Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

How to Stop Document Disasters

By Stephen Hoey
July 1, 2008
Chief security officers, often working with their legal counsel, need to protect paper-based documents.


“Every enterprise should include backup for paper documents as well as computer documents,” advised Stephen Hoey.

Are you prepared for a disaster that could cripple your facility? According to the Department of Labor 93 percent of businesses that experience a disaster go out of business within 5 years. By implementing a “simple” plan you can increase your chances of being in the 7 percent that survive. Of companies that suffer a major loss of computerized records, 43 percent will never reopen, 51 percent will close within two years and only 6 percent will survive long-term, according to a study by Cummings, Haag & McCubbrey.

Of course, for facilities and enterprises that get hit by disaster the picture is even worse since most don’t even have the “luxury” of closing operations during recovery.

So where do you start? Begin with a very basic, three step disaster recovery plan.

STEP 1. PLAN

Be sure you backup all of your data, delegate responsibilities in case of an emergency or disaster and have some sort of continuity plan. When disaster strikes, the plan automatically goes into play – communications, documents, computers, contact with employees, clients, vendors are all covered.

STEP 2. TEST

Based on Gartner Research Report it is estimated that 32 percent of all conventional tape backups would not restore properly. Many facilities that use a backup procedure do not test their backup media and suffer data integrity issues as a result. Add offsite storage of your backup media to your continuity plan. Be sure that your backup media is stored safely offsite and is accessible under all circumstances.

STEP 3. REFINE

It is very easy to overlook some of your most critical data – your paper records. More than 70 percent of today’s businesses would fail within 3 weeks if they suffered a catastrophic loss of paper-based records alone due to fire or flood.

Keep in mind that disasters can be major or minor. Major disasters are earthquakes, floods, long term
blackouts and are not very common. However it’s the minor disasters that can cripple your facility overnight if you don’t prepare. Minor disasters include: roof leaks, pipe bursts, water damage, mold on documents, sabotage, negligence, loss, theft or misfiling.

DANGERS OF CENTRALIZED STORAGE

Let’s take a typical scenario. This enterprise has centralized storage of all business records including invoices, purchase orders and vendor files plus original architectural drawings dating back to the turn of the century. Precautions had been taken for protecting the area with sprinklers, not considering that while a flash fire would have been controlled, the water damage would have wiped out the documents in minutes. With some simple steps a document scanning procedure was put into place to help this facility protect its documents.

Every enterprise should include backup for paper documents as well as computer documents into its recovery plan. A simple way to get started in this area is to begin scanning all paper from today forward. You can purchase an easy to use, inexpensive, desktop scanner and be up and running quickly. A document scanning service can assist with your “backfile” conversion, large document scanning and simple ways to integrate the process into your day to day workflow.

Regulations and corporate rules now demand better storage and retrieval of business-related e-mails.

SIDEBAR: But What about Those Dangerous E-mails?

New rules took effect two years ago that help companies decide how many e-mails and other digital items they have to keep in case someone sues them and demands the documents be brought to court. Even small companies can generate millions of digital documents in a very short time, and systems for managing them can be expensive.


IT security software provider Surety, LLC recently shared results of its 2008 E-mail Security and Authentication Survey with Security Magazine. The survey, which included more than 800 IT security, e-mail security and compliance professionals, revealed significant concerns about e-mail content security and the preservation of e-mails for litigation, including the following surprising takeaways:

  • More than 65 percent of respondents lack confidence that their organization's e-mail records would be admitted as evidence in legal, regulatory or patent disputes;
  • More than 80 percent of respondents are concerned about their ability to authenticate e-mail records and attachments; and
  • More than 50 percent of respondents remain unclear on new regulations and legal expectations related to e-mail authentication, including e-discovery.
  • About 65 percent of respondents lack confidence that their organization's e-mail records would be admitted as authenticated evidence in legal, regulatory or patent disputes.
  • The survey further revealed that more than 80 percent of respondents are concerned about their ability to authenticate e-mail records and attachments and more than 50 percent of respondents remain unclear on new regulations and legal expectations related to e-mail authentication.

 Other findings in Surety’s 2008 E-mail Security and Authentication Survey include:

  • E-mail retains its position as the most critical enterprise application. Seventy-one percent of respondents indicated that their organization uses e-mail to share information on a wide range of business-critical data, including documents related to company financial information, human resources and Intellectual Property and contracts with external parties.
  • E-mail takes center stage during e-discovery and during litigation. Nearly one-third of respondents indicate that their companies have been required to produce e-mail during e-discovery requests and their e-mail records have been used during litigation.
  • Many organizations have been slow to implement appropriate e-mail storage and content security solutions. According to the survey, 48 percent of respondents do not have tools in place to store e-mails in their original form in a manner that does not leave them susceptible to tampering.
  • Wide-variety of corporate initiatives drive adoption of e-mail authentication solutions. Regulatory compliance, e-discovery concerns, risk avoidance and internal policies mandating improved security represent the top drivers for the adoption of authentication solutions.
Full findings for Surety's 2008 E-mail Security and Authentication Survey are available at www.surety.com/images/whitepapers/Surety_E-mailSecuritySurvey_2008.pdf.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Stephen Hoey is president of KDF Reprographics, Contact him at (201) 784-9991, ext. 501 or www.kdf-comp.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • document security

    How to improve legal document security in six steps

    See More
  • CyberAttackTargets-sectigo.jpg

    How to stop ransomware - Seven steps to protect your enterprise

    See More
  • cyber threat

    Addressing Data Breaches: How to Stop Them

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing