Data damage by disgruntled or careless employees can range from intellectual property theft to malicious deletion.

GLENDALE, CA, August 6, 2018 – According to the most recent edition of the annual IBM/Ponemon Institute Cost of Data Breach Study, the global average cost of a data breach in 2018 was $3.86 million, up 6.4% since 2017. The global average cost per lost or stolen record increased 4.8% year over year to $148.1 Commenting on the need for planning and protection, Condusiv Technologies CEO James D’Arezzo says, “The average global probability of an organization experiencing a material breach-one involving at least a thousand records-is 27.9%. If you’re a CIO, there’s almost a one in three chance it will happen to you.” D’Arezzo, whose company is a world leader in I/O reduction and SQL database performance, adds, “The worst-case scenario would be malicious unrecoverable deletion, with total data loss. Fortunately, the tools exist to prevent this.”

While a great deal of recent publicity has been given to external data breaches, CIOs and system managers need to be equally vigilant about security threats originating within the organization. The new IBM/Ponemon study, notes D’Arezzo, found that ordinary human error was a factor in 95% of investigated security incidents, and that 60% of actual breaches were carried out not by remote hackers but, rather, by insiders.

One oft-cited motivation for an internal data breach is the theft of intellectual property, wherein a departing employee is accused of taking with him or her manufacturing secrets, prospect lists, source code, or other proprietary content. Employers, especially in the technology sector, have been quick to retaliate. Auto manufacturer Tesla filed suit against a former employee in 20172 and another in 20183 for allegedly exporting confidential data, among other offenses. Similar recent litigation has involved Waymo, Uber, Facebook, IBM and Apple.4

Some of this activity seems to reflect not so much a crime wave as a lack of agreement between tech industry managers and intellectual property attorneys, on the one hand, and employees, on the other, about what does or does not constitute proprietary data. According to a recent survey by software firm Symantec, for example, 56% of employees do not consider it illegal to use a competitor’s trade information, 50% say they leave a job in possession of confidential information, and 40% plan to use it in their next job.5

Far more concerning is attempted data destruction-malicious deletion-by disgruntled employees. “The cost of a major data breach can be enormous,” says D’Arezzo, “but that expense is dwarfed by the potential cost of reconstituting data that isn’t there anymore. It’s absolutely essential that system managers be able to recover erroneously or maliciously deleted data.”

For Windows-based systems, this protection is offered by Condusiv’s Undelete® product line, which ensures that every deleted file or version of an Office file on a Windows PC or server can easily be restored. Whereas the Windows Recycle Bin is limited to only files deleted locally from within the Windows File Explorer, Undelete captures all deleted files, including files deleted remotely on File Servers. Undelete can also restore files previously purged from the Windows Recycle Bin-even if they were deleted before Undelete was installed. Undelete is the world’s leading product of its kind.

About Condusiv Technologies
Condusiv® Technologies is the world leader in software-only storage performance solutions for virtual and physical server environments, enabling systems to process more data in less time for faster application performance. Condusiv guarantees to solve the toughest application performance challenges with faster-than-new performance via V-locity® for virtual servers or Diskeeper® for physical servers and PCs. With over 100 million licenses sold, Condusiv solutions are used by 90% of the Fortune 1000 and almost three-quarters of the Forbes Global 100 to increase business productivity and reduce data center costs while extending the life of existing hardware. Condusiv Chief Executive Officer Jim D’Arezzo has had a long and distinguished career in high technology.

Condusiv was founded in 1981 by Craig Jensen as Executive Software. Jensen authored Diskeeper, which became the best-selling defragmentation software of all time. Over 37 years, he has taken the thought leadership in file system management and caching and transformed it into enterprise software. For more information, visit https://condusiv.com.

1. “Cost of Data Breach Study: Global Overview,” IBM Security/Ponemon Institute, 2018.

2. Ferris, Robert,”Tesla sues former Autopilot director for allegedly stealing secrets, poaching coworkers,” CNBC, January 26, 2017.

3. Higgins, Tim, “Tesla Sues Former Employee Amid Crackdown on ‘Sabotage’”, Wall Street Journal, June 20, 2018.

4. Nolter, Chris, “Silicon Valley’s Trade Secrets Wars,” The Street, May 29, 2017.

5. “Employees Steal Corporate Data and Don’t Believe It’s Wrong,” IT Business Edge, 2018

Media Inquiries:
Ash Richardson
JoTo PR
(727) 777-4621
www.jotopr.com

Follow us on Twitter and Like Us on Facebook