With the growing world of technology, the IT manager is plagued with the grueling task of technology audits. Audit checks are carefully planned, controls are tested and evaluated, and then reports help identify problem areas to work on. The method in which you choose to audit an organization depends greatly on the organization; nonetheless, one factor of auditing should not be overlooked—the follow-up.
As discussed in a previous post, data breaches continue to be a growing concern for organizations in the healthcare industry. Health organizations are looking for a cost effective and reliable data security solution that can protect their data, ensure compliance, mitigate business risks and decrease IT administration costs. With the mobile nature of the healthcare work force coupled with the increasing popularity of Self Encryption Drives (SEDs), the need for a solution the can manage all devices in one centralized location becomes even more imperative.
When I attended the Gartner Security & Risk Management summit a couple of weeks ago, I attended a session about Encryption Planning Made Simple. It was a good look at some of the issues facing organizations today and the barriers to the adoption of data encryption solutions.