
{"id":2912,"date":"2014-10-14T00:00:00","date_gmt":"2014-10-14T00:00:00","guid":{"rendered":"http:\/\/otava.test\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/"},"modified":"2014-10-14T00:00:00","modified_gmt":"2014-10-14T00:00:00","slug":"backing-up-sensitive-data-for-recovery-meet-mr-fips","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/","title":{"rendered":"Backing up sensitive data for recovery? Meet Mr. FIPS"},"content":{"rendered":"<p>In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats. In the healthcare field, for example, losing data is one matter. Not having &#8220;exact retrievable copies,&#8221; as required by law, is another. And protecting those backed up files is equally important.<\/p>\n<p>Healthcare and financial data must be retained for several years, but in many cases companies that handle sensitive data may retain it much longer. This means exponentially more sensitive data being sent offsite for remote backup and archival. Earlier this year, company officials at <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/breach-at-bitly-blamed-on-offsite-backup-storage-provider\/d\/d-id\/1252680\">Bit.ly blamed a breach<\/a> of its customer database on unauthorized access of its offsite backup data maintained by a third-party hosting provider.<\/p>\n<p>Adding one or more remote locations and\/or third parties to your offsite <a href=\"https:\/\/onlinetech.com\/managed-services\/offsite-backup\">backup<\/a> and <a href=\"https:\/\/onlinetech.com\/managed-services\/it-disaster-recovery\">recovery<\/a> strategy complicates your risk profile, but there are a few things to look for that can help you sleep better at night, even if your sensitive data is stored offsite. If you have to meet compliance and security demands, here are three things to incorporate into your proposals and requirements:<\/p>\n<p><strong>1. Visit the physical location of your backup data<\/strong><\/p>\n<p>Even if you are going with a cloud-based or a third party tape or media-based offsite backup solution, it helps to know you can fly, drive, walk and point to your backup data. Not only does this improve your ability to accurately assess the risk to that data while in storage, it also increases the odds that you can get it back in a timely manner if you need it for disaster recovery efforts. Spend the few hundred dollars to go visit the facility, it will be cheaper than sleeping pills in the long run and well worth the peace of mind. There\u2019s nothing that tells you more about the safety of your backup data location than experiencing it yourself.<\/p>\n<p><strong>2. Encrypt with Mr. FIPS<\/strong><\/p>\n<p>Those of you in regulated industries may already know Mr. FIPS, as in FIPS 140-2. If not, please introduce yourself. FIPS 140-2 is a cryptography standard specified by the <a href=\"https:\/\/www.nist.gov\/itl\/fips.cfm\">Federal Information Processing Standard<\/a>, and referenced by NIST (National Institute of Standards and Technology), the government, healthcare and other industries. Why do we care? If you choose an offsite backup solution that embeds one of the validated FIPS 140-2 cryptographic modules, you have a good level of assurance that the sensitive data you\u2019re storing offsite is protected by strong encryption that had been tested and verified by an independent, third party organization. Unless you have time to try breaking the encryption algorithm yourself, go with an approach that someone else has had the time to test.<\/p>\n<p>For healthcare covered entities and business associates, encrypting your offsite backup with a FIPS 140-2 validated cryptography module means that you can prove due diligence to protect patient data in the event it is lost or stolen. In fact, if the patient information has been encrypted in this manner, it\u2019s not considered a data breach. When you compare any investment into using solutions that meet this encryption standard with the costs of data breach remediation including legal, loss of customer confidence, and remediation, it\u2019s an easy investment to make.<\/p>\n<p>In our own case, it was the deciding factor when Online Tech <a href=\"https:\/\/www.onlinetech.com\/news\/press-releases\/2014\/cloud-protects-phi-with-encryption-from-front-end-to-back-up\">chose the encrypted version of EMC\u2019s Avamar technology<\/a> since we serve many healthcare, financial, and eCommerce clients that need to protect sensitive information. This gives us peace of mind knowing we\u2019re protecting our clients data while in-transit and at-rest in our offsite backup.<\/p>\n<p><strong>3. Ask for the audit report<\/strong><\/p>\n<p>Adding a third party or remote location increases the complexity, but doesn\u2019t need to make you less <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/overview\">compliant<\/a> or <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">secure<\/a>. Find a partner with the same approach to compliance and security as your organization. If you are handling sensitive, regulated information, this means that they too, should be getting independent, annual audits. Ask for the audit reports, and read them. They should make sense and leave you feeling reassured. If otherwise, keep looking.<\/p>\n<hr \/>\n<p><strong>RELATED CONTENT<\/strong><\/p>\n<p><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/7-business-and-technical-drivers-of-your-backup-and-recovery-strategy\/\">7 business drivers for your backup and recovery strategy<\/a><\/p>\n<p><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/3-questions-your-cio-needs-to-answer-to-set-your-offsite-backup-strategy\/\">3 questions your CIO needs to answer to set your offsite backup strategy<\/a><\/p>\n<p><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/disaster-recovery?utm_campaign=Backup2014&amp;utm_content=outhouse&amp;utm_medium=OT%20blog&amp;utm_source=blog\" target=\"_blank\" rel=\"noopener noreferrer\">White paper: Disaster Recovery<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats. In the healthcare field, for example, losing data is one matter. Not having &#8220;exact retrievable copies,&#8221; as required by law, is another. And protecting those backed up files is equally important. Healthcare and financial data must be retained for several years, but in many cases companies that handle sensitive data may retain it much longer. This means exponentially more sensitive data being sent offsite for remote backup and archival. Earlier this year, company officials at Bit.ly blamed a breach of its customer database on unauthorized access of its offsite backup data maintained by a third-party hosting provider. Adding one or more remote locations and\/or third parties to your offsite backup and recovery strategy complicates your risk profile, but there are a few things to look for that can help you sleep better at night, even if your sensitive data is stored offsite. If you have to meet compliance and security demands, here are three things to incorporate into your proposals and requirements: 1. Visit the physical location of your backup data Even if you are going with a cloud-based&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2912","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Backing up sensitive data for recovery? Meet Mr. FIPS | OTAVA<\/title>\n<meta name=\"description\" content=\"In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backing up sensitive data for recovery? Meet Mr. FIPS\" \/>\n<meta property=\"og:description\" content=\"In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-14T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Backing up sensitive data for recovery? Meet Mr. FIPS\",\"datePublished\":\"2014-10-14T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/\"},\"wordCount\":706,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/\",\"url\":\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/\",\"name\":\"Backing up sensitive data for recovery? Meet Mr. FIPS | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2014-10-14T00:00:00+00:00\",\"description\":\"In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backing up sensitive data for recovery? Meet Mr. FIPS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Backing up sensitive data for recovery? Meet Mr. FIPS | OTAVA","description":"In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/","og_locale":"en_US","og_type":"article","og_title":"Backing up sensitive data for recovery? Meet Mr. FIPS","og_description":"In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats.","og_url":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/","og_site_name":"OTAVA","article_published_time":"2014-10-14T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Backing up sensitive data for recovery? Meet Mr. FIPS","datePublished":"2014-10-14T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/"},"wordCount":706,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/","url":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/","name":"Backing up sensitive data for recovery? Meet Mr. FIPS | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2014-10-14T00:00:00+00:00","description":"In regulated industries, sensitive data must both be protected and retained, a challenging juxtaposition in a landscape of increasing cybersecurity threats.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/backing-up-sensitive-data-for-recovery-meet-mr-fips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Backing up sensitive data for recovery? Meet Mr. FIPS"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2912","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2912"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2912\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2912"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2912"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2912"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2912"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}