Sunday, June 3, 2012

Managing Portable Storage Security in a Small Buisness Environment

Here is another paper I wrote regarding security issues in very small businesses, also called Micro-business. The issues revolve around controlling use of portable media, especially Flash memory drives. While large businesses have teams to regulate the use of portable storage, small businesses do not have that luxury.

Later posts will explore the role of these flash drives in the spread of the Stuxnet virus that is purported to have caused major damage to Iran's nuclear capabilities, but the threat to small business can destroy them just as easily. 
 
See the "Hello" post for an explanation of what this blog is all about. Click the navigation link at the right.


Please comment and let me know what you think of the articles and the purpose of the blog itself.

The pdf is at:
Managing Portable Storage in a Small Business Environment



MANAGING PORTABLE STORAGE SECURITY

Portable storage has been around since the very first personal computers. The original portable storage was actually cassette tape. This was soon replaced by the 5 ¼ floppy disks, with a whopping capacity of 360KB. That’s 360,000 bytes. A single digital photograph today, even in its smallest form, is larger than that. A 32 gigabyte “flash” drive, no larger than a pen, can be purchased for $80. A 500GB portable hard drive, about the size of a paperback book, can purchased for $120. 

The purpose of this paper is to explore the explosive growth in portable storage, the benefits and dangers of using them and how they can be managed in a small business environment. 

What is a Small Business?         
          For the purposes of this paper, we will be considering very small businesses and entrepreneurs. There are many definitions of small business, based on revenue levels, or based on number of employees.  Here we are talking ‘very’ small business, sometimes called ‘Micro” business. These businesses have fewer than 10 employees and the majority are individual entrepreneurs, also known as nonemployers.

According to the US Census Bureau, in a 2002 study, “About three quarters of all U.S. business firms have no payroll. Most are self-employed persons operating unincorporated businesses, and may or may not be the owner's principal source of income. Because nonemployers account for only about 3.4 percent of business receipts, they are not included in most business statistics, for example, most reports from the Economic Census. Since 1997, however, nonemployers have grown faster than employer firms.” (US Census Bureau, 2003)
 
          Of the total of over 23 million firms in the US in 2002, there were 17,646,062 firms considered “nonemployers” . These are your classic, one person entrepreneurial firms.  In addition, there were 3,706, 410 firms with fewer than 10 employees. This is the micro business sector. 

Growth of Portable Storage
          As was mentioned earlier, the first portable storage was cassette tape. This was followed by floppy disks, CD’s, DVD’s, flash drives, and portable hard drives. Capacity has grown exponentially. As each new media type is introduced the cost of the previous type falls dramatically.
                                                    
          Costs have fallen so rapidly that the media itself is disposable. A good example of this is the use of rewritable CD’s (700mb)and then rewritable DVD’s (4.2gb) for data backup. When first introduced, CD-R media was priced at over $2 per disc. To save on disc costs, re-writable CD's were recommended on a rotation. These discs could cost as much as twice as much as single write disc, but could be reused several times. Backup processes were written with rotation schedules to reuse these discs, as the most cost effective method. As writable DVD’s were introduced for storage, CD prices dropped dramatically. CD-R's can now be had for as little as $.12 each.  Using rewritables was no longer cost effective as it took more effort (and payroll dollars) to manage the rotation then it was worth. The end of the rotation scheme was changed to ‘destroy and dispose’.  It didn’t take very long for DVD’s to follow suit and now DVD-R’s are only $.19 each.
USB ‘Flash’ drives are following suit in price declines, although they are not a preferred backup medium. USB portable hard drives are used for backup purposes and their cost per gigabyte, now as low as $.09/GB, continues to decline as capacity continues to skyrocket. 

Benefits of use

What are the benefits of portable storage? The obvious answer is that it is portable. But portable is relative. The first portable hard drives were the size of a brick, required external power and were susceptible to vibration and the environment (heat). Today’s portable drives are powered through the USB port on the host machine, are about the size of a thin paperback book and have shock resistant mountings. CDs and DVDs can be easily transported and stored in small spaces offsite, compared to data tapes. Even more portable are USB “flash” drives. They provide convenient transfers and allow employees to take their work anywhere. They are also good for convenient quick backup and instant offsite storage. CDs and DVDs can be easily transported and stored in small spaces offsite, compared to data tapes

Dangers of use

Many of the same factors that create the benefits of portable storage create danger as well. The small physical size of these devices, especially flash drives, make them easy to lose or steal. While portable hard drives and backup disks (CDs or DVDs)
have similar dangers and consequences and should not be ignored, the focus of the remainder of this paper will be on USB Flash drives. 

According to a white paper by Sandisk Corporation, “We are in the midst of a data leakage epidemic:” “Data leaks most commonly occur when employees take work with them on a laptop or a flash drive, only to lose the device or have it stolen.”  (SanDisk Corporation, 2008)
The largest problem for small businesses is that they don’t know they have a problem. Flash drives are so inexpensive, employees typically have a personal drive they use for mixed purposes to carry business information home and to keep the little league schedule on at the same time. This mixed use exposes the business to the threat of transmitting viruses and malware from personal machines at home to the machines at the office.

In the same whitepaper, Sandisk lists the consequences of accidental and deliberate data leaks.

·         Theft of intellectual property, trade secrets, or proprietary information
·          Loss of confidential business plans and road maps, resulting in the potential loss of sales or first mover advantage
·         Failure to comply with industry and federally mandated standards for data auditing and safekeeping, such as Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach-Bliley Act (GLBA),
·         Sarbanes Oxley (SOX), the PCI Data Security Standard, and Federal Information Processing Standards (FIPS)
·         Loss of employee data, possibly resulting in legal liability
·         Potential criminal charges when data leaks violate state or federal law
·         Irreparable damage to the organization’s public  (SanDisk Corporation, 2008)
Symantec’s Internet Security Threat Report for 2008 showed “Although laptops and other storage devices, such as USB memory keys, portable hard drives, and disks,
have become smaller, less expensive, and easier to use, their compact size and larger storage capability has increased the opportunity for theft, loss, or misplacement, as well as the potential amount of information breached; a single DVD disk can contain personal information on millions of people. In a recent survey, one in 10 people have lost a laptop, smart phone, or USB flash drive with corporate information stored on it.” (Symantec Corporation, 2009)
In a paper discussing the costs of security for small business, Dennis Bliss lists a few assumptions about the extent of the problem:
·  Using a conservative estimate of 40%, we can assume that 1,485,200 of
these small businesses have networks which are connected to the
Internet. Of these, we can further estimate that each of these networks
has at least 2 devices (computers, printers, etc.). Upon mathematical
projection, this establishes that there are nearly 3 million devices
connected to the Internet by very small businesses which are potential
targets of attacks.
·  Many of the computer systems used by these businesses are quickly
thrown together in rudimentary networks and connected to broadband
Internet connections, with little to no thought given to securing them.
·  Due to the relative newness of computer and networking technologies,
most small business owners and their employees have a very limited
knowledge of securing these networks.
·  Funding for computer and network security usually receives a low
priority when ranked against other technical and non-technical small
business needs. (Bliss, 2003)
While most small business owners agree that their networks should be secure,
many of these managers feel the task may be beyond their reach. Caught up
with the daily tasks of trying to make their business successful, some simply cross their fingers and hope for the best.
Each business is different and must assess how critical data is.
·         Can the company afford to lose or give away your client list or employee or accounting data?
·         Can the company afford the legal consequences of data leakage?
·         Would the company be embarrassed by the disclosure of your business plans?
Large corporations and medium sized businesses have written policies regarding the use of portable storage devices. In addition, they have technical know how to restrict the use of these devices on company networks to protect critical data. Most
small businesses do not have those capabilities. There are several lists of “Best Practices” regarding portable storage or “Endpoint Security”.  Endpoint security refers to security measures necessary to protect devices on the fringe of company networks. The devices that are exposed to outside forces and threats.
At least one of those suggests Restricting portable storage is a bit more difficult from a policy perspective yet easy from a technology perspective. Many employees need use of portable storage for normal job activities, such as a sales representative exchanging documentation or transferring a presentation. Simply locking out portable storage (or encrypting files) may not be acceptable” (Gartner, Inc, 2006). This is especially true for small businesses. Each business owner must access what level of security is acceptable and make an informed decision. “The cost-benefit case for mobile devices depends solely on the value of the corporate data at risk. Therefore, critical data must be inventoried and the appropriate security solutions implemented”  (Patricia Mayer Milligan, 2008)
So, how do they manage portable (or removable) storage in a small business?

Awareness education

          The first step in addressing management of portable storage is being aware of the issues of using such devices. Once management is aware and has agreed action is necessary, policies need to be prepared and an education plan should be developed. Communications in small businesses tend to be informal and information is often communicated verbally. This however is one time when a written policy is necessary to protect the data, the employees, and the company itself. Even if it is a sole
proprietorship, the policy should be written out for protection in case of a legal challenge to data leakage. 

          In regard to security awareness for Personal Computing Devices (PCDs), First Base Technologies says “ users should be made aware of the security risks surrounding using and carrying PCDs  and external memory;” (USB Flash drives) “They should be educated as to the value of data – many personnel just don’t think about the value or significance of the data they are carrying, if they did, they would probably instinctively take more care.” (Barnes, 2003)

An article on the SANS reading room website said “The primary objective of a security awareness program is to educate users on their responsibility to help protect the confidentiality, availability and integrity of their organization's information and information assets. Information security is everyone’s responsibility, not just the IT security department. It is critical that users understand not only on how to protect the organization’s information, but why it is important to protect that information. “People are
often the weakest link in a security chain, because they are not trained or generally aware of what security is all about. (Russel, 2002)
            Another SANS Institute article said “The properly trained user can provide a very strong first line of defense for any network and usually provides the small business owner with the biggest bang for the buck as far as defense methodologies go. Since they are working with the network resources on a daily basis, they are in the best position to recognize a potential attack and stop it in its tracks.” (Bliss, 2003)
Identify
          To protect what you have, you have to know what you have. The next step is to take inventory. Hopefully the business know what computer equipment is on site, but desktop computers are moved from employee to employee and then retired to the back room. A full accounting of all computer equipment is necessary to begin a good security assessment. The items of greatest concern are the items that are considered portable. Laptops, portable hard drives, and company owned USB drives. This inventory should include locations of backup storage, both onsite and offsite.

          An important point here is what company assets are being used. Employees should also be asked what personal equipment they are using for business purposes. A determination will have to be made regarding use of personal equipment later in the process.

Developing Policies

This may be the most difficult part of the process. The business owners must decide how much security they are willing to pay for. They must be aware there are legal considerations to developing policy and some level of security is required. New regulations are coming as well. If the company does any government contract business, it is subject to additional rules and regulations. In a recent announcement NextGov.com, a website covering technology changes in government  said  “A federal interagency group responsible for data encryption policy and acquisition efforts is considering changes to existing technology contracts to incorporate tougher security requirements for removable storage devices such as thumb drives and handheld devices, a Defense Department program manager confirmed on Thursday. A list of approved removable storage products that meet minimum security standards should be released to agencies any day, according to a source in the federal information technology industry.

            There are several regulations that effect the storage and movement of data. Sharon Harris provides the list below:
    • Health Information Portability and Accountability Act (HIPAA)
    • Personal Information Protection and Electronic Documents Act (PIPEDA)
    • Gramm-Leach-Bliley Act (GLBA)
    • California Senate Bill 1386
    • Sarbanes-Oxley Act (SOX)
    • SEC Rule 17a  (Harris, 2006)       
The policies developed need to address usage of company equipment for business use as well as personal equipment used for business purposes. There should be a notification procedure in case of loss or theft. The procedure should encourage prompt reporting of losses, and replacement drives should be available. There should be a reward, rather than a punishment for reporting a missing drive promptly. Better to know data is exposed than censure an employee for misplacing a drive. This is subject to management discretion and multiple occurrences would have to be dealt with individually.

Implementing policies

Personal USB drives should be prohibited or severely restricted. Company owned drives with the proper encryption and antivirus/malware protections should be purchased and made available to all employees. This will reduce the temptation to use personal drives. While flash drives with encryption and built in virus/malware protection are sold today at a small premium over consumer products, the cost will continue to fall as onboard encryption become the standard. All forms of portable storage should be addressed and similar policies can be easily extended to USB hard drives, although their use should be on an as needed basis rather than a drive for everyone.

The need for written policies, even in informal organizations was mentioned earlier. The key here is follow awareness education and acknowledgement. The policies must be circulated to all employees and a brief training session can be developed to introduce the policies and obtain employee sign off that they have received and understood the policies and their purpose. This may prevent legal challenges in the future. 

 Conclusion

          Micro businesses have a unique set of challenges when it comes to managing any part of their Information Technology environment, especially in terms of security. They do not have the luxury of having dedicated staff and employees must assume multiple functions for the business to succeed. In the case of the non-employer Entrepreneur, they assume all the roles. Technology skills may not be anyone’s strong suit. 

          Removable storage is inexpensive and very portable, getting smaller (physically) and increasing data capacity almost daily. With the rise in data leakage, business owners must be more aware of the dangers potential legal consequences of ignoring the risk.
Establishing and communicating a strong usage policy and providing company resources in the form of business level USB drives and mitigate the risk. Periodic review and refresh session should be conducted at least annual and new employees must at least read and sign an acknowledgement of the policy as part of their employee orientation.    

Bibliography

Aitoro, J. R. (2009, January 29). Tougher security standards coming for removable storage devices. Retrieved from nextgov: http://www.nextgov.com/nextgov/ng_20090129_9364.php

Barnes, D. (2003, September 16). Portable Computing Device Security. Retrieved from First Base Technolgies: http://www.fbtechies.co.uk/Content/Extras/Resources/WP-PortableComputingDeviceSecurity.pdf

*Bliss, D. (2003). Security for the Small Business- At What Cost. Retrieved from GIAC Practical Repository: http://www.giac.org/certified_professionals/practicals/GSEC/2947.php

Gartner, Inc. (2006). Top Five Steps to Prevent Data Loss and Information Leaks. Gartner, Inc.

Harris, S. (2006, July 13). How to Create guidelines for using removable storage devices. Retrieved from SearchSecurity.com:
\http://searchsecurity.techtarget.com/expert/KnowledgebaseAnswer/0,289625,sid14_gci1214188_mem1,00.html

*Patricia Mayer Milligan, P. a. (2008). Business Risks and Security Assessment for Mobile Devices. Information Systems Control Journal , 1-5.

Russel, C. (2002, October 25). Security Awareness - Implementing an Effective. Retrieved from SANS Reading Room.

*SanDisk Corporation. (2008). Plugging the Leaks:Best Practices in Endpoint Security.

*Symantec Corporation. (2009). Symantec Global Internet Security Threat Report Trends for 2008, Volume XIV. Symantec Corporation.

US Census Bureau. (2003). Statistics about Business Size (including Small Business).






Sunday, May 20, 2012

First Paper - Data Disrespect

Please see the "Hello" post for an explanation of what this blog is all about. Click the navigation link at the right.

Here is the first paper I wrote for my graduate degree. The overall concept is that space for data is too cheap and users don't manage data storage space safely.

Let me know what you think.

The pdf is at:

DataDisrespect.pdf


DATA DISRESPECT
Statement of the environment
To paraphrase the comedian Rodney Dangerfield, “Data gets no respect, no respect at all.” By disrespect I mean data backup, security, and storage management issues are largely ignored by micro business users. There is a corollary to Parkinson’s Law that says, Data expands to fill the available space. The expansion of storage capacity and data to fill it is the source of this disrespect,
We will explore the rapidly falling price of data storage in a very short amount of time and the just as rapid change in storage methods, from the soft floppy disks of just a few years ago, to multi-Terabyte hard drives of today. The consequences of these changes and dangers are not recognized by most micro business mangers. We will conclude with a data management methodology, scaled down from “big” business, but still understandable, manageable, and probably most important, affordable.
What is a Micro Business?
Micro business has many definitions relating to levels of annual revenue, sources of capital and number of employees. For purposes of this article, a Micro Business will be defined as a business with fewer than five employees, five to seven computers, including laptops, and no central server. The majority of such firms are sole proprietors with one or two computers. The key element is the lack of centrally managed data storage. While there may be a network to share Internet access, the employees do not share or store data in a central place, but rather files are kept on each individual’s machine.  Individual files such as spreadsheets and Word documents may be copied over the network, but not to a managed storage area.
The Explosion in Data Storage Capacity
          The first personal computers had crude or no data storage at all. Initial machines used cassette tape systems to record programs, but data was rekeyed with every run of the program. This quickly changed with the advent of the diskette. A portion of our consulting business deals with data conversion from one format or media type to another.  We still have a shrink wrapped box of 5¼ - 3M Brand diskettes (and also have a machine with a disk drive to read them). The formatted capacity of each diskette is 360 kilobytes. A box of 10 diskettes typically cost $20. At that rate one gigabyte (1 billion bytes) of storage would cost $55,555 !!!
           On the website for CDW Corporation (CDW Corpration, 2009), a firm specializing in computer supplies for small and micro businesses, a 1.5 Terabyte disk drive lists for $133. That’s $ .08 per gigabyte. This explosion of capacity at very inexpensive prices is both a benefit and problem for Micro business.
Discussion
          Have you ever lived in a house that has a large basement? Most people ask the question “Is it possible Will I need this item in the future? Maybe.. then put it in the basement.  I’ll clean it out someday.” They take the same approach with data on their computer. Will I ever need this document or spreadsheet?? ..ok, save it to the hard drive. New subdirectories are created. Filenames are reused and confused with names similar ones used before. Performance and efficiency are degraded.
         
Data becomes stale after a period of time, but because the data capacity of current drives is so large, items are kept long beyond their useful lives. The amount of data becomes so large that the task of backing up the data takes longer and longer, if it is done at all.
          To get a perspective on how large these storage places are, see Figure 1

Size            Data File            Photos          Songs         Videos       
                     @100k           @3.5 MB      @4MB       @12GB/Hr 
160 GB     2,500,000            46,000          40,000           13 hrs
320 GB     3,200,000            91,000          80,0000         26 hrs
640 GB     6,400,000           182,000        160,000          52 hrs
1 TB         10,000,000            285,000        250,000         76 hrs
                                                             Figure 1

These capacity numbers are hard for most people to fathom. Can I keep this much data? On a pure data drive, the answer is, Yes. Most single drive machines however will have significant amount of space used for the operating system and program files and reduce the amount of space available for data somewhat.
          The constant increases in available storage capacity causes users to “disrespect” the data they accumulate over time. With the exponential growth in data storage capacity at ever decreasing prices, users treat their important data files like they will always be there for immediate use. A typical laptop today has 160 gigabytes of available storage; desktop systems may have twice that with the potential to add on portable storage devices exceeding two Terabytes.

Dangers  of Disrespect    
Most Micro business owners have heard that they should be backing up their data, but it’s just too much trouble or they don’t have time. But how much time will be lost if the data was not available when the computer does not reboot in the morning or the computer is not there because of a disaster like theft or fire or flood? Disasters come in many forms.
          In a recent survey, 59 percent of IT executives said that the volume of data they have to backup is disrupting business operations or will do so eventually (Backup Data Dogging Business, 2008).  An article in The Information Management Journal refers to a 2002 U.S. Bureau of Labor study showing “93 percent of companies that experience significant data loss go out of business within five years.” (Swartz, 2003).
          It’s not if your hard drive will fail, but when. An article on StorageReview.com said, “The service life of a modern hard disk is usually about three to five years. In my opinion, what the manufacturer is telling you with this number is this: ‘If your drive gives you good service for this length of time without any trouble, you've gotten good value from it and you should consider getting a new drive if reliability is important to you; the drive isn't going to fail the instant it hits this age, but the chances of it failing will increase significantly the longer you use it past this point.”’ (Storage Review, 2005)
A typical emergency call in our consulting business is: “We have a computer in the office that will not start. There is an important file on the computer that we need as soon as possible. Can you help? NOW!”. The question asked is “Do you have a backup?” Ninety percent of the time, the answer is “No,”. In addition to the loss of business while data is being recovered, some micro businesses could be liable for loss of accounting,
tax and employee information, if the data is ultimately lost. Depending on the industry, the business may have email retention requirements as well.
Proposed solutions
          So what can be done to help data gain some respect and control? Large and medium sized businesses have dedicated staff or contract services to manage data backup, retention, and security issues. Micro businesses do not usually have these resources and may not even recognize the need for such services. There must be a awareness campaign to alert micro business owners to the danger to their whole business of not having  a backup plan. Mounting such an awareness campaign has a element of marketing for service providers, but publishing an article such as this can raise that awareness. Micro businesses can learn from larger businesses and develop a mini disaster recovery plan.
          Large firms have dedicated staff to perform nightly backup, do studies to determine data retention polices and insure the hardware is performing or is replaced. The Micro business owner is that staff. They must take a proactive approach to disaster recovery.
          The key to the solution is self-discipline. The consequence of ignoring the problem could end the business. A survey by the National Archives and Records Administration found 50% of businesses that lost data in a disaster and didn’t have a data management plan filed for bankruptcy right away (Lack of Data Backup Leaves Companies Vulnerable, 2006). The survey was referring to natural disasters such as hurricanes and fire, but a hard drive failure on a clear day is still a disaster.
          Independent accountants are a large part of the Micro business population, many of them being sole proprietors. They recognize the importance of data more than most. The following is a computer disaster recovery checklist, published in an accounting
trade magazine, that can be a great start to a mini disaster recovery plan for any business (Computer Backups Checklist, 1994).
1.    Secure computer equipment
2.    Back up data daily
3.    Monitor backup procedures daily to ensure they are strictly followed.
4.    Maintain a current list of hardware and serial numbers as well as software and version numbers.
5.    If employees are allowed to take equipment out of the office, set up and follow a system that tracks usage and returns
6.    Acquire a fire rated file cabinet in which to store and maintain valuable data processing equipment and software
7.    Acquire antivirus software.
          Additional advice is provided from other Data-Disaster Survivors (MaCarthy, 2007)
1. “Subscribe to an offsite, Internet based data backup service” – a word of warning here. While these services are advertised as a simple solution, they should not be used as an exclusive solution. Local backups on physical media, such as DVD may provide immediate availability if your Internet connectivity is interrupted as as result of your “disaster”
             2. “Keep electronic backups off premises.” Find a safe place for these backups. The glove compartment of your car does not qualify. Consider a fireproof safe in the
home of  a designated employee or the owner. Establish a rotation scheme and stick to it. Only bring media back to the office if it is necessary for recovery. Remember, media is inexpensive. Don’t try to use re-writeable media to save a few pennies. DVD’s are the recommended media because of their permanence. Break DVD’s into pieces for final disposal.  A portable hard drive or flash drive is a simple solution, but is prone to the same failure possibilities as the hard drive in your computer.  Yes, flash drives fail too.
          3. “Periodically print a paper copy of client lists.” This extends to other lists that might be appropriate. Consider keeping a copy of the paper lists offsite with your electronic media.  
          4. “Take pictures of your office or store.” This may not be necessary for a hard drive for a hard drive failure, but we are referring to all types of disaster here.

Summary and Conclusion
          Be aware of the problem. It’s all about the data. “Data problems come about when little regard is paid to the consequences of data replication.” (Solomon, 2005)
          Take Inventory. In order to protect what you have, you have to know what you have. This includes hardware and software. For each computer used in the business, there should be a list of brand and model numbers, operating system restore disks (if you don’t have them, use the onboard creation utility or order replacements from the manufacturer), and disks for installed software.
          Large companies have software inventory programs. Use a program like Belarc Advisor (Belarc, Inc, 2009), a PC Audit utility, that will list the hardware specifications and the versions of software loaded. You may qualify for the free version. Be sure to
save printed copies! It does no good to know the inventory program is on the computer, if the computer does not run.
          When you load new software, keep the disks in a secure place. Also keep the disk cases or envelopes, as they frequently have authorization or registration codes necessary for reloading.
          Develop a Plan for disaster and follow it. This is a key point. It doesn’t have to be fancy but it must be written out and thought through. It should be revisited at least once a year for changing circumstances.
          Backup, Backup, Backup. Respect your data. It is your livelihood.
Remember the Ten Commandments of Data Protection (Eckel, 2006)
1.    Start with a written plan
2.    Back up data daily
3.    Properly label backups
4.    Review backup settings
5.    Maintain multiple backups
6.    Ensure that the backup medium is sound
7.    Regularly test backups
8.    House a backup offsite
9.    Don’t overlook security
10. Revisit backup routines
Clean House. Excess data will slow your computer. At least once a year, a thorough review of the data on each drive needs to be performed. A “Spring cleaning” could be scheduled after the annual tax filing process. This is a great time to review
what you need going forward and what can be deleted. A special backup set should be made just before the delete process is started. After backing up data to removable storage, excess data should be deleted. Running the defragmentation utility will reorganize the remaining data for best performance.
Showing respect for the data accumulated during the normal course of business will keep your business going.

            




Bibliography

Backup Data Dogging Business. (2008). The Information Management Journal , 19.
Belarc, Inc. (2009). Belarc Advisor - Free Personal PC Audit (Version 8.1b). Retrieved from Belarc.com: http://www.belarc.com/free_download.html
CDW Corpration. (2009, July). Shop CDW. Retrieved July 2009, from CDW Corporation: www.cdw.com
Computer Backups Checklist. (1994, August). Journal of Accountancy , 86.
Eckel, E. (2006, August 25). The Ten Commandments of Data Protection. Retrieved from InformIT: http://www.informit.com/articles/article.aspx?p=601863
Lack of Data Backup Leaves Companies Vulnerable. (2006, Nov/Dec). Retrieved from BNET The Go-To Place for Management: www.bnet.com
MaCarthy, E. (2007, February). Tech Tools for Disaster Recovery. Journal of Finacial Planning , 28-34.
Solomon, M. (2005, Summer). It's all all about the data. Information Systems Mangement , 75-80.
Storage Review. (2005). Reference Guide - Hard Disk Drives. Retrieved from Storage Review: http://www.storagereview.com/guide2000/ref/hdd/perf/qual/specLife.html
Swartz, N. (2003, November). Survey Reveals Disaster Recovery Expectations and Reality. Information Management Journal , 8.


Thursday, May 10, 2012

Hello

If you have been to college or Graduate School, you know almost every class has a term paper. Many times there is an additional requirement to submit your paper to a journal in an  attempt to get it published in a scholarly journal. Only a few papers are actually accepted and in turn only a few of those are actually read by others. Unless the class uses peer review, the only other person to read the paper will be the Professor.

I intend to publish each paper in two forms. The paper, as submitted for each class will be here as a PDF. I am also going to list the complete text of each paper, reformatted for blog presentation. This will also allow the search engines to see the content of the articles and increase their exposure in search lists, the goal being to get more eyes on the papers.

Feel free to comment on the topics presented. I will attempt to answer any questions and make my own comments to provide updates to some of the topics that have had additional developments since the original article was written.