Data Breach – The Every Day Corporate Threat

An executive forgets their laptop in an airport lounge as he rushes to board a plane.

A sales manager leaves their mobile phone unattended in a café and finds it missing when he returns to his seat.

A USB containing important patient information is lost after exchanges from three different employees.

Organizations face security challenges every day.  The above scenarios can happen to anyone and while they can’t be avoided, these situations can be managed to ensure the confidential data residing on these devices are safe even when the devices aren’t.  With technological advances, hackers and thieves prowling online and offline, what is the best way to protect data at rest?

The best way is encryption, the process of encoding information in such a way to ensure unauthorized parties cannot access private data, therefore safeguarding the device.  Even if someone obtains the physical device, the unauthorized user cannot access the data on the device unless they have the right key and credentials.

How Does Encryption Help Me and My Organization?

  1. Data Protection–Encryption helps safeguard confidential data at rest so that even if the device is lost or stolen, the data is protected and access is restricted from unauthorized users.
  2. Risk Mitigation – As measures are taken to protect company data with encryption, there are usually no hefty fines or negative public relations consequences to deal with.
  3. Increase IT Productivity – A good encryption solution shouldn’t employ a complex install process for their IT staff. This allows faster turnaround time with more protection on company devices.
  4. Reduce Total Cost of Ownership–Some encryption providers offer additional features such as pre-boot network authentication abilities to help reduce the time that IT departments spend on resetting passwords and provisioning devices.

Tune in next week as we address some of the encryption myths that many companies have come to believe about encryption and what the truth is behind them.

Previous Post
Webinar: Simplified & Integrated Security Solutions from Lenovo & WinMagic
Next Post
The Million Dollar Question

Related Posts

Waging the War on Passwords

We have seen large password hacks recently including: LinkedIn, eHarmony, and Yahoo. Hacks so large some in the industry call this the Password Wars. Unfortunately for the general public—we are losing. However, before the trumpets play, let’s give them a…
Read more

RSA Conference 2014

I had the pleasure and privilege of attending the RSA security conference in San Francisco last week.  With 25,000 attendees it was the biggest RSA conference ever.  There were so many exhibitors that they opened up a second building for…

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.

Contact Us

This will close in 0 seconds