Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Confidential disk found in eBay purchase.

Lumension Security : 29 February, 2008  (Technical Article)
Encrypted disk found in laptop purchased on eBay a good example of the human factor which needs to be considered in developing data security plan.
A computer disk marked 'Home Office Confidential" has been discovered hidden beneath the keyboard of a laptop bought on the online auction site eBay. The disc was discovered by Leapfrog Computer repairs in Westhoughton, near Bolton, Greater Manchester, according to media reports.

Alan Bentley, VP of Lumension Security EMEA (formerly PatchLink), comments:

"The good news with this latest data breach is that the data was encrypted. However, encryption alone is not infallible - computer hackers are determined individuals with the potential to crack one layer of security. And, we certainly shouldn't be relying on one line of protection when it comes to our national security.

"Safeguarding sensitive data should start at the network door. By monitoring and only allowing known good devices and authorised individuals to connect to a network and download data is essential. Once data access control and encryption work hand-in-hand we can go a long way to reduce the risk of sensitive data breaches."

"Of course, security doesn't eradicate the human factor. Meaning, individuals given the right to download data from the network must be put through stringent security checks. Once the data has been extracted, technology can help to determine when data was downloaded and to which approved device. Meaning organisations can gain a clear picture of how data has fallen into the wrong hands and act accordingly."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo