COLUMBUS, Ohio -- Redemtech (www.redemtech.com), a leading provider of Technology Change Management (TCM) and IT Asset Disposition (ITAD) services, today released a new white paper: Preventing Off-Network Data Breaches: Securing the Final Mile on best practices organizations can implement to better protect equipment when it is removed from the network.
The recommendations are designed to close the gap revealed by a 2007 survey by the Ponemon Institute commissioned by Redemtech. Security professionals at mid-market to global 100 companies were surveyed to evaluate the state of their off-network security practices. Off-network security covers any data-bearing device, including computers, copiers, printers, CDs, tapes, memory sticks, smart phones, PDAs and iPods, that are not attached to an active data network and therefore not systematically visible during moves, storage or retirement.
"This white paper identifies the best practices that are essential in closing the off-network security gap, which the Ponemon study found affects three out of every four companies," said Robert Houghton, president of Redemtech and author of the report. "Security professionals have been trained to protect the network from intrusion, but often lack the policies and processes to ensure data is protected when devices are removed from the network. It's vital to lock all the doors both on and off the network, especially as data breach costs continue to rise. Just the cost of lost business has gone up 30 percent from 2006 to 2007."