Medical data breaches raising alarm – the Washington Post

Important article on the increasing issue of medical/patient data being accessed and/or stolen. Most stolen data is taken because it’s not where it’s supposed to be. Indexing the data on your enterprise, including backup tapes, to identify and classify files is key to finding storage-related security lapses before they occur.

Read this article: http://go.indexengines.com/databreach

More information on how to protect your data before its compromised: http://www.indexengines.com/solutions_BusNeed_DM-DA.html

Manage Costs & Risk with Defensible Deletion

Organizations retain far too much data. Users archive email on their desktops. Old files and documents are hidden away on legacy backup tapes. As employees leave a company their data lives on in network servers and is never purged.

A defensible deletion strategy is one where user data is known and either archived or remediated according to policy. This process is not only a “house cleaning” operation to clean up old data sources, such as legacy tape content, but also an ongoing process to manage data created during the normal course of business.

This webinar will show how to implement a defensible deletion policy and intelligently manage user files and email according to corporate policies in order to free up IT resources.

Date: May 3, 2012 2:00PM EST
Register Now

Learn more about Index Engines

Defensible Deletion: An aggressive approach to data management

InfoStor.com: Index Engines Seeks to Help Enterprises Purge ‘Legacy Data’

As the volume of corporate data continues its exponential rise, enterprises are faced with the daunting task of continually upgrading and expanding their storage infrastructures.

But is more storage really the answer? Find out More>

Learn more about Index Engines

Defensible Deletion Keeps Liability Under Control – Webinar

March 28, 2012, 2:00PM EST

Organizations retain far too much data. Users archive email on their desktops. Old files and documents are hidden away on legacy backup tapes. As employees leave a company their data lives on across the network and is never purged.

Users create data on a daily basis, however no one is managing this content and purging what is no longer required. Companies save everything with no plans to retire unnecessary content. This is not a good practice as it creates a long term liability and unnecessary expense.

This webinar will show how to implement a defensible deletion policy and intelligently manage user files and email according to corporate polices.

Register for Webinar

Learn more about Index Engines

Policy Matters

The Department of Health and Human Services just fined BlueCross BlueShield of Tennessee $1.5 million for lack of encryption of over 1 million patent records on stolen hard drives. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules requires patient records be secure and protected. This case shows the financial impact of such an investigation, which is well beyond the $1.5 million fine, at an estimate of $17 million to support the case, as well as the notification and management of the security breach.

Sound policies are important. Many organizations have yet to implement policies that ensure compliance with HIPPA, or SOX, or whatever regulatory policy impacts your industry. Lack of policy is a major liability that will hurt every organization down the road. Understanding data assets and managing them accordingly is critical to managing these liabilities. Implementing a defensible deletion strategy will clean up legacy content that should not be retained. Proactively deploying sound information governance initiatives will protect every firm from such fines and penalties. Read Article

Learn more about Index Engines