Archive for August, 2013

How to protect your organisation from Data Theft

August 5th, 2013

Data thefts are attacks on people, it is a challenge to the latest technology. Organizations must focus of three areas if they want to build a strong defense wall against data theft incidents. HR management also plays a major role, they need to keep appropriate policies in place, organizing regular training sessions and finding out major risk areas.

If an organization needs to protect itself from data thefts, they first need to find out the data that is most important to them. Identifying what is important to the organization makes it easy to protect from such problems in future. It could be sales data, employees data, customer data or intellectual property.

Security steps

In order to increase the effectiveness of its data security programme, an organization can implement some basic steps. Regular effective training sessions on cyber security should be introduced to counter some common reasons for cyber breaches, such as password selection, understanding of cyber risks and failure to follow designated processes.

Phishing is a term which is still unknow to many people, they are unaware of the risks attached to it. In phishing, the hackers try to acquire personal information such as usernames and passwords by acting as a trustworthy brand’s website. One example is a situation when an email is sent by a colleague, inviting the recipient to click on a website link which is infected with malware.

Staff should be trained to identify the different types of scams used by hackers, also how to behave in cyberspace. They should be aware of which sites they are not permitted to access, and so on.

Introduce limits for the employees who can access specific data and system by initiating account management processes. It can result in improvement in data loss management.

Evolving technologies bring new challenges and these must also be addressed in staff policies. For example, a home and mobile working policy is important, particularly if your business permits the use of “Bring Your Own Device”. Any staff member must understand the responsibilities related to connecting his or her own device to the system.

However there is no fixed solution to the threats related to cyber security. It is up to the organization to identify the risks and implement the training and policies accordingly.

Alertsec strengthens security

Alertsec has created a web based encryption service that radically simplifies deployment and management of PC encryption by using industry leading Check Point Full Disk Encryption (former Pointsec) software.

Organizations, especially corporate giants, have to have an information security policy in place that proves they have taken necessary steps and measures to safeguard the information they gathered. If these policies are not adhered to, the regulators may prosecute.

Alertsec Xpress is used by organizations that have recognized the need to protect their information. Customers range from single-user sole traders and consultants to multinational companies with a large number of offices around the globe. Over 4 million users worldwide use Alertsec Xpress’s Check Point Full Disk Encryption.

Enhanced by Zemanta

personal data of 4 million Advocate Patients at risk

August 2nd, 2013

Patients of Advocate Medical Group, located in Central Illinois are among those whose personal information may be at risk after four computers were stolen in a burglary of an Advocate administrative building in Park Ridge.

Advocate Medical Group is a physician-led group that includes about 1,000 doctors at more than 200 locations in the Chicago area and central Illinois. It is part of Advocate Health Care, the largest health system in Illinois with 13 hospitals.

The computers stolen did not contain any patient medical records, however  4 million patient’s information including names, addresses, dates of birth and Social Security numbers were compromised during this overnight burglary. The computers also contained some clinical information, such as medical record numbers, treating physicians and/or departments, medical service codes, diagnoses and health insurance data.

Advocate sent the letters about the burglary to an estimated 4.03 million patients, including people who have visited a doctor in the Advocate Medical Group.

Advocate’s chief medical officer, Kevin McCune, said in a statement “Security is a top priority for our health care ministry. Nothing leads us to believe that the computers were taken for the information they contained or that any patient information has been used inappropriately”.

Officials said that the stolen computers were password protected, but unencrypted.Security cameras were in place at the time of the burglary.

Security measures have been improved by the officials by adding 24/7 security personnel at the office where the break-in took place, said Stephanie Johnson, an Advocate spokeswoman.

The Park Ridge Police Department was notified after the break-in occurred, but till date they have not been able to recover the computers. Police officials did not return a call seeking comment.

When asked why patients were being noticed more than a month after the burglary, Johnson said: as the Advocate officials wanted to first conduct an internal audit to find out what data the computers contained and then inform the affected patients, the officials waited more than a month to contact patients after the data theft occurred.

Alertsec strengthens security

Alertsec has created a web based encryption service that radically simplifies deployment and management of PC encryption by using industry leading Check Point Full Disk Encryption (former Pointsec) software.

Organizations, especially corporate giants, have to have an information security policy in place that proves they have taken necessary steps and measures to safeguard the information they gathered. If these policies are not adhered to, the regulators may prosecute.

Alertsec Xpress is used by organizations that have recognized the need to protect their information. Customers range from single-user sole traders and consultants to multinational companies with a large number of offices around the globe. Over 4 million users worldwide use Alertsec Xpress’s Check Point Full Disk Encryption.

Enhanced by Zemanta