TITLE

Laptop Encryption: Pru Tackles 15K in a Month

AUTHOR(S)
Sausner, Rebecca
PUB. DATE
August 2008
SOURCE
Bank Technology News;Aug2008, Vol. 12 Issue 8, p19
SOURCE TYPE
Trade Publication
DOC. TYPE
Interview
ABSTRACT
An interview with Tom Doughty, vice president of information systems at Prudential, is presented. When asked about the drivers behind the mobile computing project at Prudential, he refers to take what were technically effective controls against data loss on laptops and to meet evolving external expectations. He suggests understanding and being comfortable with the ability to multiply user base, as well as selecting a full-disk encryption as opposed to file-based.
ACCESSION #
34060689

 

Related Articles

  • Defence of the data.  // New Scientist;1/19/91, Vol. 129 Issue 1752, p17 

    Comments on the return in January 1991 of a laptop computer containing battle plans for the recapture of Kuwait. Theft of the computer from a Royal Air Force (RAF) officer's car; Concern about whether the information was properly encrypted; British Ministry of Defense's refusal to discuss the...

  • Encryption Made Simple for Lawyers. Ries, David G.; Simek, John W. // Nebraska Lawyer Magazine;May/Jun2013, Vol. 16 Issue 3, p25 

    The article discusses encryption as a necessary security tool for attorneys to use in providing protection to information regarding their clients. It offers information on the use of encryption on devices such as full disk or limited encryption for laptops and portable media, and iOS 4 and...

  • Indiana Closes Loophole. Fisher, Dennis // Information Security;May2008, Vol. 11 Issue 4, p16 

    The article reports on a legislation in Indiana that closed the loophole in data breach notification law that allowed some companies to avoid having to disclose breaches involving sensitive data on a stolen laptop as long as it is password protected. The new version requires organization to...

  • Fare advice on valuables.  // Manager: British Journal of Administrative Management;Apr/May2005, Issue 46, p8 

    The article reports that a global survey of 900 taxi drivers shows thousands of valuable mobile phones, pocket PCs and laptops are forgotten in taxis every day. Businesses and individuals are being urged to use the password and encryption facilities available on the recent crop of high memory...

  • Letters. Emmons, Robert; Hartman, Bill; Maddox, Jeff; Libersky, Jim; Nerad, Shava // SC Magazine: For IT Security Professionals (15476693);Jun2015, Vol. 26 Issue 6, p7 

    Several letters to the editor are presented in response to previous articles including stolen Health CO-OP laptop in the May 3, 2015 issue, fallacies on default encryption hearing in the April 29, 2015 issue, and "The failure of the security industry" by Alex Stamos in the April 2015 issue.

  • protect laptop data. Radding, Alan // Storage Magazine;Feb2007, Vol. 5 Issue 13, p28 

    The article offers suggestions on protecting data stored in laptop computers in the U.S. Companies have enough reason to encrypt data on laptop computers. For one, the government is doing it. Through a memorandum, the U.S. Office of Management and Budget ordered government agencies to secure...

  • Protecting Campus Data. Angelo, Jean Marie // University Business;Sep2006, Vol. 9 Issue 9, p75 

    The article focuses on how universities in the U.S. protect data in laptops. William Penn University in Iowa uses LoJack for Laptops, an IT security product from Absolute Software designed to secure data and track lost or stolen portable machines. The University of Toledo in Ohio and Brown...

  • Get Your Data Safely Across the Border. Bradley, Tony // PCWorld;Nov2010, Vol. 28 Issue 11, p34 

    The article offers tips on how to keep data safe from government inspections and searches. When traveling by air, laptops could be checked along with the luggage to avoid having them inspected by the U.S. Transportation Security Administration (TSA). Since baggage handlers do not always treat...

  • 5 THINGS… THAT CAN KEEP YOUR LAPTOP'S DATA SAFE FROM PRYING EYES. Jardin, Xeni // Popular Science;Nov2005, Vol. 267 Issue 5, p81 

    This section offers tips on how to keep data private in laptop computers. Encrypt sensitive files, or even the entire hard drive, with an application such as SafeHouse or PGPdisk, which can also encrypt e-mail. Thieves can bypass user-account passwords by simply reinstalling the operating system...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics