Jinfo Subscription Report Eavesdropping risk-mitigation plan and vendor case study
Jinfo Report

2nd October 2024

Tweet about this item on Twitter

Abstract

Eavesdropping on internet activity may be a useful and unique source of information.

However, this practice highlights the inherent risks of using third-party products over the public internet.

This report considers the risks, highlights a new product featuring insights based on eavesdropping data, and provides 12 practical actions for information managers to develop their mitigation strategy.

Content Access
Does your organisation have a Jinfo Subscription?

Access to Jinfo Content and Community is available through a Jinfo Subscription.

"Yes"

Please sign in to MyJinfo here so that we can check your access to this item:

Email:

Password:

  Forgotten password?


Or sign in via email:

Enter your email and we'll send you a magic link to sign you in automatically.

"Not yet"

Access to this report is available through a Jinfo Subscription, which will help your organisation:

  1. Save time and money
  2. Re-invent information services
  3. Define, measure and communicate information value.

Subscription Benefits


"Don't know"

Contact us to find out if your organisation already has a Jinfo Subscription.

Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.


 « All Reports