Keeping Track of Your Data - Identifying the Threats
Jinfo Article
5th August 2014
Abstract
Plenty of self-serving reports from security specialists predict catastrophes to which they happen to provide solutions. But their findings can be useful nevertheless - for example in helping organisations decide whether they should be more worried about hackers or their own staff, or about traditional desktop machines as opposed to BYOD and mobile devices. Of particular interest, too, are some recent findings indicating that most organisations haven't a clue where their unstructured data resides. Plus the intriguing suggestion that what is going to matter in future is not where it is physically but its legal, political and - crucially - its logical location when several jurisdictions are involved. Information professionals with a compliance role should be licking their lips.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Keeping Track of Your Data - Identifying the Threats
- Link to this page
- View printable version
- Are We Becoming Too Scared of Security to Benefit from Big Data?
Thursday, 24th July 2014 - Forget BYOD and COPE, It's Time for BYOID
Thursday, 29th May 2014 - We're All Hackers Now
Thursday, 22nd May 2014 - Cybercrime - Don't Waste a Crisis
Monday, 7th April 2014 - Security Breaches? It's the Innocent Ones You Need To Worry About
Wednesday, 12th March 2014 - Cyber Security in the Enterprise
Thursday, 9th January 2014 - Breach Fatigue or Plain Ol' FUD - the Human Factor is Still a Big Security Risk
Tuesday, 26th November 2013
- Free Report - Know Your Customer, Contain Your Costs
Monday, 4th August 2014