Safeguarding confidential data that resides on computers is a major security challenge facing public and private organizations alike. We believe we have a good answer.
Today, confidential and sensitive data is left in the custody and care of an increasingly mobile workforce. Data production and storage is no longer limited to workstations; employees carry their laptops home and on the road, thereby physically exposing confidential data to loss or theft. Data residing on office computers is highly sensitive and may include unpublished research, source code, intellectual property, customers’ personal information, employee records and financial reports – all subject to theft and highly vulnerable to unauthorized access.
Huge potential fines for negligence
All organizations have a financial and legal interest in preventing unauthorized access to sensitive information. Considering that the costs of stolen or lost confidential data increase as state and federal governments pass breach disclosure laws, and that many of these laws require notification and remediation when personal data is lost or stolen, data breaches can result in millions of dollars in customer notification costs, noncompliance fines, possible lawsuits, and company reputation damage.
57% of corporate crimes linked to stolen laptops
Several polls and studies all point to increased incidences of sensitive data being lost or stolen from government organizations, academic institutions, and businesses. From FBI statistics in 2014, one out of ten laptops are lost or stolen. In the period from 2011 to 2014, 5.500.000 laptops were stolen only in US. Further FBI reports that 57% of corporate crimes are linked to stolen laptops. It is evident that the laptop protection is one of the weakest part in the chain and data is at risk.
Hardware data encryption
A logical solution is to protect the data at its storage location. All data encryption products share the goal of encrypting plain text into a format that cannot be interpreted by unauthorized individuals. Encrypting all data on a diskprovides an effective barrier between unauthorized users and all data stored on the computer, including boot up system files and temporary files, files that can contain confidential data useful to attackers. No one can access any of the data on the drive until the encryption system has confirmed the user as authorized. The encrypted data has to be decrypted to its original form in order to be read.