National Lottery Community Fund States Unencrypted Devices As Cause Of Data Breach, Expert Reaction

BACKGROUND:

In light of the news that the National Lottery Community Fund has stated that two missing unencrypted disks were the cause of a data breach last month, please find comment below from cybersecurity experts.

Experts Comments

August 04, 2021
Jon Fielding
Managing Director EMEA
Apricorn

Devices and the data stored on them, make the movement of data manageable and simple, but they are just as simple to lose, as this data breach has demonstrated. With more and more data on the move due to the increase in remote working, organisations need to adopt security measures that prevent unauthorised people from accessing the content of a device, particularly in the event it is lost or stolen. 

The benefits of encryption and password protection are not new. Data security requires

.....Read More

Devices and the data stored on them, make the movement of data manageable and simple, but they are just as simple to lose, as this data breach has demonstrated. With more and more data on the move due to the increase in remote working, organisations need to adopt security measures that prevent unauthorised people from accessing the content of a device, particularly in the event it is lost or stolen. 

The benefits of encryption and password protection are not new. Data security requires encrypted hardware that protects digital identities and applications wherever they reside. Data security that focuses on strong encryption and identity and policy-based data management is certainly the way forward to ensure that if the device is lost or stolen, the contents remain obscured and inaccessible. The fact that the National Lottery Community Fund are unable to confirm whether the missing discs are lost, stolen or destroyed is concerning and shows the importance of data security and management - organisations have a duty to secure corporate information and the devices on which it is stored.

  Read Less
What do you think of the topic? Do you agree with expert(s) or share your expert opinion below.
Be part of our growing Information Security Expert Community (1000+), please register here.