Seagate ST9500421AS Can Your Computer Keep a Secret? - Page 1
Seagate ST9500421AS - Momentus 7200 FDE 500 GB Hard Drive Manual
UPC - 000000000000
View all Seagate ST9500421AS manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 1 highlights
Technology Paper Can Your Computer Keep a Secret? Why All Laptop Data Protection Methods Are NOT Created Equal Hard Drive Passwords Easily Defeated It can be surprisingly easy to pull sensitive data, such as thousands of names and social security numbers, off laptops that are thought to be encrypted and secure. Recent data leakages (TSA, TJ Maxx) prove embarrassing and costly, and illustrate the necessity for robust security solutions. IT security research and advisory leader Trusted Strategies1 put the most prevalent hard drive data protection solutions to the test-and show how easy it is to crack frequently used technologies and get to valuable secrets. The Truth About Data Protection Companies may rely on password protection to safeguard data stored on their computer's hard drives, but in nearly all cases an attacker can easily disable the password lock and gain full access to the data on the drive. Theft of sensitive information from personal and enterprise computing systems is one of the fastest growing crimes in America.2 Ameriprise Financial, Ford Motor Company, the Department of Veterans Affairs and many others have lost millions of sensitive records stolen from their laptop computers.3 The costs in incident response handling, legal fees, corrective actions, loss of reputation and loss of customers can be crippling. Another daunting fact is that company management can be held personally liable for security breaches. A significant and increasing percentage of corporate data now resides at the edges of the enterprise on home office PCs and the laptop computers of mobile workers. Wherever it resides, protecting sensitive data is critical to an organization's business practices and overall success. Consequently, individuals and organizations are struggling to find cost-effective and user-friendly ways to keep sensitive data from falling into the wrong hands. 1 Trusted Strategies, LLC, www.trustedstrategies.com 2 National Crime Prevention Council, www.ncpc.org 3 Privacy Rights Clearinghouse, www.privacyrights.org