Access "Removable storage device endpoint security and control"
This article is part of the April 2010 issue of Combatting the new security threats of today's mobile devices
Thumb drives, removable memory cards and smartphones often carry business data without IT permission, oversight or protection against loss or theft. Unfortunately, these handy little portable storage devices can jeopardize gigabytes of sensitive information. According to a study by Applied Research-West, three of four workers save corporate data on thumb drives, including customer records (25 percent), financials (17 percent), and business plans (15 percent). Yet, fewer than half of businesses routinely encrypt thumb drives. Fewer still consistently secure data copied onto today's rising tide of consumer smartphones. Some companies underestimate business risk posed by unencrypted portable storage. Others acknowledge the risk but, in lean economic times, lack the budget to battle it. But these excuses could leave employers in hot water if a regulated data breach occurs. "If [a portable device] carries customer or payment information, you have to protect it, no matter who owns it," says Mark Jordan, senior product manager at Sybase. "If you can't afford to ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
ISP shutdown slows Zeus botnet
Security experts say the Zeus botnet was slowed with the shutdown of Troyak, an ISP serving a large chunk of the Zeus botnet
-
Removable storage device endpoint security and control
by Lisa Phifer, Contributor
Endpoint security and control for devices like thumb drives, SIM cards and mobile devices can no longer be ignored.
-
ISP shutdown slows Zeus botnet
-
-
Economic recovery strategies for information security professionals
Security teams will continue to focus on efficiency and alignment with business as the economy recovers
-
Technologies to thwart online banking fraud
by Jerry Silva
Today's anti-fraud technologies create gated communities for online banking.
-
Economic recovery strategies for information security professionals
-
Columns
-
Information Security Profession Takes Two Steps Backward
The information security profession took two steps backwards with the firing of Pennsylvannia's CISO because of his comments on a conference panel, which illustrates the continuing disconnect between management and information security.
-
Schneier-Ranum Face-Off: Should the Government Stop Outsourcing Code Development?
Is outsourcing code development a threat to national security? Marcus Ranum and Bruce Schneier go head-to-head on this topic.
-
Cloud computing legal issues
Lawyers have a lot of concerns about cloud computing services. Learn about cloud computing legal issues
-
Information Security Profession Takes Two Steps Backward
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO