The important information in this edition of Alertsec’s SecureNews is our planned change to pre-configured service profile names. The changes will not impact users but if you are an administrator, then you will see a change on your console. More details are provided below, but if you require any further information, please get in touch with the Alertsec Helpdesk team.
Also, data breaches continue to hit the news. If you have any concerns or need guidance on how to protect your business, our Helpdesk team is here 24/7 for advice and support.
NEW Profile Names
Within the next few days, Alertsec will change the pre-configured service profiles names to better reflect the content and purpose of the profile settings. The name change will have no impact on deployed users; it will only be noticeable on the administration console where you will see the old profile names replaced with these more meaningful names.
“Basic Comply” is the new name for the PreBoot Bypass service profile. The “Basic Comply” profile provides the settings needed for users to comply with most regulatory requirements. With “Basic Comply”, users continue using their Windows login screen as the means of authentication to the machine. All information is protected with the same secure 256-bit encryption used by all profiles.
“Strong Logon” is the new name for the Alertsec Standard service profile. The “Strong Logon” profile includes pre-boot authentication, which strengthens security as the boot process is intercepted at an early stage. This profile is recommended where a strong security policy is in place and/or users are working with sensitive data or within government.
Both profiles are also available as “FDE Only” for clients who only want to use Full Disk Encryption. If you have any questions about these changes …
The massive data breach announced this month at health insurance provider Anthem, which compromised the social security information and other personal details of approximately 80 million Americans, has delivered a second blow to impacted members. Anthem customers are now being warned about scam email phishing campaigns targeting current and former Anthem members that are designed to capture personal information
In addition, the data breach has impacted insurance plans not owned by Anthem, according to the company, as hackers gained access through Anthem’s network to national insurance schemes such as Blue cross and Blue Shield. Initial investigation indicates that the member data accessed by hackers included names, dates of birth, member ID/ social security numbers, addresses, phone numbers, email addresses and employment information. FAQs on Anthem’s website states that the company is now working to reduce the risk of any further vulnerabilities and strengthen security.
An unencrypted laptop reported missing by Riverside County Regional Medical Center (RCRMC) in California may contain the data of 7,900 patients who received services from the organization. The hospital immediately notified law enforcement and began a thorough internal investigation after the laptop was reported missing in December.
This is a second breach at RCRMC involving the theft of an unencrypted laptop. In this latest data breach, affected information includes customers’ birth dates, names, social security numbers, health policy numbers and some clinical information. According to the organization’s chief compliance officer, Jan Remm, the company is now “taking significant measures to safeguard patient privacy and to restrict unauthorized access to computers and devices that potentially contain patient data.”
Due to the high number of recent data breach incidents, perhaps your company has questions about the right steps to take to be protected. Don’t hesitate to contact Alertsec to discuss how we can help you strengthen protection for your company data and devices. Full Disk Encryption is the core protection at the heart of Alertsec solutions, and we also include Media Encryption, Port Control, Anti-Malware, Program Control and a Firewall in our services. For more information ...