Several recent data breaches at major enterprises and governmental agencies stemmed from the loss or theft of mobile computers and USB drives. While encrypting the data on these devices isn’t a bad idea, the larger question is why was sensitive personal information stored on the mobile device in the first place?
Comments
fax2email
August 16, 2011
8:52 am
What is their disclosure policy or laws that they are bound by?
Keeping it in-house is really what I was alluding to. I know that not all companies have the ability to custom write this kind of service,
fax2email
August 16, 2011
8:50 am
If you (the reader) own a business, and would like to protect your companies Private Data, then I would strongly advise that you use a system like this (as described in the video). However, if you’re just a regular computer user, and are thinking of using a system like this (such as an SSL encrypted ‘Google Docs’ service for example), then I would strongly advise againt using a system like this (as described in the video), at least for your Private Data:
Very efficiently written information. Will probably be invaluable to anyone who usess it, including myself. Keep up the good work – for certain i will take a look at extra posts.
bugaboo stroller on sale
March 1, 2011
3:16 pm
I notice quite a number of blogs that look interesting and really worth a read. There’s nothing worse than sifting through limitless blah blah blogs simply to locate a few that keep ones attention. Thanks. Great job!
Luke Hebbes
September 15, 2009
2:43 pm
I agree, that you should always be suspicious of trusting your data to any third party. Do you categorically know that your data has been deleted from the cloud service when you delete it? Is it still contained in any backups or versioning? What is their disclosure policy or laws that they are bound by?
Keeping it in-house is really what I was alluding to. I know that not all companies have the ability to custom write this kind of service, but there are companies out there who can supply online analysis packages for you to host within your organisation. You must make sure that access to the service is secure though.
As a private user, your data is probably worth less than that of a business to an attacker, but this doesn’t mean that you should be any less vigilant, as data loss and identity theft can have a devastating effect on the individual. However, I was really concentrating on the enterprise in this video.
J2897
September 11, 2009
3:38 pm
I would also like to add:
… If you (the reader) own a business, and would like to protect your companies Private Data, then I would strongly advise that you use a system like this (as described in the video). However, if you’re just a regular computer user, and are thinking of using a system like this (such as an SSL encrypted ‘Google Docs’ service for example), then I would strongly advise againt using a system like this (as described in the video), at least for your Private Data: Only use ‘cloud services’ for Data you don’t mind becoming Public, and always read the Terms and Conditions!
J2897
September 4, 2009
8:48 am
I agree – and in addition/support to Luke’s words:
… As soon as a Device is reported stolen, all the Security Department should need to do to ‘Secure the Data’, is kill the login Account and/or Key and/or Password and/or Cookie;
Access to the Virtual Machine or Web Service/s should then be Denied.
… Hacker’s/Terrorist’s will then need to decrypt the Data on the device, find a Cookie/Key/Password, before the Device is reported stolen.