in

This Blog

Syndication

Tags

News

AlertBoot offers a cloud-based full disk encryption and mobile device security service for companies of any size who want a scalable and easy-to-deploy solution. Centrally managed through a web based console, AlertBoot offers mobile device management, mobile antivirus, remote wipe & lock, device auditing, USB drive and hard disk encryption managed services.

Archives

AlertBoot Endpoint Security

AlertBoot offers a cloud-based full disk encryption and mobile device security service for companies of any size who want a scalable and easy-to-deploy solution. Centrally managed through a web based console, AlertBoot offers mobile device management, mobile antivirus, remote wipe & lock, device auditing, USB drive and hard disk encryption managed services.

Software Application Control: Manage Program Installations

Information security means more than installing encryption software.  Yes, encryption will protect the contents of your laptop or desktop computer if it gets stolen during a burglary.  But, that's just one aspect of data security.  What about hackers, who get to your data via non-physical means?

You'll want to have your software patched and up-to-date (although, some advocate not doing so because it may mess other critical software...which, honestly, is a little loopy).  You'll also want to have a firewall in place, which blocks unauthorized access from the outside while permitting communication to the outside (by you).

But sometimes, that's just not enough.  The reason?  Users.  Take this article, for example.  A data breach at the Illinois Department on Aging, according to the AP, was triggered because of a P2P file sharing program that was installed on a department computer.  By an employee.

Consider the implications.  This is not a hacker; you can have all the patches and firewalls in place; and the computer is not missing, yet there is a breach.  How can you protect yourself against this?

Since it involves an internet connection, it would make sense to perhaps block the port...except most P2P software uses the same port one uses for web surfing.  In other words, if you block P2P, you're also blocking general access to the web--not a good thing.

The solution may come in many ways.  Computer usage policies come to mind, but these are not quite effective at preventing the installation of problematic software.  More often than not, a usage policy's power comes after stuff hits the fan.  So what to do to nip the problem at the bud?

You may want to consider the use of software application control programs.  For example, the AlertBoot endpoint security suite offers--in addition to file encryption and disk encryption--a way to control which software is allowed to run on computers.

This control is exercised with the use of whitelists or blacklists.  Like the names imply, blacklists would catalog a directory of software programs that are not authorized to run on a computer, disallowing any software on the list from running.  Whitelists would do the reverse, and only programs on the list would be allowed to run.  It's more restrictive than blacklists, if you think about it.

 
<Previous Next>

Disk Encryption Lacking On Oklahoma FHA Laptop - 225,000 Affected

Data Encryption Is Used For Ransom In Virginia Department Of Health Data?

Comments

No Comments

About sang_lee

Sang Lee is a Senior Account Manager and Security Analyst with AlertBoot, Inc., the leading provider of managed endpoint security services, based in Las Vegas, NV. Mr. Lee helps with the deployment and ongoing support of the AlertBoot disk encryption managed service. Prior to working at AlertBoot, Mr. Lee served in the South Korean Navy. He holds both a B.S. and an M.S. from Tufts University in Medford, Massachusetts, U.S.A.