Pod Slurping - An Easy Technique for Stealing Data

Pod Slurping - An Easy Technique for Stealing Data

The white paper looks at the simple process of data slurping and some of the ways that organisations can combat the risk. The devices that can be used to "slurp" large volumes of corporate information include iPods, digital cameras, USB sticks and flash drives. Any device with storage capabilities also has the ability to slurp, but some of these tools are used in business on a daily basis and while it has been implemented by some organisations, a blanket ban is not always a practical solution.
GFI Software
18 Sep 2006
18 Sep 2006
7 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor