sponsored by Symantec Corporation
Posted:  23 Aug 2010
Published:  18 Aug 2010
Format:  PDF
Length:  15  Page(s)
Type:  White Paper
Language:  English
ABSTRACT:

This paper examines the three most common sources of data breaches—well-meaning insiders, targeted attacks from outside the organization, and malicious insiders—and goes on to illustrate the ways in which each source gains access to the network, finds and then exposes sensitive information. It also offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.






BROWSE RELATED RESOURCES
Data Security | Information Security | Network Security | Security Management | Security Policies | Storage Security

View All Resources sponsored by Symantec Corporation

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement