We have a high resolution version you can download on our press kit page.
Read about new features of the latest updates from our Product team
Contact your Partner Manager >
Featured Customer Story Chart Industries >
November 22nd, 2017 | Alvaro Hoyos | smarter identity
In 2015, thousands of patients had their personal health data compromised when a former University of Oklahoma physician’s laptop was stolen. The university was unable to ascertain the extent of the damage or determine exactly what information was on the employee’s laptop. Exacerbating the problem further, the university was unaware the former employee had taken any patient information with him until after the theft was reported. These situations are more common than you may realize. In fact, Gartner estimates that a laptop is lost every 53 seconds.
When a laptop is stolen, it’s only natural to get a company’s IT department involved. But as employee identities become more complex and when sensitive data is at risk, it’s equally important to involve the human resources department as well.
Because HR leads the charge on hiring and termination, it makes sense to include them in the process of granting and revoking network access. While IT provides the tools to provision and deprovision access as needed, HR can find an individual’s user profile to help determine what type of access privileges were given to an employee and what systems they had access to. In addition, tracking stolen laptop events and other security incidents, can help indicate potential employee performance issues that need to be addressed.
As the primary source of truth for employee identities, HR can help IT take the appropriate steps to shut down stolen laptops and safeguard company data from future security breaches using a unified endpoint management solution.
A unified endpoint management solution gives HR the autonomy to oversee laptop security for every employee, freeing up IT to focus on other strategic security measures. It also allows HR to immediately respond to security breaches in real time, shortening the window of opportunity thieves have to steal a laptop’s contents.
In addition to improving visibility into an employee’s device identity and compliance, endpoint management solutions give HR the ability to:
Passwords alone are not enough to safeguard sensitive corporate information, and installing security protocols after a laptop is stolen does little to mitigate the consequences. Despite their traditional role in their companies, HR teams play an important role in protecting employee identities and taking the precautionary steps to secure employee laptops before they go missing.
Alvaro Hoyos leads OneLogin’s risk management, security, and compliance efforts. He also works with prospects, customers and vendors to help them understand OneLogin’s security, confidentiality, availability, and privacy posture and how it works alongside, or in support of, customer’s own risk management model. Alvaro has over 15 years in the IT sector and prior to joining OneLogin, helped startups, SMBs, and Fortune 500 companies with their security and data privacy compliance efforts. His commentary and articles have been featured in several publications, including CIO, CSO, Network World, Infosecurity, eWeek, and Help Net Security. Alvaro is a member of the Forbes Technology Council and has a B.B.A in M.I.S. and a M.S. in M.I.S. from Florida International University.
View all posts by Alvaro Hoyos