Once information has left your secure environment, where does it go? At Alertsec our focus is on helping you to create an encryption strategy for all data: not just on your own laptops and servers but also beyond your corporate network. This is especially important for companies within the insurance, healthcare and financial services industries, as data being shared has HIPPA and SOX compliance implications. Recently we announced our new Third Party Monitoring Solution. Alertsec is the first provider of endpoint encryption as a service that offers visibility of security outside of your own network’s encryption. This visibility tool enables you to ensure compliance across your third-party network regarding endpoint encryption for data at rest. If you are not yet familiar with this new tool, read the information below and contact our help desk for assistance.
Alertsec’s new third party security solution provides a monitoring tool that gives you visibility outside of your network over who has full disk encryption deployed.
The issue of third party security affects all organizations, large and small. Emails containing sensitive data are exchanged between co-workers every day and then shared with third parties for very valid reasons. It is vital to ensure that those subcontractors recognize their responsibilities and secure the sensitive data that they receive. Alertsec CEO Ebba Blitz said, “Even large corporations with extensive security systems do not have control of their own information once it has been shared outside of the corporate network.”
Our new monitoring solution gives our customers levels of visibility and control that previously were not possible. It allows you to supervise subcontractors’ endpoint encryption without incurring extra IT responsibilities. The tool uses a software ‘agent’ to install encryption on a third party laptop and Alertsec handles the security questions and recovery files. Once installed, you can monitor compliance via your Alertsec dashboard. Read more about this service on our website.
The California health system CalOptima reported a data breach when a “departing employee” downloaded PHI data to an unencrypted USB flash drive. The potential breach affected about 7 percent of CalOptima’s membership – about 56,000 members. Personal information downloaded to the USB flash drive included names, demographic information, Social Security numbers and other health plan details.
Personal data belonging to over 130,000 current and former sailors in the U.S. Navy has been compromised, according to reports. While it isn't clear when the hack took place, the source of the data breach is apparently a compromised laptop belonging to a contractor.
The Navy has been notified that a laptop belonging to one of its contractor's employees had been compromised and that "unknown individuals" accessed sensitive information including names and social security numbers.