Mobile device data recoveries surge
Posted on 25 March 2013.
Kroll Ontrack saw a 55 percent increase in mobile device recoveries for phones and tablets from 2010 to 2011, and a 161 percent increase from 2011 to 2012. With more and more people storing valuable personal and business data on their mobile devices, there is no doubt the demand for recovery when something goes wrong will continue to climb.


“For mobile devices, physical damage is the most common cause of data loss we see, representing about two-thirds of data recovery cases,” said Todd Johnson, vice president of operations, Kroll Ontrack. “Inherent in their purpose, mobile devices are simply on the go, and therefore more susceptible to human error, including drops, which can cause electronic failure, and water damage. The other third are from logical failures, such as accidentally deleted files, corrupt software, password lockout and OS upgrade issues.”

Ontrack Data Recovery engineers report that in 2012, for recovery resulting from physical failure, 31 percent of cases were electronics-related physical damage, 23 percent were the result of water or moisture damage and seven percent were related to damage to the exterior of the device. For recovery resulting from logical failure, 26 percent were the result of deleted files, seven percent were software corruption and six percent were cases of password lockout.

Across all types of recovery scenarios, data loss incidents are platform independent and occur within iOS, Android, and Windows devices.

“In most cases, recovery can be attained by way of physical repair or bypassing a corrupted OS,” said Greg Olson, senior vice president of data storage and recoveries, Kroll Ontrack. “Once repair or OS bypass is successful, Kroll Ontrack specialized software tools are then used to target critical files and provide customers with comprehensive evaluations and detailed file reports of the files that can be recovered.”

Specifically, in instances of physical damage, Ontrack Data Recovery engineers open the device within a cleanroom environment and assess the physical condition of the circuit boards and parts through a comprehensive diagnostic process. The mobile device’s printed circuit board (PCB) parts are examined and repaired as needed to get the device to a state where the data can be read. When there is logical failure, such as a corrupt operating system or failed OS update, engineers use specialized software to bypass the identified issue and then access and extract the data.

“When my son dove into a pool with his iPhone in his pocket, he lost hundreds of contacts and two years’ worth of photos that were very important to our family,” said James Smith. “We had never made a backup of his phone and thought the data was forever lost. With Kroll Ontrack’s expertise in mobile phone recoveries, all his data was recovered and restored to his new phone for a very reasonable price and we backed up the information to our family computer.”

The most requested data to be recovered from mobile devices are photos/videos and contacts, followed by notes and text messages. To promote the best chance of success in recovering this valuable data, Kroll Ontrack suggests the following:

Time is of the essence. Power off the mobile device immediately and get it to a reputable data recovery provider. The longer you wait, the more likely critical data will be overwritten (deleted files) or the drive will corrode (physical damage such as water).

Backup, backup, backup. Before disaster strikes, back-up your data to another device, such as a laptop, the cloud or an external drive. If you get an operating system error, this backup is often the saving grace in the recovery process.

Know what you want. The key to recovering data quickly is to know what data to target. Communicate to your data recovery provider what data is most critical to better ensure a timely and accurate recovery.





Spotlight

Targeted attack protection via network topology alteration

Posted on 17 October 2014.  |  This article from Trend Micro tackles how network topology can aid in defending the enterprise network from risks posed by targeted attacks.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Mon, Oct 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //