Eternal vigilance

Powered by SC Magazine
 

Despite continual warnings from security experts about the importance of vigilance in IT, security breaches are occurring at an alarming rate.

Despite continual warnings from security experts about the importance of vigilance in IT, security breaches are occurring at an alarming rate.

This week, Police in New South Wales were the latest to breach privacy, disclosing email and password details of senior counter terrorism officers and hundreds of journalists signed up to receive information from the NSW Police Media Unit.

This is just one of a series of breaches following hot-on-the-heels of leaks at other law enforcement agencies including Australian police forces, Hong Kong Police and the CIA in recent weeks.

According to Samia Rauf, director, Asia Pacific for document security vendor Workshare, every day new incidences of privacy breaches, company data being leaked and other compliance violations occurring.

These can be prevented by taking some of the following measures such as converting content from risky to safe by cleansing and removing ‘metadata – or hidden information’ such as track changes or speaker notes, hidden columns, etc contained in MS Office files, she said.


Eternal vigilance
 
 
 
Top Stories
The True Cost of BYOD - 2014 survey
Twelve months on from our first study, is BYOD a better proposition?
 
ANZ looks to life beyond the transaction
If digital disruptors think an online payments startup could rock the big four, they’ve missed the point of why people use banks, says Patrick Maes.
 
What InfoSec can learn from the insurance industry
[Blog post] Another way data breach laws could help manage risk.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
What is delaying adoption of public cloud in your organisation?







   |   View results
Lock-in concerns
  29%
 
Application integration concerns
  3%
 
Security and compliance concerns
  27%
 
Unreliable network infrastructure
  9%
 
Data sovereignty concerns
  21%
 
Lack of stakeholder support
  3%
 
Protecting on-premise IT jobs
  4%
 
Difficulty transitioning CapEx budget into OpEx
  3%
TOTAL VOTES: 1051

Vote