Home: June - July 2006 › Uncompromised Security

Uncompromised Security

31/07/2006 | Channel: Technology, Logistics / Packaging, E-Business / IT, Retail, Business, Manufacturing, Aerospace, Automotive, Engineering, Shipping, Construction, Food & Drink

Dear Editor,

The impact of hacker attacks and data breaches can be potentially devastating and very often the danger comes from within.


And with the stakes having recently been raised with the ICO data breach fines overhaul, it is also the responsibility of IT hardware manufacturers to come together with organisations in both the corporate arena and public sector to help them tackle this issue, and eliminate potentially crippling incidences.

If a company recruits an individual and provides them with a user name and password to access data, it is invariably as a result of interviews, references and possibly conducting pre-employment security screening. But what happens when that individual ceases employment?

The moment this person ceases to use a PC, is the point at which all data should be erased to guarantee total end-of-life compliance with the Data Protection Act. Failure to achieve this will open the organisation up to a myriad of risks, including the person who removes the decommissioned item who is unlikely to have been subjected to the same checks as the authorised user.

Manufacturers supplying IT hardware must begin to recognise every organisation’s increasing need to protect its data by delivering innovative solutions such as pre-installed data erasure products and services such as in-house recycling facilities to help customers intelligently tackle the growing problem of data breaches. So often, this involves bringing together product design with a customer’s own people and processes, as well as providing a failsafe disposal service when items are displaced.

Only through this level of cohesion can data breaches be minimised.

James Bird CEO, Stone
www.stonegroup.co.uk