Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Sensitive data loss due to laptop theft avoidable.

Absolute Software : 22 January, 2008  (Technical Article)
Multi layered security is the answer to continuing high profile data losses according to William Pound, Senior Director of International Operations at Absolute Software.
Another high profile data loss, and this time it's the Ministry of Defence which is at the centre of an embarrassing situation. Today, Des Browne, Defence Minster made a statement to the House of Commons confirming the theft of a MOD laptop containing the details of over 153,000 armed forces applicants, including over 3,700 bank details, all un-encrypted - news which comes with a sense of inevitability. While many believe "it will never happen to them", we see that a lack of foresight regarding Risk Management has meant that potentially sensitive data may have been exposed yet again. The nature of the loss reinforces recent research conducted on behalf of Absolute Software which showed that nearly half of those surveyed said their company's data was threatened by employee negligence.

This situation highlights once again the need for a layered approach to security. There are steps that can be taken to secure not just the data, but the laptops as well. These range from the obvious; i.e. not leaving laptops unattended, through to tactical, such as installing anti-virus and firewalls; to the strategic such as creating a contingency plan, and implementing asset tracking and recovery software to track and recover lost or stolen computers, and remotely cleanse them of sensitive information if needs be.

Deploying a robust, multi-layered security solution that addresses regulatory compliance, data protection, computer theft, and asset tracking should be a 'must do' for any business aiming to avoid being the next headline.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo