Absolute Software Corporate Data Protection: Important Practices for Employees and IT Departments

Absolute Software Corporate Data Protection: Important Practices for Employees and IT Departments. Check it out:
Absolute Software, leader in computer theft recovery, data protection and secure asset tracking solutions, advocates best practices to safeguard sensitive corporate data

VANCOUVER, Sept. 25 - Absolute(R) Software Corporation ("Absolute") (TSX: ABT), the leading provider of patented, firmware-based, Computer Theft Recovery, Data Protection and Secure Asset Tracking(TM) solutions, announced today best practices for corporate data security for both employees and IT departments. Key strategies include documenting policies, establishing and governing new business processes, and leveraging advanced security technology solutions.



"A data breach is a defining moment for an organization," said John Livingston, CEO of Absolute Software. "Without a proactive approach to mitigating the damage caused by the breach, an organization's exposure can be immense. A layered approach to data security helps companies eliminate the risks associated with the accidental or malicious disclosure of data through unsecured computers. This includes policies and practices that address regulatory compliance law, data protection, as well as computer theft recovery, because theft remains the root cause of data breaches and compliance risk."

Absolute Software advocates the following combination of written policies, business processes and technology to better protect corporate data from being compromised:

1. Identify and control access to sensitive information. Recognize what types of sensitive data your organization has, identify who needs access to specific information, and specify different levels of access/security clearance for individuals and departments

2. Create rules on how information is stored, accessed and transported. This includes on- and off-site practices, desktop, mobile device and removable drive guidelines, as well as controls for the download and remote transmission of specific types of information

3. Document "common sense" guidelines on laptop use and device security. Avoid accessing information in public places such as airports, buses, internet cafes; avoid unsecured wireless networks, etc., and monitor adherence using technology

4. Mandate data protection on all remote, mobile and local devices. Install and use encryption, strong authentication, firewalls, remote data deletion on lost or stolen devices, with special consideration for devices that carry sensitive data

5. Set rules for destroying and storing old data. Comply with local, state and/or federal security mandates as well as establish internal initiatives for effective data storage and audits

6. Establish mandatory compliance to user authentication. Validate the identity of users to devices (e.g., multi-factor authentication, biometrics) and require re-authentication after specified periods of inactivity

7. Develop procedures for managing corporate database transactions. Identify when to make only partial information available (e.g., extracts/views of sensitive information), and log and monitor all data access for anomalies

8. Create a contingency plan. Identify the resulting damage to the enterprise in the event of a potential breach and develop protocols to mitigate risk

9. Protect all mobile devices and notebooks. Use asset tracking and recovery software to monitor the location of devices, reducing the risk of data breaches due to loss and theft, and assisting with adherence to regulatory compliance

10. Evaluate policies, processes and technology on an ongoing basis. Regular dissemination of best practices helps explain roles and responsibilities throughout the organization. Understand that security is not something put in place once and then forgotten about.

For more information on Absolute Software and its range of Computer Theft Recovery, Data Protection and Secure Asset Tracking solutions, please visit www.absolute.com.

For more information on Absolute's success in protecting computer data and recovering lost or stolen computers, please visit http://www.absolute.com/Public/successstories/default.asp

About Absolute Software
Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking(TM) solutions. Absolute Software provides organizations and consumers with solutions in the areas of
regulatory compliance, data protection and theft recovery. The Company's Computrace(R) software is embedded in the BIOS of computers by global leaders, including Dell, Lenovo, Gateway, HP and Fujitsu, and the company has reselling partnerships with these OEMs and others, including Apple and Toshiba. For more
information about Absolute Software and Computrace, visit www.absolute.com.

For More Information contact: Walter Ocner at Affect Strategies 212-398-9680 x 140

Forward-Looking Statements
This press release contains forward-looking statements that involve risks and uncertainties. These forward-looking statements relate to, among other things, the expected performance of our services and products and other expectations, intentions and plans contained in this press release that are not historical fact. When used in this press release, the words "plan," "expect," "believe," and similar expressions generally identify forward-looking statements. These statements reflect our current expectations. They are subject to a number of risks and uncertainties, including, but not limited to, changes in technology and general market conditions. In light of the many risks and uncertainties you should understand that we cannot assure you that the forward-looking statements contained in this press release will be realized.
The opinions and views expressed in comments, blogs, etc. are those of the authors alone and not necessarily those of TMC, TMCnet, or its editors. TMCnet reserves the right to edit, delete, or otherwise make changes to the content that appears on these pages at its own discretion and as it deems necessary.

Listed below are links to sites that reference Absolute Software Corporate Data Protection: Important Practices for Employees and IT Departments:

Around TMCnet Blogs

Latest Whitepapers

TMCnet Videos