Skip to content

Information Security Training

Online Network Security Training Services

Menu
  • Home
  • About us
  • Training Materials
    • By Position
    • All employees
    • Business Owners
    • Company Secretary
    • Compliance Managers
    • Directors
    • Human Resource Managers
    • IT Managers
    • By Position
    • Legal Directors
    • Management
    • Procurement
    • Sales and Marketing
    • Team Leaders
    • Training Managers
    • By Interest
    • Corporate Governance
    • Fraud Prevention
    • Free Resources
    • Information Security
    • Data Protection
  • Our Experts
  • Contact Us
  • Blog

Mobile Data Security

The Threats of Mobile Data Storage Devices

Today’s working lifestyle typically means data is mobile and carried across a multitude of devices that include: desktop PCs;  laptops; notebooks; smartphones;  PDAs; USB drives and CDs.  iPods, MP3 players and even digital cameras can now be used to store valuable data.

Every day sees another headline that exposes the vulnerabilities of these devices.

Here are just a few:

An estimated 9,000 USB sticks have been left in people’s pockets each year when they take their clothes to the dry cleaner.

A survey among London taxi drivers in September 2008 revealed that 6193 handheld devices are left behind by their customers every six months. (Source: Computer Weekly, January 2009)

These statistics fail to convey the costs that you will have to pay if any data on lost or stolen devices is compromised. In the US, studies have put the cost of losses following a theft or loss of data at about $75 per record lost. So if you lost 20,000 customer records that is a lot of money to take off the bottom line.

Our materials will help you to establish four key phases of data protection.

Detect: You can’t begin to protect data unless you can detect the devices where it is stored.

Protect: The protection of data (by encryption) has to be enforced.

Manage: Not only does data have to be protected, but also it will be necessary to provide management, audits, reports, and monitoring systems to prove that protection was in place in the event of a theft.

Support: Users forget passwords; data has to be recovered from discarded media and staff need to be able to identify the associated risks of different storage options.

 

Essential Security Guidelines

Our training catalogue contains a free demonstration on How to Encrypt a USB Drive.  In addition we strongly recommend that you purchase our ‘Mobile and Portable Data Protection: A Practical Guide.

News

Key Elements of the Bribery Act

The Act aims to modernise and simplify existing legislation to allow prosecutors and the courts to deal with bribery more effectively. Tough penalties will be introduced against individuals and organisations found guilty.

see more
The Impact of Fraud

According to the BDO Stoy Hayward survey, the total cost of fraud in 2008 increased to £1.19 billion, up 14% from 2007. Reported fraud cost the UK £960 million in the first half of 2009. This figure represents ‘the tip of the iceberg’.

see more

Other News

Bookmark and Share

verified by visa mastercard securecode Click for company profile

  • Privacy Policy
  • Ts&C’s
  • Accessibility
  • Web Design Company adeogroup.co.uk
  • SEO by ICTAdvisor.com

Information Security Training 2022 . Powered by WordPress