Redemtech Releases Off-Network Security White Paper

Share Article

Redemtech, a leading provider of Technology Change Management (TCM) and IT Asset Disposition (ITAD) services, today released a new white paper: Preventing Off-Network Data Breaches: Securing the Final Mile on best practices organizations can implement to better protect equipment when it is removed from the network.

Redemtech, a leading provider of Technology Change Management (TCM) and IT Asset Disposition (ITAD) services, has released a new white paper: Preventing Off-Network Data Breaches: Securing the Final Mile on best practices organizations can implement to better protect equipment when it is removed from the network.

The recommendations are designed to close the gap revealed by a 2007 survey by the Ponemon Institute commissioned by Redemtech. Security professionals at mid-market to global 100 companies were surveyed to evaluate the state of their off-network security practices. Off-network security covers any data-bearing device, including computers, copiers, printers, CDs, tapes, memory sticks, smart phones, PDAs and iPods, that are not attached to an active data network and therefore not systematically visible during moves, storage or retirement.

"This white paper identifies the best practices that are essential in closing the off-network security gap, which the Ponemon study found affects three out of every four companies," said Robert Houghton, president of Redemtech and author of the report. "Security professionals have been trained to protect the network from intrusion, but often lack the policies and processes to ensure data is protected when devices are removed from the network. It's vital to lock all the doors both on and off the network, especially as data breach costs continue to rise. Just the cost of lost business has gone up 30 percent from 2006 to 2007."

Considering that 70 percent of data breaches result from the loss of off-network equipment, the white paper outlines the six off-network security processes every organization should employ to ensure assets are protected. They include implementing effective management systems, controlling and limiting inventory, creating documentary audit trails, ensuring reliable accounting processes are in place, and measuring the effectiveness of procedures and the means for improving them.

The white paper, Preventing Off-Network Data Breaches: Securing the Final Mile, and the Ponemon Institute study, National Survey: The Insecurity of Off-Network Security, are both available on the Redemtech Web site.

About Redemtech
Redemtech Technology Change Management (TCM) services help organizations increase IT asset utilization and assure regulatory compliance during technology transitions. Redemtech provides an outsourced solution to TCM that uses best practices and automated technologies to implement and manage processes for deploying, redeploying and decommissioning computer systems. Redemtech clients can realize a 40 to 70 percent reduction in asset recovery and disposition costs, while achieving 100 percent warranted data security and environmental compliance assurance. Redemtech is a wholly owned subsidiary of Micro Electronics, one of the largest privately held technology companies in the United States. For more information on Redemtech, visit Redemtech's Web site.

###

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Amanda Shirka
Visit website