Preventing Data Theft from Lost Devices

A recent article by J. Randolph and Shari Klevens of the Dentons Law Firm had some eye opening statistics concerning lost media devices –

“In the United States, someone loses a cellphone every 3.5 seconds. More than 3 million cellphones are stolen every year. More than 12,000 laptops are lost in airports each week. Other portable electronic devices, ranging from BlackBerrys to iPads to many others are lost just as frequently Almost every attorney’s portable electronic device includes some confidential client information.”

Those numbers would make most company executives and senior management breakout in a cold sweat over their morning coffee. But there are some simple steps as Klevens and Randolph relate to help combat this threat besides considering professional assistance from security professionals outside the organization. Here are four steps to preventing data theft. 

Step One: Password­ protect devices

Company personnel should be required to use passcode­ or password ­protected portable electronic devices.

Step Two: Activate location and remote­ erase options

Most new devices have the ability to locate the device if lost or stolen and, if desired, to remotely erase all content on the device. If your company devices do not you should consider purchasing software applications that provides that capability.

Step Three: Apply protocols to portable storage devices

Transportable data via thumb drives, disks, memory sticks and other data devices pose considerable risk to businesses when they are lost. Companies should consider requiring any information downloaded from a firm’s systems to a portable storage device to be password­ protected.

Step Four: Address Wi­-Fi risks

Free, publicly accessible Wi-Fi services are not secure. The biggest threat for employees using free Wi-Fi is the ability for someone else to intercept a signal—positioning a cyber thief between the employee and the connection point. Encourage employees to avoid unsecured Wi-Fi hot spots. Better yet consider encrypting the data from the device using commercially available software or the use of a virtual private network (VPN).

Applying these four steps does not make  a company 100% secure in combatting potential sensitive data loss, but it definitely puts it well on its way and can be enhanced by leveraging outside professional help.


Source: Industry News

2017-03-15T13:00:45-05:00

Despite our offices being closed to the general public, please know that we are operating and are fully functional. read more...

The coronavirus (COVID-19) has ushered in an unprecedented new reality with a far-reaching impact on families and businesses. Alliant remains steadfastly committed to serving as a pillar of strength and support for the valued clients and communities we serve. The health and safety of our employees and clients is of utmost importance to us.

Despite our offices being closed to the general public, please know that we are operating and are fully functional. We have encouraged our employees to work from home and continue to deliver the highest level of customer service with as little disruption as possible. As we continue to monitor and adapt to this everchanging situation, we will endeavor to keep you updated. The link below provides several resources for businesses owners and will be updated frequently.

https://insurance.alliant.com/SpecialtyCOVID19-Questions