Inside the Briefcase

The Key Benefits of Using Social Media for Business

The Key Benefits of Using Social Media for Business

Worldwide, there are more than 2.6 billion social media...

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Gartner IT Sourcing, Procurement, Vendor and Asset Management Summit 2018, September 5 – 7, in Orlando, FL

Register with code GARTITB and save $350 off the...

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

Infographic: The Three Pillars of Digital Identity: Trust, Consent, Knowledge

8,434 adults were surveyed to gauge consumer awareness of...

FICO Scales with Oracle Cloud

FICO Scales with Oracle Cloud

Doug Clare, Vice President at FICO, describes how Oracle...

Is Your Enterprise IT the Best It Can Be?

Is Your Enterprise IT the Best It Can Be?

Enterprise IT is a driver of the global economy....

Security Measures ‘Must Match Up to Data Management Needs’

November 28, 2011 No Comments

Companies must ensure they possess the appropriate technology to suit their needs, which will vary depending on how dependent they are on their IT systems, it has been claimed.

Critical losses and breaches often occur through “staff choosing to manipulate the system”, according to Centre for Cyber Security associate Mark Dempster.

In order to reduce the risk of suffering lost data or recourse to complicated file recovery procedures, businesses should be taking preventative measures.

Mr Dempster recommends companies ask themselves whether they have appropriate systems in place for their needs, but also whether or not they believe the people who have access to their data are reliable.

Read More of Polly Button’s Blog Post on Ontrack Data Recovery

Featured Blogs

Leave a Reply

(required)

(required)


ADVERTISEMENT

Gartner IT Operations

SuperCharge Your Cloud

American CISO

IBC 2018

ITBriefcase Comparison Report







We have updated our Privacy Policy. Click here to preview.