Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec

Data protection second on the list after virus fighting for IT Managers

SafeBoot : 26 October, 2007  (Technical Article)
Majority of IT personnel spend more effort on external threat mitigation than preventing confidential data from leaking out of the enterprise according to SafeBoot report.
According to new research, 56 per cent of IT managers and 74 per cent of workers admit that losing data puts their jobs at risk. Data leakage tops the list of security failures that could cost IT bosses their job, and goes to show just how serious end point security is. However, the same report states that most IT managers are almost exclusively focused on mitigating external threats including phishing and spyware.

Tom de Jongh, product manager at SafeBoot, a leading vendor of enterprise-class security software for the protection of mobile data that resides on mobile and portable devices and computers, believes that businesses need to start taking proactive measure to ensure that data leakage is eradicated once and for all.

"I would hate to be an IT manager - the buck always stops with them. In today's business environment, information is power and the price placed on corporate data is immeasurable. However, security policies seem to focus on the external threat when in fact it's employees that pose the greatest risk. C-level managers need to realise this and develop strategies to mitigate the risks and keep their company's data secure.

"The easiest way to do this is prevent employees accessing corporate data, but this isn't practical. How would any work get done?! In reality, it is prudent to make sure that sensitive information is encrypted at all times. If the inevitable happens and a worker mis-lays their laptop/PDA, then at least the data on it will be unusable. Such common sense thinking can go a long way, and will hopefully save the IT manager's sanity. Rather than looking over their shoulder waiting for a P45 to land on their desk, IT managers can work safe in the knowledge that encryption policies are helping reduce data leakage concerns."
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo