Protect Sensitive Data on Laptops: Now More Important Than Ever

Lo sentimos, este PDF sólo está disponible en formato para descarga

Protect Sensitive Data on Laptops: Now More Important Than Ever

Data breaches continue to increase in number and cost
Businesses have access to many robust security solutions. These include anti-virus applications, intrusion prevention systems (IPSs), and intrusion detection applications, as well as encryption, data loss prevention (DLP) solutions, and authentication applications (identity and access management solutions). Yet, with all the security applications and approaches available today, companies are still vulnerable to data loss and theft. In fact, according to a 2010 Ponemon Institute benchmark study, the average laptop has about a 7 percent chance of being lost or stolen. Businesses are struggling not only to protect sensitive data, but also to prove compliance with increased security regulations in both Europe and North America.

Sensitive data is still increasingly vulnerable
Many factors contribute to the continued rise in data breaches, including:
• More sophisticated equipment and software applications for hackers.
With less investment, it’s easier to break through security and commit data breaches.
• An increasingly mobile workforce.
As users become more mobile, laptops—and their data—are more exposed to loss and theft.
• Laptops are often shared in environments such as data centers, schools, and customer service centers.
Sharing laptops among many users not only makes sensitive data more vulnerable to loss or theft, but it also puts data at greater risk of unauthorized access.
• Bulk shipments of laptops.
The military, government agencies, and educational organizations are particularly vulnerable to laptop theft during transport.
• Expensive assets.
Customized telecommunications laptops for field technicians. As a result, their sensitive data are at greater risk of exposure.
• Security applications installed at the OS or BIOS level.
These can be robust solutions, but are at risk of being circumvented or disabled.
• Security credentials are often stored in software.
Read the full Protect Sensitive Data on Laptops White Paper.