News item

Data encryption protects your business and customers

Data Protection Act requires that data is 'kept safe and secure'. Encryption can help you meet your legal obligations.

Detailed and sensitive business data is being stored on employees' computers, whether it as files directly on the hard drive or as cached copies of emails and their attachments. Users often believe that a login password is sufficient to protect their data but it is low-level protection and relatively easy to circumvent.

Are you exposing your business and customers to data theft?

"Many users may not realise the amount of sensitive information they actually have on their laptop. As a business, you have an obligation to ensure that the information is held securely not only to protect your own business but to protect your customers too," explains Chris Joberns, Strident's managing director.

If you are a mobile user with a laptop there is a greater chance of loss or theft than those based in the office but securing your data is good practice for everyone. "Many users have a password to login but this does not protect the data and can be circumvented relatively easily."

"The current Data Protection Act requires that data is 'kept safe and secure and not transferred outside the European Economic Area without adequate protection'. Newly proposed legislation will see those requirements become even more stringent with big fines for those who do not comply," adds Chris.

ESET Data Protection provide powerful encryption

Data encryption goes beyond a simple login password. It places all the data on the computer in a secure wrapper that prevents unauthorised access even if the computer's hard drive is removed and attacked directly.

ESET Data Protection software provides simple and powerful data encryption for organisations of all sizes. It will safely encrypt hard drives, removable media, files and email. A password must be used before the Windows operating system even starts.

ESET Data Protection uses highly secure 256-bit AES encryption and can be easily managed by IT administrators. Security policies can be applied to all users from a central, cloud-based management server for full control and enables laptops to started and data to be retrieved even if the user forgets their password.