Data about the security posture of their storage and backup systems is either woefully deficient or missing entirely. That is one of the reasons why CISOs set strategies and approve the procurement of solutions to keep data and systems safe. Yet, the organization continues to suffer from breaches and attacks.
Source: GBHackers