Disk encryption and disk backup play two distinct roles and should be considered in the context of overall system security, be it one laptop or a whole enterprise network. System security is all about maintaining the confidentiality, integrity and availability of the system and the data entrusted to it.
Therefore, using encryption to protect data from prying eyes is not the same as securing the information. If someone steals the encrypted disk, you can derive a valuable dose of comfort from knowing that the thief will have a hard time accessing the contents. If those contents include personally identifiable information (PII) pertaining to thousands of customers, that encryption will help ensure the confidentiality and integrity that your customers were promised when you requested the data from them.
So the simple answer to the question is affirmative. Backup is a must, and whole-disk encryption should be considered as well, but of the two, backup is more critical. Where the two mechanisms come together is encrypted backup, which is definitely something to consider if you are talking about adequately securing sensitive data. The combined approach allows programs to encrypt the data as they write it to the backup media, be it tape, removable hard drive or network server.
Regardless, backup media should be stored securely and separately. In other words, there should be at least one backup safely stored in a different location from the original. Imagine going to the trouble of making regular backups, but then storing them all in the same office as the drives holding the original data. If the office is burglarized, everything may be lost. It would be little consolation to know that the thief can't get at the data because it is encrypted; it would be a huge relief to know that there were a copy of the data in the company's safety deposit box at the bank.
- Learn about the whole-disk encryption benefits of Vista's BitLocker.
- A SearchSecurity.com reader asks expert Ed Skoudis, "Are encryption products better than self-destructing data?"
Dig deeper on Disk Encryption and File Encryption
Related Q&A from Michael Cobb
A reported 43% of Microsoft XML users are running vulnerable versions of the software. Security expert Michael Cobb discusses how to mitigate the ...continue reading
Security expert Michael Cobb explains what Open Authorization or OAuth 2.0 is, its pros and cons, and how it is different from bring your own ...continue reading
While the fundamentals of securing an e-commerce website haven't changed in a few years, there are new threat vectors and security risks to be aware ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.