banner



Why stolen laptops still cause data breaches, and what’s being done to stop them - atterberryhasuld

All metre a stolen laptop leads to a data breach, you marvel why the business enterprise tangled hadn't established any safeguards. When the unencrypted laptop computer was purloined from a quondam physician at the University of Oklahoma, for representativ, operating theatre when a laptop was stolen from insurance policy supplier Oregon Health Cooperative containing data on 15,000 members.

You'd think money would motivate them, if cypher else. In November, EMC and Hartford Hospital were ordered to pay US$90,000 to the state of Connecticut over the stealing of an unencrypted laptop in 2012 containing data on almost 9,000 people. The laptop was stolen from an EMC employee's home.

The problem extends far beyond the healthcare industriousness, too—such American Samoa the laptop taken from SterlingBackCheck, a Original York-supported background covering service. The laptop restrained data on 100,000 people.

These types of breaches put on't quite grab the one headlines A better cybercrimes and hacking incidents, if only because a thousand employees affected by a laptop theft is less dramatic than 40 million customers at Target. But IT's a good deal easier to steal a laptop than it is to hack into a corporate database, so the thieving and loss of laptops, equally well as desktops and flash drives, highlight the need for enhanced physical security and employee training.

IT's easier to steal a laptop than to hack a database

The organizations mentioned here have wised up. A spokesperson for the University of Oklahoma said it has launched an encoding syllabu and new training for employees when it comes to handling sensitive information.

SterlingBackCheck aforementioned information technology has updated its encryption and audit procedures, amended its equipment custody protocols, retrained employees on privacy and data security, and installed remote-wipe software on movable devices.

laptop theft thief Koldunova_Anna/iStock/Thinkstock

Laptop theives can potentially gain memory access to corporeal information, unless the device has remote wiping, encryption, or other protections.

Another threat to your information is the proliferation of Bring You Own Gimmick (BYOD) policies and mobile workers. Gartner anticipates that half of all companies testament own roughly need for a BYOD insurance policy by 2022. Workers will constitute victimization their own devices as well as company-issued ones in the office staff or active. This opens up a new risk if devices are lost or purloined.

Security firms like Sophos urge companies to put a robust insurance policy in situ for the manipulation of professional devices, including full disk encoding as well atomic number 3 encrypted cloud and removable media. A strong watchword is highly recommended too, but it's not sufficient along its own.

A greater sense of urging wouldn't damage, either. In Oklahoma, the physician had actually unexpended his position at the university before his private laptop went missing. He couldn't say for sure whether it contained light-sensitive data, but aside the time that hypothesis arose, IT was to a fault late.

In other incident, at manufacturer Tremco, an employee lost a company-issued laptop computer on a plane. It was several weeks before the employee realized that it contained spreadsheets of personal employee data.

Encoding, remote wiping, better information tracking

Companies necessitate to roll in the hay where their information is in the least multiplication—not just what twist it is on, but where that twist is located physically.

This highlights the call for for unlikely wiping tools, which SterlingBackCheck has set up place. If a laptop is misplaced operating room taken, the society should receive an easy way to remotely wipe the sensitive data to ensure it never leaks.

Much like large-scale hacking attacks, it's the consumer or the patient that really suffers when a data transgress occurs. The burden lies with the company to handle this data responsibly, whether IT's in the fog operating room on a laptop computer on the omnibus.

Source: https://www.pcworld.com/article/419133/why-stolen-laptops-still-cause-data-breaches-and-whats-being-done-to-stop-them.html

Posted by: atterberryhasuld.blogspot.com

0 Response to "Why stolen laptops still cause data breaches, and what’s being done to stop them - atterberryhasuld"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel