Inside the Briefcase

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

8,434 adults were surveyed to gauge consumer awareness of...

FICO Scales with Oracle Cloud

FICO Scales with Oracle Cloud

Doug Clare, Vice President at FICO, describes how Oracle...

Is Your Enterprise IT the Best It Can Be?

Is Your Enterprise IT the Best It Can Be?

Enterprise IT is a driver of the global economy....

The IoT Imperative for Consumer Industries

The IoT Imperative for Consumer Industries

This IDC white paper examines current and future...

How to align your visual brand guidelines and create consistently on-brand content

How to align your visual brand guidelines and create consistently on-brand content

In this ebook, we’ll explore the various themes leading...

Security Measures ‘Must Match Up to Data Management Needs’

November 28, 2011 No Comments

Companies must ensure they possess the appropriate technology to suit their needs, which will vary depending on how dependent they are on their IT systems, it has been claimed.

Critical losses and breaches often occur through “staff choosing to manipulate the system”, according to Centre for Cyber Security associate Mark Dempster.

In order to reduce the risk of suffering lost data or recourse to complicated file recovery procedures, businesses should be taking preventative measures.

Mr Dempster recommends companies ask themselves whether they have appropriate systems in place for their needs, but also whether or not they believe the people who have access to their data are reliable.

Read More of Polly Button’s Blog Post on Ontrack Data Recovery

Featured Blogs

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner IT Operations

SuperCharge Your Cloud

American CISO

IBC 2018

ITBriefcase Comparison Report







We have updated our Privacy Policy. Click here to preview.