Security - How Far Can You Trust the Evidence, and What Can You Do?
Jinfo Article
7th November 2014
Abstract
Whether it's retail fraud, security breaches that are inside jobs or lack of caution in implementing Bring Your Own Device (BYOD), information professionals need to be circumspect when the evidence comes from organisations that also happen to provide solutions to the problems they highlight. But sometimes that evidence - on the extent to which employees are responsible for security risks, or the role played by mobile devices - indicates some degree of consensus. And when it's backed up by specific concerns expressed by government or regulatory bodies - about outsourcing for instance, or lack of awareness among small and medium sized enterprises (SMEs), that's when info pros can sense an opportunity to be seized.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this article is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
- Article title: Security - How Far Can You Trust the Evidence, and What Can You Do?
- Link to this page
- View printable version
- The Rise of Mobile Devices for Legal Research
Monday, 20th October 2014 - BYOD Brings Challenges to IT Departments
Wednesday, 13th August 2014 - Privileged Users and Threats to Confidential Data
Tuesday, 10th June 2014 - Cybercrime - Don't Waste a Crisis
Monday, 7th April 2014 - Security Breaches? It's the Innocent Ones You Need To Worry About
Wednesday, 12th March 2014 - Cyber Security in the Enterprise
Thursday, 9th January 2014 - BYOD or COPE - Technology Isn't Always the Answer
Friday, 18th October 2013
- Cyber Security, Cybercrime, BYOD - Relevant FreePint Resources
Monday, 25th August 2014