Computer security commands a large amount of discussion time, both on and off the web. Subjects such as identity theft, data compromise and hacker attacks are the topics of discussion around the water-cooler and in corporate boardrooms around the world.
We want our data to be secure. No, we need our data to be secure.
The company documents, credit card information, personal data and photos that reside on our computers must be guarded carefully and handled securely. Furthermore, when our computers have problems and our data becomes inaccessible, we need to know that it can be retrieved safely and securely.
We take security very seriously at The Data Rescue Center. We understand and appreciate the value of your electronic data and we take major precautions to ensure that your digital files are protected while in our possession.
The three major security aspects are...
Personnel and Client Protocols and Procedures
Let’s start with our people first. Because we recover all types of data, from personal photos of grandkids and graduations to classified documents on damaged government-owned computers, we cannot afford, nor do we tolerate risky behavior from our technicians or other employees. Before a potential employee can work for The Data Rescue Center, he or she must pass an extensive employee background check to determine their suitability for work here.
This includes both technical expertise and personal integrity. After the hiring process, each employee is trained in our security protocols and procedures. Any violation or failure to follow protocol is grounds for immediate dismissal.
Continuous Security Monitoring
Our security system is operated by a central monitoring system and is always active, 24/7. The entire facility is only accessible with magnetic key cards. The cards are coded to allow only authorized personnel access to the recovery facility. Furthermore, employees only have access to the specific work areas for which they are authorized. The key cards are encrypted and cannot be copied. Lost or missing cards are immediately removed from the system’s database and deleted cards will trigger an alarm if used.
In addition to the key cards, steel doors and biometric readers protect the higher security levels. Twenty-four RGB infrared surveillance cameras, coupled with twenty-four dual-band and passive infrared motion sensors keep an unblinking, watchful eye over the facility 24 hours a day. The surveillance cameras are high-definition and are suitable for face recognition in any light and under any condition. The combination of HD cameras and motion sensors allow immediate evaluation of any potential security threat.
Facility Strength and Data Security
When you send in your hard drive or computer to The Data Rescue Center, it is secured in a Class 2 UL-listed vault for safekeeping, while not in active recovery. The concrete and steel construction blocks any wireless monitoring possibilities. Additionally, there are no outside network connections, further increasing data security. The vault is similar to a bank vault, only much more secure. With a time-controlled lock and impact resistant inner day doors, data storage devices cannot be removed from the vault without supervision and authorization.
The inner vault and cleanroom are protected from fire by a pentafluoroethane gas fire-suppression system. The system will not damage the electronics of the data storage devices. It will suppress the fire in 30 seconds or less and the room may be entered within ten minutes for inspection and evaluation. No trace of the fire retardant is left after the incident; therefore, cleanup is not necessary.
All data recovery is done on offline servers and equipment so that no possibility of attack from the internet or network is possible.
As is clearly seen from the above, The Data Rescue Center takes the safety and security of your data very seriously. Recovering your data is important. Keeping it secure from damage and theft is just as important.