2007 Compliance Survey
Understanding that compliance is a hot-button issue for many of our partners and customers, we would like your feedback in order to better understand your needs with respect to this important topic.
This survey will take less than five minutes of your time. Thank you in advance for your participation.
Encryption continues to be the topic on every CIO and IT person’s lips nowadays. No one wants to end up in the news as the next victim of a privacy breach or the next company that didn’t protect its customers' information. If you conduct a news search using the words "personal data breach," you’ll be alarmed at the number of instances where personal information such as social security and credit-card numbers have been exposed to possible theft.
In a recent breach, a state government site allowed access to hundreds of thousands of records, including names, addresses, social security numbers and documents with signatures.
Whether it’s government agencies, research facilities, banking institutions, credit card processing companies, hospitals--or your company’s computers - the risk of compromising private information is very high. At the recent "CEO-CIO Symposium," speaker Erik Phelps from the law firm Michael Best & Friedrich described the relationship business has with technology. In his presentation, he stated that since “business relies so heavily on technology today, business risk becomes technology dependent."
The possibility of litigation is part of business. It has always been a risk of doing business, but because technology and today’s business are so intertwined, business risk has a higher threat level. This has prompted many to encrypt workstations and mobile computers in order to protect critical business data.
If you have rolled out encryption, how do you maintain your IT service quality when the hard disk drive fails? How do you plan and prepare for a data loss when the user’s computer is encrypted? These are all issues that should be considered when putting together a data disaster plan.
In addition, data recovery, one of the more common missing elements of a disaster recovery plan, should also be factored in because it can serve as the "Hail Mary" attempt when all other options have been exhausted. View the full article here.
As freshman leave home for the first time and seniors begin working on the most important project of their college career – the senior thesis -- most college students will be heading to school this fall with a laptop computer to help manage their workload. Protecting the data on those computers isn’t as simple as securing a notebook in a locker.
Students need to be careful to avoid physical damage, viruses and other problems that could affect the integrity of their data. With that in mind and the start of school right around the corner, visitfor helpful tips on protecting laptops as well as the critical data on them here
© 2007 Kroll Ontrack Inc. All rights reserved. Not to be reproduced without this notice. All products mentioned are trademarks or registered trademarks of their respective companies.