{"id":2360,"date":"2005-01-24T00:00:00","date_gmt":"2005-01-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/01\/24\/laptop-data-at-risk-vendors-study-finds\/"},"modified":"2021-12-30T11:41:09","modified_gmt":"2021-12-30T11:41:09","slug":"laptop-data-at-risk-vendors-study-finds","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/01\/24\/laptop-data-at-risk-vendors-study-finds\/","title":{"rendered":"Laptop Data At Risk, Vendor&#8217;s Study Finds"},"content":{"rendered":"<p>Data stored by laptops used by employees of small and medium-sized companies are at risk because many of those companies don&#8217;t have procedures in place for that data, according to a study released by backup storage media vendor Imation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the study of about 200 small- and medium-sized business IT managers, 50 percent of those businesses don&#8217;t have a formal procedure in place for backing up enterprise data stored on laptops, Imation said in a statement.<\/p>\n<p>&#8220;As the workforce becomes increasingly mobile, more and more &#8216;mission-critical&#8217; information, such as customer records, sales presentations and company financials, is being stored on laptops putting data at potential risk of loss,&#8221; Brent Ashton, Imation&#8217;s marketing manager for small and mid-sized businesses said in a statement.<\/p>\n<p>About 40 percent of the companies in the survey have what the vendor called an extensive network of laptop computers, but only half of those companies had formalized backup procedures for those laptops, the survey found.<\/p>\n<p>http:\/\/www.mobilepipeline.com\/showArticle.jhtml?articleID=57703148<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-2360","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2360"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2360\/revisions"}],"predecessor-version":[{"id":4847,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2360\/revisions\/4847"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}