Archive for the ‘data theft’ Category

Data breach issues can’t be solved by IT departments alone

September 19, 2011 Leave a comment

Dave Jevans, chairman of IronKey and the Anti Phishing Working Group, looks at why locking down internal systems is not enough to combat sophisticated cyber criminals.

Although the threat from cyber criminals has existed for decades, the sheer volume of successful attacks on high profile brands during the last six months has highlighted an urgent need to protect against data breaches.

Having read a recent Gartner blog which stated that many of the of the IT security improvements they’ve seen over the past five years are fast becoming obsolete in the face of more sophisticated cyber attacks, turning the tables on the bad guys won’t be easy. Read more…


Free Webinar: Tips for Making Office Managers’ Job Easier

September 13, 2011 Leave a comment

We are happy to invite you to our next Free Webinar on September 15

Join our next free webinar on Thursday and learn how to make the best decisions for managing your company’s information. Get answers to the following questions:

1. Should I scan or should I store my files? 
2. Where should I store, on-site or off-site? 
3. How to prevent data loss? 

This webinar will last 15 min and will be hosted by Steven Goodacre from Datasafe Storage Ltd.
Title: Tips for making Office Managers’ job easier
Date: Thursday, September 15, 2011
Time: 11:00 AM – 11:15 AM BST

After registering you will receive a confirmation email containing information about joining the Webinar.
System Requirements
PC-based attendees
Required: Windows® 7, Vista, XP or 2003 Server

Macintosh®-based attendees
Required: Mac OS® X 10.5 or newer

Space is limited.
Reserve your Webinar seat now at:

Data breaches – to prepare or not to prepare? The answer is simple.

September 1, 2011 Leave a comment

All data breaches have two things in common: the need for prompt resolution and the need for a robust preparedness plan. Healthcare institutions especially should heed the call for an incident response plan because it provides the best preventive medicine to minimize financial and reputational risks.  So PLAN, keeping in mind:  People, the Law, and Action, with No time to waste.

People – Define the responsibilities of a coordinated incident response team. Don’t act alone. A good response team should include key internal players (In-house Counsel, IT, Compliance/Security, HR and Public Relations), as well as outside experts who confront data breaches on a regular basis (trusted Attorneys, Forensic Analysts and Fraud Monitors). These external experts can help restore key business functions, preserve crucial forensic evidence, strengthen data security, address victims’ needs, and communicate effectively with regulators and the public.

Read more…

Data protection: What’s your backup plan?

Human error plays a significant role in data loss. It is the culprit in 32 percent of cases, according to recent research. But what about the remaining 68 percent? Hardware malfunction, malware, software corruption and smackdowns dished out by Mother Nature are among the most common causes.

So, a strong data management plan is essential, because disasters will happen. But enterprises can reduce their likelihood, frequency and severity by planning ahead and reacting effectively.

Author: Nicole Smith


Employees are ‘comfortable’ with data theft

Employees are much more willing to steal the information stored in records management systems than organizations may have thought.

New research by Harris Interactive of 3,400 employees in the US, UK and Australia found that a significant proportion of them would be happy to do something with their employer’s or client’s private data.

A staggering  staggering 48 per cent of Brit,  would feel comfortable using private or sensitive information, compared to just under a quarter of Americans , and a 29 per cent of Australians. Read more…

%d bloggers like this: