IronKey

Mobile Data Security Blog

Home  »  2012

by

Secure Working can’t be Optional

Data Security Holes Shown In Global IT

Recently Imation released the results of a study which reveal some important home truths about the current attitude of workforces across Europe towards remote working. The survey, conducted across the UK, France and Germany, also highlighted worrying shortcomings in Europe’s major IT markets around secure remote working in terms of both technology and policy.
Read More

by

Imation and the IronKey Brand

A Powerful Platform for Secure USB Storage

I hope you’ve seen our announcement today, that Imation™ will unify its Mobile Security portfolio around the IronKey™ brand.

Of course, some of you might be thinking: What’s the big deal about a brand?  Well, it actually is a big deal, for us and for you, too.  Here’s some background.
Read More

by

How to Meet the Data Security Challenge of Employees

The Biggest Cause of Data Breaches is People

In June of this year, the United Kingdom’s Brighton and Sussex University Hospitals’ NHS Trust failed to ensure that hard drives containing highly sensitive patient information were erased completely before they were handed over to a contractor. The hard drives ended up being sold on eBay, earning the Trust a £325,000 fine from the UK’s Information Commissioner’s Office (ICO); the largest fine of its type ever issued.

Like so many other companies that are issued with these hefty ICO fines, the Brighton and Sussex University Hospitals’ breach was not caused by a faulty database or internal network problems but, simply, human error.
Read More

by

Data Breach Response Plans Should be Developed Now

Data Breach Response Plans Should be Developed Now.

In my previous post, “Data Privacy Brech Protection Laws Heat Map,” I highlighted the myriad US state regulations that govern what you need to do to comply in the event that your company experiences a data privacy breach.  What would you do if this happens? The time to decide is before it happens.

With federal enforcement, noncompliance could have serious ramifications, and the FTC is known for not shying away from levying penalties whenever it considers them appropriate.
Read More

by

Using Telework to Keep Government Open

Secure mobile solutions, telework, and BYOD support government and business continuity

In February 2010, relentless blizzards, later termed “Snowmageddon,” forced government agencies in and around the DC area to shut their doors for a record-breaking five days. The price tag for the closings: roughly $71 million a day, according to OPM (Office of Personnel Management) Director John Berry.
Read More

by

Data Breach Highlights Need to Encrypt Personal Information

Last week, Yahoo! announced a customer data breach, again illustrating the vulnerability of user identities on widely used services.  As reported by GovInfoSecurity, among others, a hacking group called D33Ds posted more than 400,000 usernames and passwords online.

The passwords were apparently stored in plain text and not encrypted, which highlights the need for service providers to implement stronger security practices and better protect user names and passwords.

While we continue to advise users on the ways they can strengthen the security of their personal information, companies storing that information must meet a minimum standard to help them do that. Network security won’t stop every attack, so encryption of personal information should be seen as the first wall of defense.

Comments? Email imsblog@imation.com

by

Mobile WorkSpaces: A Powerful Way To Reign In Mobile Data Sprawl

Data Security for Remote Workers

It seems every week there’s another news story about a mobile storage device being a central part of a security breach. Whether that’s a worker losing an unencrypted device, or, as in the case of the Flame malware, actually used as part of the attack.

These types of incidents show that data security is no longer just about defending the corporate perimeter: where the network is trusted and everything outside is suspect. Today, data needs to be protected wherever it travels and wherever the user works.
Read More

by

Windows To Go: Compelling? Yes. However Adequate Security Will Be Crucial

Yes, But Adequate Security Will Be Crucial for Enterprise Adoption of Windows To Go.

There certainly was plenty of interesting news at the Microsoft TechEd North America conference recently. Updates included new versions of Internet Explorer, the Office productivity suite, and its flagship Windows operating system. All of this is important to enterprise customers, of course. But one thing that caught our eye, and hasn’t received the attention we think it deserves, is the potential impact of Microsoft Windows To Go.

In case you’re not familiar with it, Windows To Go provides a stored and full bootable image of Windows 8 on a USB device, so that mobile workers, contractors, telecommuters – basically anyone – can work just about anywhere they need or want, from almost any laptop they want.
Read More