Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Tube Strike Tempts Workers Into Breaking Data Protection Rules

Lumension Security : 05 October, 2010  (Technical Article)
Lumension is warning of the likelihood of increased amounts of corporate data being offloaded onto USB flash memory to enable workers to operate from home during tube strike
There may not be many tubes on the move in London tomorrow, but as TFL workers down tools and London businesses buckle down to ride out the strike disruption, its leaking data that organisations need to keep their eye on.

Alan Bentley, SVP International at security specialist Lumension, commented: "Tube strikes are expensive affairs, with the last one reportedly costing the economy an estimated £50 million. So it's hardly surprising that employees are tempted to side step company rules in order to remain productive during the travel chaos. It might be loading up a USB stick with information, employees will be keen to have the documents they need.

"As a surge of potentially confidential data seeps beyond the office walls, businesses face a challenge to ensure their data remains protected should it end up in the wrong hands. However innocently this may happen.

"The threat to the business is two fold - opening a door for malware to get in and for confidential data to trickle out. Businesses must ensure that all data access points are correctly shielded from potential external threats. The only way to prevent data loss from removable devices is to take control of inbound and outbound data from all endpoints, and encrypt all data during transmission. With this approach, businesses can rest more easily."
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo