Most people know that it’s more than just the physical hardware; that the data is valuable as well. However, most people don’t know exactly how valuable that data is. For example, when you lose a Windows based laptop, you’ll also lose the user’s domain password (cached), the password of the last 10 people to log on – possibly even a domain admin, all email – even if email is stored on the server the confidentiality is compromised, all files recently opened – Even if those files were encrypted on a server drive, the key to every wireless access point ever used, and any remembered data in browsers – such as banking passwords, addresses, credit card numbers.

We don’t think of this data because we don’t see most of it – but for performance and ease of use reasons, Windows keeps a copy of pretty much everything you’ve used, opened or visited. The effect of a laptop theft could be devastating.

You could use file encryption and file system encryption to make it more difficult to retrieve some of this data, but it can be difficult to manage – and can especially cause problems if an employee leaves or forgets their password! It’s also not entirely secure. Operating systems can be cracked offline, completely bypassing the encryption.

The answer is centrally managed whole disk encryption. This type of encryption replaces the Windows bootloader, and encrypts everything – including the Windows kernel, making offline compromise of the operating system extremely unlikely.

Integrating tightly with Active Directory, user management is easy – when the user changes their password, their encryption password changes too. If the user forgets their password, an administrator can unlock the computer for them.

If you need further security, Technetics can design and implement encryption systems that can automatically encrypt email – managing encryption keys, and even auto-enrolling third parties into the system. We can even include file server encryption, preventing the retrieval of data if a file server is stolen, or compromised remotely. Without the correct key, even domain admin rights don’t help a hacker get access to protected files.

And unlike earlier solutions, encryption has become nearly transparent to the end users. There is no need to manage keys, repeatedly enter passwords, or manually encrypt or decrypt anything. All this is managed by policies set by the administrator.

If you believe you have data worth protecting – and remember passwords and history is data that can be stolen, then it might be worth talking to us about how to protect that data.

Stop the leakage of data immediately.

Hacker protection is all very well and necessary, but what are you doing to reduce business risk resulting from data leaking from your network? Information leaving your network creates more danger to your business than the damage caused by what is coming in.

Data loss can happen anytime, anywhere; whether from an employee sending data out with an e-mail message, or simply by plugging in a USB flash drive and copying the data. A typical scenario is a resigning employee copying company assets for personal or malicious use. Data leaks can come from:

  • Blogs
  • Desktops, for example CD drives, USB flash drives
  • E-mail attachments
  • FTP
  • Instant messaging
  • Smart phones
  • Webmail

Laws that make your business liable for data protection, governance and privacy have made it even more essential that you plug the leaks.

  • Step 1 – Define your data types;
  • Step 2 – List all possible actions on that data;
  • Step 3 – Compile a policy, and
  • Step 4 – Speak with Technetics today and we can work out a solution, with you, to protect your valuable company assets, confidential data and customer information from accidental and/or deliberate disclosure.

Database Security & Auditing

How reliable are your organisation’s databases?

Audit your databases and plug-in holes that could be causing data leakage.

Your organisation relies on data on a daily basis to make decisions and perform its regular functions. This makes data the most important thing for an organisation. Technetics’ database audit services involves observing and auditing databases in order to be aware of the actions of database users and operations that take place. This is to ensure that information is not accessed by those without the permission to access it.

Technetics can provide a complete audit of your database infrastructure and provide recommendations to improve your security and compliance. Contact us today for more information.

Let’s Get Started!

Fill out your details below and we will be in touch with you