Pod Slurping - An Easy Technique for Stealing Data

Pod Slurping - An Easy Technique for Stealing Data

Cover
The white paper looks at the simple process of data slurping and some of the ways that organisations can combat the risk. The devices that can be used to "slurp" large volumes of corporate information include iPods, digital cameras, USB sticks and flash drives. Any device with storage capabilities also has the ability to slurp, but some of these tools are used in business on a daily basis and while it has been implemented by some organisations, a blanket ban is not always a practical solution.
Vendor:
GFI Software
Posted:
18 Sep 2006
Published:
18 Sep 2006
Format:
PDF
Length:
7 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor