applications deployed on Kubernetes, organizations should prioritize: implementing network security access controls, adopting vulnerability management practices to proactively identify and address vulnerabilities, preventing and addressing misconfigurations, and maintaining observability.”


Sean Costigan, Red Sift

“Spectacular cyberattacks have shown that poor information security represents a critical vulnerability, harming reputations of people, governments, and businesses, and pushing many entities into insolvency. Among the most attractive targets for cybercriminals today is healthcare data, comprising one of the most sensitive, rich and interconnected sectors.

While enforcement of HIPAA has steadily risen, penalties for poor information security around PHI do not yet match impacts. In a long overdue shift, HIPAA regulations – which date from 1996 – have been proposed to expand to include more robust cybersecurity. As such, the proposed rules will aim to treat a variety of risks to PHI and healthcare operations through the adoption of controls such as enforcing MFA, encryption of data, and good cyber hygiene, among others. Recent research shows that an astonishing 80 percent of cyber-attacks against hospitals were identity based, social-engineering attacks. For cybercriminals seeking PHI and payouts, clearly phishing is their killer app.

While there is no national, federal, or comprehensive data privacy law in the US currently, the scope of the problem should be treated as a national crisis. As such, waiting for one regulation to rule them all isn’t a winning strategy: the financial impact, reputational harm and operational disruptions caused by recent privacy breaches should be sufficient to encourage organizations to adopt reasonable, proactive cybersecurity measures to protect us all.”


Paul Underwood, Neovera

“In today’s heightened cybersecurity landscape, threat actors are on the hunt for the most vulnerable, yet lucrative asset in organizations. Data – made up of customer information, financial records, and intellectual property – is an invaluable asset that has become the lifeblood of any organization and requires robust protection.

As data becomes increasingly targeted, one key concern has often been ignored: protecting your consumer’s data. The cost of a data breach and privacy violation is continuing to grow. The cost to remediate these compromises is also growing at an exponential rate. It is critical for organizations to focus on protecting the data they have been entrusted with and ensure customers know it’s a priority.

Although there is no “one-size-fits-all” approach to security, organizations can develop simple strategies to safeguard data. Start by encrypting your data and requiring two-factor authentication, not on just your customers but ALL your employees. No exceptions! The exception will cause your data breach. It’s critical to perform penetration testing on your applications as well as your networks. Most compromises happen through applications and not accidental exposure of a network service nowadays. Make sure to monitor your data for exfiltration. And, of course, investing in a good vulnerability management program to patch your systems is key for remediation.”


Ram Mohan, Identity Digital

“Protecting sensitive information online begins with robust domain security. Domains, as the primary entry points to the internet, are constantly under attack from phishing and impersonation attempts designed to exploit vulnerabilities and undermine trust. A proactive approach is therefore paramount. Proactive measures like those outlined in ICANN’s Security Framework and other collaborative initiatives are essential to defend against these threats. By deploying advanced tools that block risky lookalike domains, we can neutralize malicious activity before it impacts businesses and individuals.

The digital economy’s rapid expansion intensifies the critical need for scalable, reliable, and secure domain infrastructures. Failure to address this need leaves us vulnerable to escalating cybersecurity risks. The migration of crucial domains like .ai to modernized platforms is a vital step in building the necessary resilience. This Data Privacy Week is a stark reminder: inaction is not an option. Let’s commit to building a safer, more trusted internet—before the consequences of inaction become irreversible.”


Shiva Nathan, Onymos

“The majority of technology leaders (84 percent) report they depend on low-code/no-code capabilities provided by SaaS solutions to achieve their application development goals. These solutions absolutely benefit enterprises, but they also introduce a critical issue: ensuring data privacy.

When enterprises work with almost any SaaS vendor, they are required to share their data in exchange for accessing their solutions. This practice enables those SaaS vendors to leverage that data for their own benefit. This has become standard practice. What is often overlooked is that this exposes SaaS customers — and, in turn, their own customers — to significant risks. We are entrusting our data to black boxes. These are honeypots for bad actors. Just look at what happened with Change Healthcare earlier this year, the largest healthcare data breach ever.

As we recognize Data Privacy Week and Data Privacy Day this year, we in the technology industry must take a serious look at our data privacy and security practices. Our current practices are no longer acceptable. We must find a way to preserve the integrity of our data and that of our customers while still enabling all of us to innovate quickly. One way we can do that is by employing no-data architecture principles, where SaaS companies build products that don’t capture or store their customers’ data.”


Karl Bagci, Exclaimer  

“As Data Privacy Day approaches, it’s a timely reminder that security must be an intrinsic part of any technology strategy, not an afterthought. The rise of ‘Bring Your Own AI’ models and interconnected tech ecosystems has introduced incredible efficiencies but also heightened security risks.
Protecting data now requires a shared responsibility model where companies work closely with their vendors to ensure rigorous encryption, real-time monitoring, and strict access controls.
The stakes couldn’t be higher: reputational damage from a single breach can ripple through an entire ecosystem, undermining customer trust and financial stability.
To meet these challenges, organizations must embrace security as a foundational principle, embedding it into every stage of development. This proactive approach not only mitigates risks but also sets a new standard for customer trust and operational resilience.”

Candice Frost, Nightwing

“In 2025, protecting data from the digital footprints left on the floor of the internet landscape remains a challenge, especially as we witness significant changes worldwide in data protection laws and AI regulation.

That said, while complete data protection may not be possible, there are steps businesses can take to proactively plan and create an established defense. First, evaluate what is exposed and where the location of risks to information is. The knowledge of what is at stake and where risks exist helps to mitigate vulnerabilities. Second, guard data through services that offer traffic monitoring, protection specific to the application or work at hand, and the ability to reach back to a response team that fortifies data. Third, create a response strategy. Thinking through the identification, mitigation, and recovery coordinates in advance is the best path to move forward from possible data loss. Fourth, share the game plan with trusted partners to assist in garnering the confidence of others in the handling of data. Lastly, learn from any data loss event to increase privacy in the future.

By collecting only essential data and designing with privacy in mind at every stage of development, all stakeholders will be able to better protect their own data. Implications of customer-centric privacy policies are a significant differentiator in a crowded marketplace. Embracing the challenges of compliance provides a competitive advantage to those businesses demonstrating privacy as a bedrock of their business strategy.”


Chris Montgomery, Commvault

“Each Data Privacy Week, the core theme remains the same: cyberattacks are not only increasing in volume but are also becoming more sophisticated. In fact, the average organization saw approximately eight cyber incidents in 2024. Since attacks are clearly inevitable, it is no longer enough to only invest in solutions that proactively ward off these threats. All enterprises must invest in cyber resilient solutions that prioritize recovery, so business operations can resume quickly following an attack, with limited downtime, financial burdens, reputational damage or worse.

This supports the ultimate business goal of becoming a minimum viable company or having the ability to maintain essential operations and services even in the event of a breach. Cyber criminals have gotten smarter about finding ways to break into traditional backups, often making them unusable, so this is a critical piece of the puzzle.

This is only part of the equation. Each organization needs several layers of defenses to maintain resilience against today’s complex cyber threats. By starting with solutions that arm businesses with an active defense against intrusions to recover rapidly and accurately when an attack does happen, you’re set up for success.”


Lamont Orange, Cyera

Protecting consumer data is no longer just a best practice—it’s a business imperative. With increasing data collection and new regulations on the horizon, organizations must move beyond traditional methods like encryption and audits. While these are critical, businesses face heightened risks from third-party vulnerabilities and supply chain threats that expose sensitive information to bad actors.

In light of evolving laws and a growing emphasis on consumer privacy rights, companies must adopt a proactive, privacy-by-design approach—ensuring robust vendor oversight, continuous risk assessments, and a culture of accountability. The organizations that treat data privacy as an ongoing commitment will not only stay ahead of new regulations but also build lasting trust with customers. The future of business depends on secure data.”


Idan Plotnik, Apiiro

AI has taken the world by storm, and with it, data holds immense value as the organizational currency. AI has transformed not only how we interact with each other, but also how organizations develop software and build applications, inadvertently creating new challenges around data privacy. As AI accelerates the velocity of coding and design, organizations increasingly become the culprits of new AI-driven risks. To build trust and ensure security, organizations must prioritize a baseline of data privacy from the start. The solution lies in embedding privacy and security measures early in the development process, preventing potential issues before they take root.”


Jim Flynn, CivicPlus

“As we observe Data Privacy Day, it’s crucial to recognize the growing cybersecurity challenges faced by local governments, as ransomware, data breaches, and phishing attacks continue to be daily concerns. Local governments, often holding sensitive resident data, are prime targets for cybercriminals seeking financial gain or causing disruption because if they are successful, they will obtain unauthorized access to sensitive resident data and have the ability to impact large groups of people. Moreover, with the rise of sophisticated malware and AI-driven attacks, criminals are able to launch more evasive and damaging attacks, meaning the security landscape becomes even more volatile.

With human error accounting for 95 percent of breaches, it is essential that both local governments and their residents take steps to safeguard their data. For local governments, regular staff training on secure data handling practices is vital, as is investing in robust cybersecurity measures and comprehensive incident response plans. Additionally, residents need to be educated on best practices to protect their data and avoid human error, so local governments need to share this information as well as work with technology providers to mitigate the risk of attacks.  As cyber threats evolve, fostering a culture of cybersecurity awareness and investing in advanced security tools will be key to safeguarding government data and maintaining public trust.”


Brett Wujek, SAS

Expect synthetic data to become more mainstream this year. Organizations need data to feed AI. However, very often organizations are restricted from using the data for AI development because of privacy issues. With synthetic data generation techniques, privacy concerns can be avoided by generating highly representative data that cannot be traced back to the real data. Moreover, synthetic data can be used to attain balance among all represented groups, which is critical to ensuring AI models are fair and unbiased.” 

The post Data Privacy Day 2025: Insights from Over 60 Industry Experts appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
The 7 Best Data Protection Officer Certifications Online for 2025 https://solutionsreview.com/backup-disaster-recovery/the-best-data-protection-officer-certifications-online-to-consider/ Wed, 01 Jan 2025 21:52:42 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=4381 The editors at Solutions Review have compiled this list of the best data protection officer certifications online to consider acquiring. Data protection is a broad field encompassing backup and disaster recovery, data storage, business continuity, cybersecurity, endpoint management, data privacy, and data loss prevention. Data protection software becomes more crucial as the amount of data […]

The post The 7 Best Data Protection Officer Certifications Online for 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>

The editors at Solutions Review have compiled this list of the best data protection officer certifications online to consider acquiring.

SR Finds 100x100Data protection is a broad field encompassing backup and disaster recovery, data storage, business continuity, cybersecurity, endpoint management, data privacy, and data loss prevention. Data protection software becomes more crucial as the amount of data an enterprise creates and stores continues to grow at ever-increasing rates. The primary goals of a comprehensive data protection strategy are to ensure data privacy and to enable organizations to quickly restore their data after experiencing a disaster. 

With this in mind, we’ve compiled this list of the best data protection officer certifications from leading online professional education platforms and notable universities. The certifications listed offer students the training they need to develop new skills and advance their careers. This is not an exhaustive list, but one that features the best data protection officer certifications online from trusted institutions. We made sure to include certificate descriptions and Solutions Review’s take on each.

The Best Data Protection Officer Certifications

TITLE: IBM Cybersecurity Analyst Professional Certificate

OUR TAKE: This beginner-level program takes approximately eight months to complete at a pace of four hours per week. This training is a good fit for people entering the workforce, as well as professionals switching careers.

Platform: Coursera

Description: A growing number of exciting, well-paying jobs in today’s security industry do not require a college degree. This 8-course Professional Certificate will give you the technical skills to become job-ready for a Cybersecurity Analyst role. Instructional content and labs will introduce you to concepts including network security, endpoint protection, incident response, threat intelligence, penetration testing, and vulnerability assessment.

GO TO TRAINING

TITLE: Introduction to Cybersecurity Nanodegree

OUR TAKE: Before enrolling in this program, students should have a basic knowledge of network connectivity and OS fundamentals. At a pace of 10 hours a week, it will take about four months to complete this nanodegree.

Platform: Udacity

Description: Take your first step toward a career in cybersecurity and learn the skills required to become a security professional with the Introduction to Cybersecurity Nanodegree program. In this program, you will learn how to evaluate, maintain, and monitor the security of computer systems. You’ll also learn how to assess threats, respond to incidents, and implement security controls to reduce risk and meet security compliance goals.

GO TO TRAINING

TITLE: Security Engineer Nanodegree

OUR TAKE: Prerequisites for this nanodegree include the basics of Python and experience configuring AWS and Linux environments. In addition to training, this program offers real-world projects, technical mentor support, and career services.

Platform: Udacity

Description: You’ll master the foundational skills necessary to become a successful Security Engineer. This program will focus on how to protect a company’s computer systems, networks, applications, and infrastructure from security threats or attacks. This course introduces the fundamental concepts and practices of security engineering. These are the basic principles and properties a security engineer will apply when evaluating, prioritizing, and communicating security topics. Additionally, you’ll learn about the practical applications of cryptography. You will also learn about strategies for risk evaluation, security review, and audit.

GO TO TRAINING

TITLE: Security Analyst Nanodegree

OUR TAKE: Before enrolling in this program, it’s recommended that students have experience with Python, SQL, security fundamentals, database design, and networking and operating systems. At a pace of 10 hours a week, students will complete this nanodegree in about four months.

Platform: Udacity

Description: You’ll master the skills necessary to become a successful Security Analyst. Learn to identify, correct and respond to security weaknesses and incidents. Plus, get hands-on experience monitoring network traffic, analyzing alert and log data, and following incident handling procedures. You will begin your exploration into the role of a security analyst. You will learn about the core principles and philosophy that drive work in the security field. Then, you will discover physical, logical and administrative controls, their industry-recognized frameworks, and how to apply them to secure a network, system, or application. Lastly, you will apply security concepts to create defensible, resilient network architecture.

GO TO TRAINING

TITLE: Become a Data Architect Nanodegree

OUR TAKE: Students should have intermediate Python and SQL experience, as well as basic ETL and Data Pipeline experience before enrolling in this program. At a pace of 5-10 hours a week, it will take an estimated four months to complete this nanodegree.

Platform: Udacity

Description: In this program, you’ll plan, design, and implement enterprise data infrastructure solutions and create the blueprints for an organization’s data management system. You’ll create a relational database with PostGreSQL, design an Online Analytical Processing (OLAP) data model to build a cloud-based data warehouse, and design scalable data lake architecture that meets the needs of Big Data. Finally, you’ll learn how to apply the principles of data governance to an organization’s data management system.

GO TO TRAINING

TITLE: Cyber Security Expert Master’s Program

OUR TAKE: This Simplilearn master’s program features more than 160 hours of applied learning, including 64 hours of e-learning content, and lifetime access to self-paced videos and class recordings.

Platform: Simplilearn

Description: The Cyber Security Expert Master’s Program will equip you with the skills needed to become an expert in this rapidly growing domain. You will learn comprehensive approaches to protecting your infrastructure, including securing data and information, running risk analysis and mitigation, architecting cloud-based security, achieving compliance, and much more with this best-in-class program.

GO TO TRAINING

TITLE: Master’s Degree in Cybersecurity

OUR TAKE: This program from edX, in partnership with Georgia Tech, requires a Bachelor of Science from an accredited institution in Computer Science or Computer Engineering, as well as a solid understanding of computer science fundamentals.

Platform: edX

Description: Cybersecurity isn’t just about keeping your individual computers and devices safe, it’s about safeguarding our society and our world. Whether that’s from rogue criminals and gangs who want to steal your money or identity, or nation-states and terror groups who want to disrupt defense systems, elections, or cripple our energy infrastructure, the need for well-trained cybersecurity professionals who can stop these attacks has never been greater. Georgia Tech’s OMS Online Master of Science in Cybersecurity is the only interdisciplinary degree in cybersecurity from a U.S. News & World Report Top 10-ranked public university that you can earn online, on your own schedule, for tuition less than $10,000.

GO TO TRAINING

NOW READ: The 7 Best Udemy Courses for Data Protection Officers to Consider for 2021

Download link to Data Protection Vendor Map

Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.

The post The 7 Best Data Protection Officer Certifications Online for 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
The 6 Best Data Center Courses on Udemy to Consider for 2025 https://solutionsreview.com/backup-disaster-recovery/the-best-data-center-courses-on-udemy/ Wed, 01 Jan 2025 21:04:20 +0000 https://solutionsreview.com/backup-disaster-recovery/?p=4501 The editors at Solutions Review have compiled this list of the best data center courses on Udemy to consider taking. Data center professionals are sidled with a large responsibility. Knowing how to keep an organization’s data center secure and operating smoothly is critical. Without proper training and knowledge of how to operate and maintain a […]

The post The 6 Best Data Center Courses on Udemy to Consider for 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>
The 6 Best Data Center Courses on Udemy to Consider for 2021The editors at Solutions Review have compiled this list of the best data center courses on Udemy to consider taking.

SR Finds 100x100Data center professionals are sidled with a large responsibility. Knowing how to keep an organization’s data center secure and operating smoothly is critical. Without proper training and knowledge of how to operate and maintain a data center, IT professionals can leave their business vulnerable to a host of issues, including ransomware attacks, power outages, natural disasters, and more.

With this in mind, we’ve compiled this list of the best data center courses on Udemy if you’re looking to grow your skills for work or play. Udemy is one of the top online education platforms in the world with more than 130,000 courses, expert instruction, and lifetime access that allows you to learn on your own schedule. This list of the best data center courses on Udemy below includes links to the modules and our take on each.

Note: Courses are listed in no particular order.

The Best Data Center Courses on Udemy

TITLE: Cisco Nexus & UCS Manager Data Center Lab Course

OUR TAKE: This course will give students exposure to CCNA Data Center 200-150 DCICN Nexus Labs and show them how to analyze and troubleshoot problems with Cisco Data Center devices. The class from Veyhurdam Dikmen also boasts a 4-star ranking and requires some basic networking experience.

Description: Welcome to Cisco Nexus & UCS Manager Data Center Lab Course Cisco Data Center Networking Nexus UCS Manager Labs Course DCICN. In this course you will learn how to perform necessary configurations for Cisco Nexus & UCS Manager and important and useful subjects for your profession.

GO TO TRAINING

TITLE: Data Center Essentials: General Introduction

OUR TAKE: This course from John Peterson touts a 4.6 rating and has been taken by over 2,800 students.  Peterson provides an overview of the different types, sizes, and priorities of data centers, as well as supporting equipment, systems, and controls.

Descriptions: Learn the basics to enter into the world of data centers, the fastest growing sector in the design and construction industry. By the end, you will know the lingo and more about data centers than 90% of those in the industry… Our digital footprint grows phenomenally every year and that data passes through, is stored and processed by the contents of these largest of energy-intensive buildings on the planet. This course is intended to give you a jump start into the world of data centers.  We will cover the many standards, terminology, and acronyms used when talking and walking through these mission-critical facilities.

GO TO TRAINING

TITLE: CCNP Data Center -350-601 DCCOR Implementing and Operating

OUR TAKE: This course from Ratnesh Kumar provides students with 26 hours of on-demand video and three downloadable resources. Before taking this class, students should be familiar with Ethernet and TCP/IP networking, SANs, and Fibre Channel protocol.

Description: The Implementing and Operating Cisco Data Center Core Technologies (DCCOR) course helps you prepare for the Cisco® CCNP® Data Center and CCIE® Data Center certifications for advanced-level data center roles. In this course, you will master the skills and technologies you need to implement data center compute, LAN, and SAN infrastructure. You will also learn the essentials of automation and security in data centers.

GO TO TRAINING

TITLE: Data Center Essentials: Power & Electrical

OUR TAKE: This course is a continuation of John Peterson’s Data Center Essentials series. This class focuses on the basics of data center electrical and power systems, including redundancy concepts for electrical distribution and equipment.

Description: In this course, we dive more deeply into the electrical and power systems and components that support data centers.  With data centers using about 5% of the world’s energy and growing, these power systems are ever-expanding and improving.  With the internet expected to be an essential part of our lives, the electrical infrastructure supporting the data centers that power the internet are becoming more essential to understand and support.

GO TO TRAINING

TITLE: iPexpert’s CCNA DCICN Data Center Course

OUR TAKE: This nearly 18-hour long course aims to provide students with an understanding of the topics in the CCNA DCICN Data Center certification. Students should note that a basic understanding of networking terms and command line coding is recommended before taking this course, but not required.

Description: iPexpert’s Cisco CCNA Data Center Course is a modular video course that’s been built by creating very focused videos for every topic seen on the CCNA DCICN Data Center exam, 640-911. Delivered in crystal clear high-definition format, watch and listen along as 2 world-class CCIE instructors whiteboard and configure these various technologies and protocols. This course offers the information you need to get you on your way to CCNA success!

GO TO TRAINING

TITLE: Data Center Essentials: Mechanical & Cool

OUR TAKE: This 4.7-star rated course in John Peterson’s Data Center Essentials series delivers an introduction to data center cooling, as well as an understanding of mechanical and plumbing systems. Students will also gain an understanding of what factors impact cooling design.

Description: In the next section of the Data Center Essentials courses, we cover the mechanical cooling systems that support data centers and prevent them from overheating.  As the data center power and density has increased every year, the need to remove the heat generated has become a more important factor for the design and operation of the facility… We will start with the common terminology, standards, guides and operating conditions for data centers before moving on to more complex components, operations, and controls.  And whether you are walking through a data center every day or only once in a while it is important to understand how the cooling and mechanical systems are operating to keep the internet up and running.

GO TO TRAINING

Download Link to DRaaS Buyer's Guide

Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.

The post The 6 Best Data Center Courses on Udemy to Consider for 2025 appeared first on Best Backup and Disaster Recovery Tools, Software, Solutions & Vendors.

]]>