Lose the flash drive – not the data
People often take flash drives, discs, and laptops full of data out of their workplaces because they need to continue working and it is too difficult or impossible to access the data they need any other way. Of course, working from a smartphone is nearly ubiquitous and phones can now store quite a bit of data rather than just be a means to access email or the internet. According to the Ponemon Cost of a Data Breach study, 39% of organizations had a data breach and data loss as a result of a lost or stolen mobile device, which included laptops, smartphones, tablets and UBS drives that contained confidential and sensitive information.
Increased access to web portals should allow more business to be conducted remotely without having to store the data directly on the PC, flash drive or mobile device. Moving critical business operations online or into the cloud provides faster and more efficient services for customers, partners, and employees. Combining strong two-factor authentication with a VPN infrastructure means that organizations can provide a secured environment for all users that goes beyond the encryption in the VPN to trusted user authentication.
This layered approach to security results in a reasonably non-intrusive authentication process. Users can collaborate with the organization more easily and securely, making it simpler and more cost-effective to give more users access to a VPN solution. Rather than absorbing the potential increased cost of a breach caused by lost devices — up to $22 more per person, per incident, for a lost laptop or other device according to Ponemon — using a VPN with two-factor authentication allows remote offices, teleworkers, and partners access to the critical applications and sensitive data that resides within their corporate networks.
To learn more about establishing trust in remote users and developing secure information sharing environments, contact one of our specialists.
Recommended For You
Technology Provides Faster, More Accurate Claim of Benefits The current benefit eligibility verification process is a daily burden for case […]
You have a lot of customer data — housed in a lot of different locations. You’re working hard to make […]
Government agencies face two key challenges: budgets under pressure and programs have to be streamlined to fight off fraud, waste, and […]
In the communications and digital media industry, acquiring customers isn’t necessarily the biggest challenge. It’s finding and keeping the high-value […]