2015 was the year that cyber-security topped the news. Data breaches continued to impact companies and government agencies, making data security a board-level priority. In all industry sectors, encryption plays an important role in the information protection game.
Regular readers of our monthly newsletters will be aware of how vulnerable company laptops and computers are to being stolen or compromised. Encrypting is a cheap and effective insurance and at Alertsec we can help with short-term quick fixes, as well as long-term commitments.
The release of Windows 10 support is now deployed throughout our client base, so most of our Endpoint Encrypt and Total Endpoint Security clients are ready to upgrade to Windows 10 as required.
PLEASE note that you will need to prepare your encrypted machine before upgrading - see the Win10 upgrade guide or contact helpdesk.
We wish all our customers and partners a prosperous 2016. Do contact Alertsec’s Helpdesk team if you have any questions. We look forward to continuing to support you through the year ahead.
If you have Alertsec Xpress (AX) installed and are considering upgrading to Windows 10, you will first need to upgrade AX to Endpoint Encrypt (EE). EE comes in several flavors, with - our without - Media Encryption and a choice of using preboot authentication (called Strong logon), or not (Basic Comply).
Upgrading is easier than you think – just follow our 3-step process. And the new installation can be made without having to uninstall the current AX installation, or decrypt/re-encrypt. (Not applicable to Mac installations – contact the Helpdesk for details.)
3 steps to upgrade:
Contact firstname.lastname@example.org to add EE licenses to your account.
On your Control Panel:
Select the user(s) to be upgraded
Choose the EE profile to deploy
Email the download link to the user(s)
Once successfully deployed, remember to uninstall the AX license for each upgraded user so you don’t continue to pay for it (use the Reset option).
For more details check the Upgrade AX-EE Guide available in the “Guides” section on your account, or feel free to contact the Helpdesk.
Hartford Hospital, Connecticut, and one of its business associates, EMC Corporation, have agreed to pay $90,000 to the state for a violation of HIPAA privacy and security rules following the theft of a laptop containing unencrypted protected health information.
The laptop containing data from nearly 8,900 patients was reported stolen from the home of an EMC employee in June 2012 and was never recovered, according to a compliance report. EMC is the hospital's cloud solutions provider. HIPAA Rules were violated as the hospital failed to obtain a signed Business Associate Agreement with EMC prior to PHI being provided.
A New Mexico Department of Health data breach report indicates 561 patients have potentially had their Protected Health Information (PHI) exposed as a result of the theft of an unencrypted laptop computer from an employee’s vehicle. The theft from the vehicle in Albuquerque was one of several auto burglaries in the parking lot that day.
While some files on the laptop were password protected, unencrypted information including patient names, dates of birth, medications, facility unit, and in some cases, medical diagnoses were also stored on the laptop and could potentially be accessed by the thief.