Are You Paying Too Much For Your Headsets?

Are You Paying Too Much For Your Headsets?

FREE trial available for IT Managers

Learn More

Skip to Content Skip to footer
Para ver o conteúdo específico da sua localização, retorne ao país ou região que corresponde à sua localização.

Suggestions

  • No Suggestions

Site Pages

Chevron Icon

GDPR Compliance

Why Physical Security Matters

GDPR and Physical IT Security

GDPR requires organisations to apply sound security practices to electronic and paper-based data. Securing data against hacking and malware is top of mind for many organisations, however many fail to adequately address the physical security of IT hardware.

 

Download our GDPR White Paper

The Cost of Non-Compliance

 

In January 2019, Google was fined €50 million by the French Data Regulator for a breach of GDPR guidelines concerning the way Google collected data and obtained consent.1

This is significant example of how an American (or any non-EU organisation) company can be fined by an EU regulator.

Breaches Are Happening Everywhere

As mobile working becomes more popular and the use of high-definition screens increases, so does the risk that confidential data may be accessed by unauthorised persons.

In November 2018, confidential data on 20,000 residents in Gladsaxe, Denmark, was taken from a computer that was stolen from the town’s city hall, risking a fine under GDPR.2

 

In August 2018, a laptop was stolen containing the unencrypted personal details of 37,000 customers of Eir, an Irish telecomms provider.3

 Security Selector

Breaches Are Happening In Every Industry

 

In the financial sector 25% of breaches are due to lost or stolen devices and are the most frequent cause of data leakage, being especially tempting targets because of the volume of sensitive data stored and used.4

 

Within healthcare physical theft or loss is the biggest cause of security incidents, accounting for 32% of over 100,000 incidents surveyed in 82 countries.5


 Privacy Begins on Screen

Facts About Data Breaches

 

of data breaches are caused by hacking, malware & physical device loss6

data records are lost or stolen every day7

of businesses have no physical security policy in place8

Overcoming Barriers to User Co-Operation

“We Operate in a Secure Environment”

This may be the case, but sensitive data can be visually hacked by any visitor or unauthorised person.

A privacy screen filter as a visual protection measure is an indispensable security tool to protect confidential data belonging to the company. Our product portfolio includes more than 52,000 privacy screen filters for a variety of different manufacturers, models and device types.

Find the right Privacy Screen Filter for your device here: kensington.com/privacy-selector

Privacy Screen Filter Selector

“You Can’t Lock Down that Device”

With the move to thinner form factors, today’s computing devices may not incorporate the industry-standard Kensington Security Slot™. However, it is a misconception to believe that such devices cannot be physically secured. Even devices without a security slot can be locked down to prevent opportunistic theft.

Kensington offers a full range of solutions for a diverse array of devices - find out more by visiting kensington.com/securityselector

 Security Selector

Other Solutions Supporting GDPR Compliance

SecureTrek™ Luggage

The SecureTrek™ range of rollers, cases and backpacks have the ability to be anchored in locations where theft is a concern, such as airports, hotels and trade shows.

 

Security Cabinets

A fast and simple way of charging, syncing and securing multiple tablets and ultra-thin laptops.

AES-Encrypted Mice/Keyboards

Our AES-128 encrypted mice and keyboards reduce the risk of wireless keystrokes being intercepted by a hacker, protecting your private and confidential information.

 

USB Port Blockers

System administrators can physically prevent users from connecting USB devices, reducing the risk of unauthorised data copying or uploading malware to a system.

 

 

Biometric Security

Compatible with Windows Hello™, Google G Suite, Azure, Active Directory, Dropbox, Github and others, the FIDO-certified VeriMark™ Fingerprint Keys provide a simple, fast and secure log-in.

Kensington Tools to Support Your GDPR Compliance

 

 

Security Selector

Find the right security lock for your device

Find My Device

 

Privacy Screen Filter Selector

Find the right privacy screen filter for your device

Find My Device

 

GDPR White Paper

Learn more about GDPR and how Kensington solutions support GDPR compliance

Download

Can We Help You Further? Let Us Know!

* Kensington Security Solutions support GDPR Compliance

  1. bbc.co.uk/news/technology-46944696
  2. thelocal.dk/20181211/computer-with-data-on-20000-people-stolen-in-denmark
  3. independent.ie/business/technology/37000-eir-customers-face-data-breach-inlaptoptheft-37240098.html
  4. Financial Services Breach Report, Bitglass, 2016
  5. Verizon Data Breach Investigations Report 2016
  6. 2018 Data Breaches - Privacy Rights Clearinghouse
  7. Breach Level Index, March 2019
  8. Kensington IT Security & Laptop Theft Survey, August 2016