When I first heard about UEFI a few years ago I thought it was a great idea. It could make life easier in the long run for developers of full disk encryption to provide advanced authentication and maintenance features for their customers. With this in mind I joined WinMagic up to UEFI.org. Having implemented pre-boot authentication on Apple Macs, which used EFI, we were already familiar with UEFI’s predecessor.
Lately we have noticed a growing interest for encryption and data security in the legal services industry. Legal services face a similar challenge as other verticals with the need to protect corporate assets being shared through multiple devices and portals. An effective encryption can help significantly reduce liability, negative public image and hefty fines resulting from lost or stolen data.
Recently it was revealed that Oregon Health & Science University (OSHU) staff were storing patient data in a cloud storage solution – namely, Google Drive. What’s the big deal? It’s Google, it has to be secure right?
With the growing world of technology, the IT manager is plagued with the grueling task of technology audits. Audit checks are carefully planned, controls are tested and evaluated, and then reports help identify problem areas to work on. The method in which you choose to audit an organization depends greatly on the organization; nonetheless, one factor of auditing should not be overlooked—the follow-up.
As discussed in a previous post, data breaches continue to be a growing concern for organizations in the healthcare industry. Health organizations are looking for a cost effective and reliable data security solution that can protect their data, ensure compliance, mitigate business risks and decrease IT administration costs. With the mobile nature of the healthcare work force coupled with the increasing popularity of Self Encryption Drives (SEDs), the need for a solution the can manage all devices in one centralized location becomes even more imperative.
When I attended the Gartner Security & Risk Management summit a couple of weeks ago, I attended a session about Encryption Planning Made Simple. It was a good look at some of the issues facing organizations today and the barriers to the adoption of data encryption solutions.