Skip to content
Awareity
Primary Navigation Menu
Menu
  • Home
  • About
    • About
    • Awareity Butterfly Effect
    • Contact
    • Support
  • Solutions
    • Information Security Training
      • Information Security Awareness Training
      • Awareness and Accountability Vault (AAV)
    • Prevention and Connecting the Dots Platform
    • Prevention and GAP Assessment
    • Threat Assessment Teams
    • Climate Surveys
    • Resellers
    • Industries
      • K12
      • Higher Education
      • Diocese
      • Healthcare
      • Government
      • Corporate
  • Blog
  • Info Request

Would you rather manage Lessons Learned or manage Data Breaches?

By: Awareity
On: July 15, 2009

As People continue to accumulate numerous passwords for their online social networking sites, personal e-mail and online banking, most People seem to have no problem logging in with different passwords for different applications to protect THEIR PERSONAL information.

So we know People can handle passwords! 

The key then for Managers (including IT Managers) is to help People (boards, employees, vendors, contractors, partners, etc.) understand the importance of THEIR ORGANIZATION’s information.

However, a recent survey by Credant Technologies revealed that 35% of IT Security professionals do not use a password on their business phones or smartphones, even though they contain sensitive and confidential information!  Information may include: business names and addresses, business and personal e-mails, bank account details, credit card information, photos, and even passwords and PIN numbers.  If a mobile device goes missing and it contains corporate or personal data within business e-mails, then an organization is immediately in breach of one or more data protection acts for failing to protect electronic data and exposing clients and personnel to identity theft.   

If 35% of IT Security professionals are not implementing best practices and protecting this information, why are we surprised that non-security professionals are not following policies and procedures??

This survey is yet another example showing how the lack of implementation can lead to embarrassing, expensive and unnecessary data breaches, non-compliance related fines and lawsuits. 

Most likely, your organization has a policy stating password requirements for securing mobile devices, but has this policy been implemented at the individual-level? 

Can you ensure that all of your employees have read and understood these requirements and have implemented the appropriate passwords and encryption on their mobile devices? 

How do you make your employees accountable for implementing their responsibilities and obligations?

Share this post to help us connect the dots...Share on Facebook
Facebook
Tweet about this on Twitter
Twitter
Share on LinkedIn
Linkedin
Email this to someone
email
Print this page
Print
2009-07-15
Previous Post: Kansas Audit Reveals Questions and Lack of Implementation
Next Post: Weekly Update: Implementing Lessons Learned

READ MORE:

WATCH MORE:


Get Solutions For Your Challenges!
 
 
 
 
 
 
Don't worry, we will only call if you request "Phone" as your contact preference. We hate spam calls too!


Not seeing the form to request information? Drop us a line and we'll send you more information!

Recent Blog Posts

Cyberattacks: The Solution Requires EVERYONE Staying Alert and Aware

January 18, 2021

Nashville Attack – A Call to Action to Revolutionize Community Safety

January 12, 2021

Threat Assessment Teams: Six Tools Most Community and Organization TATs Are Missing

January 7, 2021

Connecting the Dots: Stopping Human Trafficking

November 5, 2020

Ransomware Solutions: Ongoing Awareness and Accountability Vault

October 1, 2020

Support

Need more information on
Support for AAV or TIPS?

Click here

What are you looking for?

Connect the Dots With Us!

| |

Designed using Dispatch Premium. Powered by WordPress.

This site uses cookies to ensure that we give you the best experience on our website. Continuing to use this site means you are agreeing to the use of cookies.Ok