About us | Advertising | SecurityWatch
Home   Articles   Blog   Reviews   Press Releases   Security Tools   Sponsored Solutions
Press Releases
Data deletion is not enough, IT managers warned
Thursday, 13 October 2005 18:08 EST

Companies must develop stronger policies to reflect the changing reality of mobile working

IT managers must formulate better policies to protect mobile devices, UK encryption firm BeCrypt warned today, especially relating to the deletion of files from mobile devices.

Recent industry calls for secure data deletion do not go far enough, the company warned, after it recovered data that had supposedly been ‘deleted’ from storage media such as USB sticks and memory cards purchased online. BeCrypt recovered mobile telephone contact databases, business material including corporate launch information for a new Land Rover, MP3 files, GCSE coursework, family photographs and pornography using software purchased at nominal cost from the internet.

According to the UK Home Office more than 100,000 people per year fall victim to identity theft at a cost of more than £1.3 billion per year. Gartner estimates that the number of mobile email devices, such as Blackberries and other PDAs, will hit 80 million globally within three years.

“With the proliferation of mobile devices in business, it is critical that IT managers implement policies to protect all corporate data whether the data is used inside the firm or transported on mobile devices,” said Peter Jaco, CEO of BeCrypt. “Staff need to be educated as to the potential risks of losing data and firms need to deploy software to encrypt data held on corporate peripheral devices. Deleted files, as we have demonstrated, can be easily recovered using freely purchased software on the web, but if the data was encrypted as part of a corporate security policy, or by the home user in the first place, the data would be safe.”

Reformatting magnetic memory such as a hard disk drive, or electronic memory such as a USB memory stick, results in only the file allocation table being erased and typically files themselves are left intact until they are subsequently overwritten. This means data can still be recovered using data recovery tools.

BeCrypt’s DISK Protect 3.0 full disk encryption security solution for laptop and desktop computers incorporates removable media encryption. Data saved onto memory cards and USB drives is encrypted and cannot be read on any other machine.

BeCrypt analysed a number of devices purchased on eBay for between £5 and £10 each, all of which contained recoverable information. A fifth contained personal information that could be used for identity theft. All but three of the devices appeared to have been freshly formatted or had all the data erased using tools provided as part of the computer’s operating system.

All devices purchased as part of the BeCrypt survey campaign have been encrypted and destroyed.

About BeCrypt

BeCrypt Limited was formed in 2001 to meet the growing demand for high-level computer encryption products in the international government and corporate marketplace. The company is the UK’s largest supplier of enterprise encryption and security products designed to fully protect all corporate data. BeCrypt products protect customers in key UK government areas including: central and local government, the military and defence sector, law enforcement and transportation. The company also services the commercial sector with key customers in financial services, pharmaceutical, insurance and banking sectors. BeCrypt features on Gartner’s magic quadrant for data encryption.

BeCrypt’s DISK Protect and PDA Protect products have been designed to meet stringent government security standards and have been approved by the UK Government.

BeCrypt has won an award from the Department of Trade and Industry for innovative technology and has patents pending on a number of unique security technologies.

Further information at http://www.becrypt.com



Featured Articles

Tribal thinking in today’s IT
George Santayana once famously observed; “Those who cannot remember the past are condemned to repeat it.”. But when it comes to IT security, a better way of thinking might be; “those who fail to understand the impact of the past on their thinking may find themselves somewhat exposed”…

You can’t manage what you can’t see!
Security threats have grown more menacing with the appearance of the likes of Sober, Mytob, and Bagle. Along with the newer trends of spyware, phishing and key logging the implications of ineffective information security have become potentially debilitating to business operations and indeed strategy.

The development and execution of an endpoint security strategy is an increasingly important and urgent issue for businesses of all sizes. Many are executing – or wanting to execute - flexible working practices and organisation models that leverage contemporary technology.

Scan all company email for viruses, Trojans and worms with 4 virus engines, all in one package - GFI MailSecurity for Exchange/SMTP! Download your free 60-day trial today!

Check your website security with Acunetix Web Vulnerability Scanner. Audit your web applications for SQL injection, cross site scripting & more. Download trial!

Network Security Tools

SpyDefense
SpyDefense protects your computer against annoying, and harmful software such as Spyware, Adware, Trojan horses, etc. SpyDefense is anti-spyware software that prides itself on a very user friendly environment.


Proactive Security Auditor
Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks.


File Securer
File Securer is a powerful tool designed to protect your sensitive folder and personal file. With strong security, File Securer embeds the protect into windows system kernel, both on command mode and window mode, all work professionally.




What's up, IT? Blog

Phishing By The Numbers: 41,000 Blocked Sites in 2005
Top 7 PHP Security Blunders
The human factor and information security
Why I Love Vulnerability Analysis In 2005
IT security fear factor: Tape backups
Uncovering Cyber Flaws
State of the security mart
When the hardware gets smart
Security for SMBs
Four Security Resolutions For The New Year

Copyright © IT-Observer.com 2000 - 2006    Privacy Policy | RSS Feeds
Site Meter