If your cheeks have flushed after deleting an important email by accident don't be too concerned - you're not the only one.
A new survey has found the restoration of deleted emails or email boxes to be the most common request for IT administrators, when it comes to data restoration.
But accidental deletion of mailboxes and specific messages from Microsoft Exchange is not the only data restoration request made of IT administrators.
In the US, the second most common data restoration need was collection of electronic data for e-discovery (21 per cent), followed by consolidating data from older to new applications to eliminate legacy servers (15 per cent).
When asked how often they receive requests for data restoration, 61 per cent of the nearly 200 Ontrack PowerControls customers surveyed across North America, EMEA and APAC reported they received up to five restoration requests a month, with an additional 11 per cent claiming up to ten times a month.
Requests for data restoration came from all departments across an organisation, with 24 per cent stemming from the internal legal department, 22 per cent coming from IT security and 15 per cent originating from sales and marketing.
Forty-five per cent of IT administrator respondents noted that employees requested their email and documents back because they were accidentally deleted.
Internal investigations (17 per cent) ranked as the second most common source of restoration requests.
Kroll Ontrack product director, Tom McCaffrey, The time it took to search, identify, copy, restore and export data from Microsoft Exchange or Microsoft SharePoint platforms could be significant.Read more: StorageCraft introduces vendor-agnostic recovery, search and migration tool
"Especially if IT admins are executing the task by restoring a full database backup,” he said.
“With its granular restoration capabilities directly to your production server from any backup system, 41 per cent of those surveyed report Ontrack PowerControls helps them address collection, restoration and consolidation requests in approximately half the time as compared to other methods, such as full backup or brick-level backup restores.”