Tablet Theft:  3
Alpha Thunder Tag:  5
Protect Your Most Sensitive Information With An Alpha Thunder Tag
As the manager of a security and loss prevention program we commonly use third party vendors to provide services for our company.  We have one company that we use that does all of our background checks for pre-employment screening.  We recently were notified of a possible data breach involving some of our employees as well as some applicants that were not hired.  An employee of this third-party company had taken their company tablet or IPad home, and had subsequently left it in their car.  The car was burglarized and the tablet was stolen.  Although the tablet was encrypted, which reduces the likelihood of an actual breach of client PPI; it is not a failsafe means to protect the device.   This theft resulted in a required mass notification to all of the personnel possibly affected, additional credit reporting protection, and increased liability to that company.  This can result in increased costs and possible litigation if PPI information is released.  It also caused us to be concerned about the vendors’ credibility and their ability to safeguard our employee’s personal confidential information.  We are in a technological world and we can’t presume to think that we can work without the use of computers or technology to store and secure personal information, but we can expect a certain level of protection as a consumer and as a company.  This applies to most companies irrespective of the services they provide, because everyone has employee information and some professions have increased liability due to the very nature of their profession.  That is why it is important for everyone to take an active role in protecting this type of information to avoid breaches in personal data and to avoid increased liability.  The best way to protect computer equipment that contains personal information is through the use of an Alpha Thunder Tag.   
The Alpha Thunder Tag can reduce your risk of tablet theft, or theft of other devices, thus reducing the risk of losing sensitive data.  This can be very effective in areas such as the medical field, or in similar areas that maintain large amounts of client or patient data.  It can also be effective in fields that have sensitive information or want to protect their intellectual property.  The Alpha Thunder Tag is a hard tag that can be placed on any computer related device, and is equipped with EAS technology, in order to prevent tablet theft.  This provides protection against anyone trying to remove the tag from the device and prevents someone from leaving the building with the computer, tablet or other device.  A company simply adds EAS antennas at all of the entrance/exits, and if the tag comes in close proximity to the antennas it will make an audible signal, so staff can prevent a breach of information and protect their property.  These tags are attached with a strong adhesive and allow you to turn them on or off, depending on your needs.  It also provides a red indicator light that works as a deterrent but also shows you when the device is activated.  When it comes to protecting sensitive information in a technological world, it is imperative that we take additional precautions to prevent identity theft and unlawful disclosure of personal data.  
Technology has resulted in an increase in the use of computer related equipment to maintain records and track data.  Patient records are now kept electronically and are updated and maintained on various types of computer devices, which creates a liability for those associated with protecting it.  That is why Alpha Thunder Tags are an important resource to assist with protecting sensitive information, regardless of what that might be.  Tablet theft can be more than just the loss of a device it can involve the disclosure of sensitive information, which leads to future litigation and increased costs.  
Alpha Thunder Tags are important and we can help with it.  Call 1.770.426.0547.      

As the manager of a security and loss prevention program we commonly use third party vendors to provide services for our company.  e have one company that we use that does all of our background checks for pre-employment screening.  e recently were notified of a possible data breach involving some of our employees as well as some applicants that were not hired.  n employee of this third-party company had taken their company tablet or IPad home, and had subsequently left it in their car.  he car was burglarized and the tablet was stolen.  Although the tablet was encrypted, which reduces the likelihood of an actual breach of client PPI; it is not a failsafe means to protect the device. This theft resulted in a required mass notification to all of the personnel possibly affected, additional credit reporting protection, and increased liability to that company. This can result in increased costs and possible litigation if PPI information is released. It also caused us to be concerned about the vendors’ credibility and their ability to safeguard our employee’s personal confidential information. We are in a technological world and we can’t presume to think that we can work without the use of computers or technology to store and secure personal information, but we can expect a certain level of protection as a consumer and as a company. This applies to most companies irrespective of the services they provide, because everyone has employee information and some professions have increased liability due to the very nature of their profession. That is why it is important for everyone to take an active role in protecting this type of information to avoid breaches in personal data and to avoid increased liability. The best way to protect computer equipment that contains personal information is through the use of an Alpha Thunder Tag.   

 

The Alpha Thunder Tag can reduce your risk of tablet theft, or theft of other devices, thus reducing the risk of losing sensitive data. This can be very effective in areas such as the medical field, or in similar areas that maintain large amounts of client or patient data. It can also be effective in fields that have sensitive information or want to protect their intellectual property. The Alpha Thunder Tag is a hard tag that can be placed on any computer related device, and is equipped with EAS technology, in order to prevent tablet theft. This provides protection against anyone trying to remove the tag from the device and prevents someone from leaving the building with the computer, tablet or other device. A company simply adds EAS antennas at all of the entrance/exits, and if the tag comes in close proximity to the antennas it will make an audible signal, so staff can prevent a breach of information and protect their property. These tags are attached with a strong adhesive and allow you to turn them on or off, depending on your needs.  It also provides a red indicator light that works as a deterrent but also shows you when the device is activated.  When it comes to protecting sensitive information in a technological world, it is imperative that we take additional precautions to prevent identity theft and unlawful disclosure of personal data.  

Technology has resulted in an increase in the use of computer related equipment to maintain records and track data. Patient records are now kept electronically and are updated and maintained on various types of computer devices, which creates a liability for those associated with protecting it. That is why Alpha Thunder Tags are an important resource to assist with protecting sensitive information, regardless of what that might be. Tablet theft can be more than just the loss of a device it can involve the disclosure of sensitive information, which leads to future litigation and increased costs.  

 

Alpha Thunder Tags are important and we can help with it. Call 1.770.426.0547.