In this month’s SecureNews newsletter, we have good news for our Alertsec Xpress users who can upgrade free of charge to Endpoint Encrypt.
Also, the software that powers all Alertsec services is recognised by Gartner yet again as the leader for mobile data protection.
Data breaches continue to hit the headlines and we draw attention to the need to encrypt USB memory sticks. And we encourage you to get in touch with our Alertsec 24/7 help-desk team who are doing great work to help all our customers get the best performance from their Alertsec service.
At Alertsec our mission is to provide the best quality of support for every customer, regardless of whether you are an individual trial user or a large corporation.
It’s crucial that our customers get the help they need, when they need it, in order to stay secure and productive. This is why our help-desk is open 24/7 and can be reached by phone, or email or via the website. The contact details are at the bottom of all our newsletters.
Our support team has played an important role over the past 8 years since we launched Alertsec, helping our customers and supporting the successful growth of the company.
Check Point continues to lead Mobile Data Protection
Gartner Magic Quadrant for Mobile Data Protection
Check Point, the software that powers all Alertsec services, has been named for the 8th consecutive year as a leader in mobile data protection.
Check Point has been positioned in the Leaders Quadrant of Gartner’s recent Magic Quadrant for Mobile Data Protection.
According to Check Point, recent data breaches highlight the immeasurable harm data leakage can cause in the wrong hands. Organizations need to be vigilant in protecting and implementing secure access to corporate information.
At Duke University Health System (DUHS), North Carolina, US, an unencrypted USB memory stick containing patient information was stolen from an administration office. The stolen USB thumb drive contained spreadsheets with the names of patients of Duke Children's Health Center and Lenox Baker Children's Hospital, their medical record numbers, physicians' names and hospital locations visited.
While there was no way of knowing if the compromised information had been used in any way, DUHS had to notify patients of the potential data breach and post a notification on their website.