Access your Pro+ Content below.
Use full disk or file/folder encryption for laptop data security
This article is part of the Information Security magazine issue of June 2010
According to the nonprofit Identity Theft Resource Center, staggering numbers of sensitive data records were breached in 2009, continuing a trend occurring since 2005. Approximately 498 distinct breaches took place with at least 222 million sensitive records lost or stolen. Roughly two-thirds of the breaches were explained, and of these, 27.5 percent were due to lost laptops and other incidents where data was "on the move," or accidental exposure. Regardless of how the breach occurred, only six of the 498 had encryption or other security controls in place. With vast numbers of records being lost or stolen, particularly from mobile systems, more organizations should be using endpoint security controls such as laptop encryption. In addition to the potential loss of customer confidence, litigation concerns, and general "bad press" that come with a public data breach, many organizations need to adhere to multiple compliance and privacy mandates at state, federal, and industry levels. Although few compliance requirements actually ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Cloud computing alters enterprise risk. Here's what you need to know in order to safely navigate the cloud.
Symantec acquisitions of PGP and Guardian Edge future ensures that encryption is becoming less of a standalone security tool.
Learn about the options for protecting laptop data, including full disk encryption and file/folder encryption, and their associated deployment and management challenges.
GRC aims to bring together disparate compliance efforts in the enterprise, but the concept has been stymied by a lack of clarity. Developing a GRC program requires three key steps.
Columns in this issue
Organizations who stay silent after a data security breach end up paying a higher price and helping cybercriminals.
Bruce Schneier and Marcus Ranum debate the risks associated with hiring hackers.
If you're spending more to protect custodial data because of compliance than you are to protect company secrets, you're missing the big picture.