We should always avoid storing unencrypted sensitive data in our portable devices. However, if it is inevitable to carry or work with sensitive data on these devices, we should employ right tools and strategies to avoid our data from unauthorized accessed. As announced in Jun ITSC Digest, the University has recently endorsed the deployment of an Endpoint* Security Solution which provides encryption to all university-owned desktops and laptops used by both teaching and non-teaching staff. This solution is free for department use and is mandatory for staff who will handle personal data and sensitive information. In phase 1 of the deployment, ITSC will facilitate the launching on Windows-based computers - Full-disk encryption: For laptops
- Removable media encryption: For desktops and laptops
Please visit epss.itsc.cuhk.edu.hk for more information about this solution or you can get a solution overview through the following briefing session
Title: | Secure Your Data by Adopting Endpoint Security Solutions | |
Date: | 29 Aug 2014 (Fri) | Time: | 10:00 am to 12:00 noon | Venue: | Seminar Room 1, 2/F Lui Che Woo Clinical Sciences Building (LCW CSB), PWH | Audience: | CUHK Staff of the Faculty of Medicine | Language: | Cantonese (Simultaneous interpretation can be provided upon request) | Registration: | https://training.itsc.cuhk.edu.hk/coursedetail.aspx?id=IS0140819C | Registration Deadline: | 25 Aug 2014 (Mon) |
Title: | Secure Your Data by Adopting Endpoint Security Solutions | |
Date: | 16 Sep 2014 (Tue) | Time: | 3:30 pm to 5:30 pm | Venue: | LT2, Yasumoto International Academic Park (YIA) | Audience: | CUHK Staff | Language: | Cantonese (Simultaneous interpretation can be provided upon request) | Registration: | https://training.itsc.cuhk.edu.hk/coursedetail.aspx?id=IS0140916C | Registration Deadline: | 12 Sep 2014 (Fri) |
* Endpoints refer to any hardware devices that have the ability of data storage and / or data processing. Common endpoints include desktop PCs, laptops, USB storage devices, tablets and mobile phones. Many Endpoint Security Solutions provide different functions to protect devices against data leakage, data loss and other threats. Examples are Antivirus, Data Encryption, and Data Loss Prevention.
|
Join our briefing session on 16 Sep to learn more about the Endpoint Security Solution
|