Encrypt data stored off site, warns Louisiana agency
Unencrypted data from college scholarship inquiries lost from Iron Mountain truck
Computerworld - The loss of unencrypted storage media from an Iron Mountain Inc. vehicle last month renewed calls for IT managers to better protect data stored off site.
The Louisiana Office of Student Financial Assistance (LOFSA) said the unencrypted data lost from the vehicle of its contractor on Sept. 19 included the names, birth dates and Social Security numbers of thousands of state residents.
The state agency, based in Port Allen, La., administers several state scholarship programs as well as the state’s 529 College Savings Plan.
Sue Boutte, assistant executive director and chief operating officer of the agency, this week declined to say whether the unencrypted data was stored on tape or disk drives. However, she conceded, “If you trust your data to a courier, then obviously something like this can happen.”
According to Boutte, the incident occurred while the agency was working on a plan to encrypt all backup data stored off site.
“LOFSA was in the process of developing our disaster and recovery plan, but [the loss] occurred before we could get it in place and establish it as a standard plan,” she said.
In a statement, Boston-based Iron Mountain blamed the loss of the device on “a driver [who] did not follow established company procedures when loading the container onto his vehicle.” The statement also noted that the company “encourages” its customers to encrypt backup data.
In a recent interview, Iron Mountain CEO Richard Reese said his firm is working hard to eliminate human error by its employees. For example, the company announced this summer that it is retrofitting its fleet of trucks with a new self-designed security and tracking system.
A similar incident two years ago prompted TD Ameritrade Inc. to encrypt all of its backup data, said a spokesman for the Omaha, Neb.-based financial services firm.
The backup tapes, later recovered, fell off a conveyor belt and became lost in a shipping facility of an undisclosed contractor. Those tapes contained personal data on 200,000 Ameritrade clients.
At the time we re-evaluated our [backup] processes and procedures, and from that point forward, we encrypted [all data] and have taken that extra level of protection,” the spokesman said.
Brian Babineau, an analyst at Milford, Mass.-based Enterprise Strategy Group Inc., said that IT managers who don’t encrypt data are “not doing their jobs. Organizations need to understand that encryption is a necessity and not a luxury anymore.
“This would be the equivalent of not locking your luggage when you travel overseas or leaving your wallet exposed in your back pocket,” he added.
Read more about Applications in Computerworld's Applications Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts