Survey: US firms lose laptops with sensitive data

17.08.2006

3. Monitor the network and possibly the endpoint for this information, and take appropriate action. In the beginning, this is simply logging. You could also prevent/block it, or even better encrypt it.

4. Encrypt data in the places where it is most likely to rest.

5. Plan your rights management strategy now. Data is ubiquitous.

In the future, organizations will have another option for data encryption, said Stephen Northcutt, president of the SANS Institute, a Bethesda, Md.-based cybersecurity training and certification company.

"The newest laptops and desktops are shipping with something called the Trusted Platform Module, and it's a chip that's designed for secure storage so it was built to play very nicely with [public-key infrastructure]," Northcutt said. "It's really a thing of the future. The laptops are shipping now, the software is available now, but the implementations don't exist right this second.