Eavesdropping risk-mitigation plan and vendor case study
Jinfo Report
2nd October 2024
Abstract
Eavesdropping on internet activity may be a useful and unique source of information.
However, this practice highlights the inherent risks of using third-party products over the public internet.
This report considers the risks, highlights a new product featuring insights based on eavesdropping data, and provides 12 practical actions for information managers to develop their mitigation strategy.
Content Access
Does your organisation have a Jinfo Subscription?
Access to Jinfo Content and Community is available through a Jinfo Subscription.
"Yes"
Please sign in to MyJinfo here so that we can check your access to this item:
Or sign in via email:
Enter your email and we'll send you a magic link to sign you in automatically.
"Not yet"
Access to this report is available through a Jinfo Subscription, which will help your organisation:
- Save time and money
- Re-invent information services
- Define, measure and communicate information value.
"Don't know"
Contact us to find out if your organisation already has a Jinfo Subscription.
Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.
About this report
- Report title: Eavesdropping risk-mitigation plan and vendor case study
- Pages: 5
- Link to this page
- View printable version