Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Government IT security model a model for private sector

BeCrypt : 03 February, 2009  (Technical Article)
BeCrypt suggests that data protection framework developed for government use is applicable throughout the private sector for the prevention of high profile data breaches
BeCrypt states that companies need to learn from government if they are to protect confidential and sensitive data from theft or loss. In his recently published article¹, Dr Bernard Parsons, CEO of BeCrypt, claims that today's technology has placed similar demands on the private and public sector, whether it be to protect national secrets, intellectual property or personal information. The UK government's response to recent high profile public sector data breaches in 2008 has resulted in a published framework that accompanies the existing data classification requirements. Such a framework of 'culture change' can also be adopted by organisations in the private sector to implement policies that protect information.

Dr Bernard Parsons, CEO at BeCrypt said; "The established systems and processes of protectively marking - or classifying - data that have worked well for the Government for decades have failed to meet today's demands. The critical mass of data breaches publicised last year have also brought other previously unnoticed examples to light that have created a catalyst for change.

"The Government's response has been to shift the focus to measure data loss in terms of risk, associated with loss of confidentiality, integrity or availability and the impact to the organisation. Companies can learn from this framework to manage their own data security, however, a 'sea change' to a Risk Management culture is required. There are also technological solutions available today that provide the security assurance to government graded levels and that can be deployed across the organisation to manage the access, flow and safeguarding of data.

The Government Security Policy Framework and the Information Assurance Maturity Model have been published and provide a practical framework for IA compliance. They contain effective guidelines that are open to review by all, the lessons for Corporations are there to be learnt and adopted."

BeCrypt provides a range of security solutions from disk encryption, media encryption, data protection and remote access products that can be configured to the individual needs of an organisation. Its data security products protect the data and information on desktops, laptops, PDAs, USB sticks, mobile devices and removable media such as CDs. Its encryption products are certified by the leading government security assurance schemes, including CESG Assisted Products Scheme (CAPS), CCT Mark, Defence INFOSEC Procurement Co-Operation Group (DIPCOG)
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo