Skip to content
Awareity
Awareity

The Pre-Incident Prevention Experts

Primary Navigation Menu
Menu
  • Home
  • About
    • About
    • Awareity Butterfly Effect
    • In The News
    • Contact
    • Support
  • Solutions
    • Information Security Training
      • Information Security Awareness Training
      • Awareness and Accountability Vault (AAV)
    • Prevention and Connecting the Dots Platform
    • First Preventers Framework
    • Prevention and GAP Assessment
    • Threat Assessment Teams
    • Climate Surveys
    • Partners in Prevention
    • Industries
      • K12
      • Higher Education
      • Diocese
      • Healthcare
      • Government
      • Corporate
  • Blog
  • Info Request

Would you rather manage Lessons Learned or manage Data Breaches?

By: Awareity
On: July 15, 2009

As People continue to accumulate numerous passwords for their online social networking sites, personal e-mail and online banking, most People seem to have no problem logging in with different passwords for different applications to protect THEIR PERSONAL information.

So we know People can handle passwords! 

The key then for Managers (including IT Managers) is to help People (boards, employees, vendors, contractors, partners, etc.) understand the importance of THEIR ORGANIZATION’s information.

However, a recent survey by Credant Technologies revealed that 35% of IT Security professionals do not use a password on their business phones or smartphones, even though they contain sensitive and confidential information!  Information may include: business names and addresses, business and personal e-mails, bank account details, credit card information, photos, and even passwords and PIN numbers.  If a mobile device goes missing and it contains corporate or personal data within business e-mails, then an organization is immediately in breach of one or more data protection acts for failing to protect electronic data and exposing clients and personnel to identity theft.   

If 35% of IT Security professionals are not implementing best practices and protecting this information, why are we surprised that non-security professionals are not following policies and procedures??

This survey is yet another example showing how the lack of implementation can lead to embarrassing, expensive and unnecessary data breaches, non-compliance related fines and lawsuits. 

Most likely, your organization has a policy stating password requirements for securing mobile devices, but has this policy been implemented at the individual-level? 

Can you ensure that all of your employees have read and understood these requirements and have implemented the appropriate passwords and encryption on their mobile devices? 

How do you make your employees accountable for implementing their responsibilities and obligations?

2009-07-15
Previous Post: Kansas Audit Reveals Questions and Lack of Implementation
Next Post: Weekly Update: Implementing Lessons Learned

READ MORE:

WATCH MORE:

Not seeing the form to request information? Drop us a line and we’ll send you more information!

Recent Blog Posts

Higher Ed Research facts, silos, and different actions

April 10, 2025

Community Research facts, silos, and different actions

April 10, 2025

K12 Research facts, silos, and different actions

April 3, 2025

Bias-based Decisions Can Be Overcome

December 4, 2024

First Preventers Believe…

October 18, 2024

Rick Shaw, Founder & CEO

Click here to learn more about Founder, CEO, and Prevention Specialist, Rick Shaw.

Awareity on Twitter

Tweets by Awareity

Search

Tweets by Awareity

Support

Need more information on
Support for AAV or TIPS?

Click here

What are you looking for?

Connect the Dots With Us!

 | |

Designed using Dispatch Premium. Powered by WordPress.

This site uses cookies to ensure that we give you the best experience on our website. Continuing to use this site means you are agreeing to the use of cookies.Ok