You are here: hacking technology > encryption decipher > Content
Hot Articles
Recommend Articles
New Articles
IT departments ben?CONFIRM manage more than encryption to secure title and to protect mobile data
  Add date: 08/23/2010   Publishing date: 08/23/2010   Hits: 1
Total 2 pages, Current page:1, Jump to page:
 
The increasing mobility?t the type of data has led to growing pressure on IT departments. There was a time not long ago, when the data is largely due to the physical safety of Geb?UdeS, where are you was. Now, with the allgegenw?rtigen use of laptops and handheld device?States, a safe physical environment, while necessary is not enough.

Entering a new decade, IT organizations speak with one?rtlichen face "perfect storm "when it comes to protecting their data. T departments?TIG is reduced budgets as a result they have to do more with less. There is a growing movement of the various levels of government to ensure the security of the data, how to deal with the recent announcement by the Department of Justice, that the Information Commissioner 's Office (ICO) that the power of organizations of up to ¡ê 500,000 have serious comprehension??e against in law?tze of data protection.

The Europ?pean Council has a rule violation reporting of data for telecommunications companies in Europe. This one?modification of an EU directive forcing telecommunications companies to inform customers if they lose their data. The adoption of laws increasing regulation in relation to the data extraction force the H?nd of companies, the necessary processes to the Datenintegrit?t to weight?. Hrleisten Otherwise, k?nnten they cause are subject to significant adverse economic impact and reputation, while a breach of the data was produced. According to the Ponemon Institute, the average cost of a breach of the data to an organization in the UK ¡ê 1,700,000, w?while in Germany, € 2,410,000.

Together with reduced operating budgets and legislation Erh?hung the government, the general?become public is aware (and concerned) about the security of your personal information, such as F?lle of Fehlschl?rise to the in data security further. In fact, according to the ICO, the number of breaches of data in the United K?Kingdom reported to increase by almost 65%?or passed to get one?or earlier.

And close?Lich, there is increasing mobility?t the Arbeitskr?fte - people with their data to the people from their H?to travel usern telework. According to the Ponemon Institute, more than 3,500 laptops disappear w?weekly on europ?European airports?. Fen This is a laptop every three minutes. W?During the mobility?t creates Gesch?FTSM?, Possibilities to accelerate the use of proprietary device?ten au?outside the traditional workplace. Especially since employees are more and more work "home office ". The result is the creation of a perimeter of information au?protected outside of the traditional enterprise.

This perfect storm thus raises the question perfect for any IT department?How to protect data that you do not follow k?? Can

Encryption has for some time, was the de facto standard for data maintenance and is one of the most important security tools in the defense of the data. W?while it is an important part of any approach to the data security, encryption alone is not enough. Not erm?looked like you to keep an overview of data and offers no details about what data is stored on lost or stolen laptops. In fact, if an encrypted laptop is lost, all I really know that they have a laptop, with potentially sch?dliche information?public areas without the M?possibility of restoring the data. And according to recent Ponemon Institute research, there is no guarantee that the encryption correctly on the device?t share. Recognition of non-IT managers in Gro?Britain showed that 66% of them scored either his password?be a private document, as a post-it or shared with others, if I forget?on was forgotten.

 
Other pages: : 1 * 2 * Next>>
Prev:Encryption and access code k?can easily be overlooked in the iPhone 3G Next:Effective enterprise security can not be addressed only in passing

Comment:

Category: Home > encryption decipher