Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Loss record at MOD requires a post-theft data destruction solution

Absolute Software : 16 December, 2009  (Technical Article)
Absolute Software comments on the scale of laptop losses at the UK's Ministry of Defence and suggests the need for a solution which enables data to be wiped remotely in the event of losses
Stephen Midgley at laptop security firm, Absolute Software has commented on the recent data loss incident at the Ministry of Defence.

"Leaving encryption keys with the computer is akin to leaving a car unattended with the engine running. High-profile organisations like the MoD need to be totally on top of their security - leaving no spaces for error. Encryption alone is not enough, especially when the keys to decode encryption files are also left exposed to prying thieves. With a reported 658 laptops taken from the MoD in the last four years, the organisation should ensure the data on the devices can be wiped immediately post theft. It's not about the £400 it would cost to replace a laptop, it's the data held on it can cost the organisation a lot more. The real question, and concern, for the MoD is does it know what data was on the missing device and is now accessible to someone outside of the MoD? If not, the MoD will have great difficultly in determining the scope and magnitude of this security breach."

"It goes without saying that the ability to track, manage and protect both the devices and the data on them is paramount to maintaining security is this increasingly mobile environment. Organisations of all sizes, whether private or public, are faced with the daunting challenge of managing data that often travels beyond the physically secure environment, such as an office building. Organisations, as part of a layered approach to security, require the ability to remotely track devices both on and off the network and be able to communicate with them in a situation when the device is triggered to be missing."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo