Are you taking a big risk by putting off those data security actions that you know you should do? As a valued Alertsec customer, you’ve already taken the important step of deploying strong encryption on your company laptops. But have you protected all your data? What about confidential data stored on USB flash drives or shared with your third party vendors and brokers?
It just takes some simple steps to make sure that a lost laptop doesn't become a crisis. As a first step conduct a security assessment to clarify the risks. There’s more information below about the sort of criteria that an assessment would look for. Also, the article in Industry News about laptop thefts may help to identify where devices are potentially at risk. Remember that our Helpdesk team is on-call 24/7 to answer your questions.
The cost of procrastination could be the cost of having to recover lost data, fines and loss of customer trust. Is it worth it?
Will you be at the RSA Conference in San Francisco in February? Come and meet the Alertsec team. It’s a great opportunity to ask your questions about cyber-security and meet with our CEO, Ebba Blitz. Please contact your account manager or email us on firstname.lastname@example.org to arrange a convenient time to meet.
From all of the Alertsec team, we wish our customers a successful and secure 2017.
The consequences of an unencrypted laptop being stolen can be serious but still many SMBs don’t take the simple steps that can avoid a breach.
Use your Alertsec encryption tools to extend your encryption strategy across all data, wherever it is. Conducting a security assessment will show you the areas of risk that need to be addressed. Here are some simple steps to help you get started:
Understand where sensitive data lies inside and outside your organization
Understand how data is protected in the process of doing business
Create an encryption strategy for all data—whether stored on your office computers, on employee laptops and mobile devices, or on those of your third party suppliers and brokers
Find out more in the article below, written by our CEO Ebba Blitz. Share it with your co-workers and suppliers to get everyone on board. Preventing hackers getting access to your data is everyone’s job.
When users are working in the office, there may be a false sense of security that devices are safe on the premises. However, research last year of 300 U.S. IT professionals showed that theft of laptops in the office is nearly as high as theft from cars and other forms of transportation.
Presence Health, one of the largest health care networks serving Illinois, has agreed to pay $475,000 for failures to comply with the HIPAA breach notification rule.
Following a breach in 2013, Presence failed to notify affected individuals of the breach until 104 days after discovery. The subsequent investigation by the HHS Office for Civil Rights (OCR) also revealed that Presence failed to issue notifications following smaller breaches in 2015 and 2016.