Route1 Comments On Data Security Breaches
The hacking and theft of confidential Canadian government data reported yesterday is the latest in a growing number of serious data security breaches. “The increasing pace of these incidents shows the need for all enterprises to rethink their approach to maintaining the security of vital data,” said Tony Busseri, President and CEO of Toronto’s Route1 Inc.
Route1 is a leading provider of data security and identity management technology. Its clients include the U.S. Department of Homeland Security, the U.S. Navy, the U.S. Department of the Interior, the Dutch Foreign Ministry, and Canada’s Office of the Privacy Commissioner, as well as private sector corporations.
“More data security breaches are being reported every day,” Mr. Busseri said. “What they reveal is a widespread failure to meet two essential needs. The first is the growing demand for the capability to work remotely using the data within an organization’s network. The second is the vital requirement to control access to that data and to ensure it remains within the protective firewalls of the network. Remote access solutions are simple and readily available but most fail when it comes to identity management and security. That’s clear from the growing number of reported breaches. Too often, organizations go through the motions of constructing barriers to protect data while at the same time ignoring the gaps they create to allow their people to work outside the network. Those gaps allow data out and allow hackers in.”
“Every organization recognizes that the security of its data must be protected. Many are also recognizing that providing their people with the ability to work outside the office is not simply a convenience but a necessity,” added Mr. Busseri. “Route1 technology allows users to access networks from anywhere, anytime, with the highest possible security based on an architecture that keeps data within firewalls. Data security breaches are a huge and costly problem and will only get worse unless all organizations face the reality and take action using the best technology available.”
The growth in security breaches can generally be traced to the use of systems that transfer data outside of network firewalls, that use simple one-factor identity confirmation such as a single password, and that are based on identifying the remote device being used rather than the individual using it. The failing systems also may not control what information within the network the user can access when they are remote. Read the rest of this entry »
posted in Business News, Digital Products, National News By: Tami |
Print This Post


















