Four steps to guard against data leakage from the endpoint

By on
Four steps to guard against data leakage from the endpoint

The influx of inexpensive storage media — from MP3 players and PDAs to USB thumb drives and external hard drives — in today's enterprise facilitates the dissemination of information further and further away from the enterprise core, and attackers are writing increasingly complex, customised malicious code designed to compromise a company's proprietary information.

In this seemingly chaotic environment, data security has become one of the primary challenges facing all organizations as managers consider how to properly secure data throughout its lifecycle as both a security and compliance best practices measure. This concern is not unfounded. The recent ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Tags:

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?