Computer and Intrusion Forensics
Computer and Intrusion Forensics
Next-generation digital forensics
Communications of the ACM - Next-generation cyber forensics
IT Professional
Cloud Computing and the Common Man
Computer
The Web as the Ubiquitous Computer
Computer
Designing Host and Network Sensors to Mitigate the Insider Threat
IEEE Security and Privacy
Hi-index | 0.00 |
Information is the lifeblood of your business. Do you know what information you are holding, who's holding it and whether it's safe? Information is the lifeblood of your business. Do you know what information you're holding, who's holding it and whether or not it's safe? Failing to manage physical and digital information can result in potentially catastrophic financial and reputational damage. Implementing only minimal information security processes can lead to damaging headlines, unwelcome public scrutiny and customer relation nightmares. Furthermore, government regulations, evolving legislation and new audit requirements put in place to protect personal and confidential data make it imperative that organisations adapt quickly to the latest compliance guidelines. But information security breaches and backup tape theft have been undesirable ramifications of business computing since its very inception. Organisations need to pay more attention to the physical and digital data they are generating and think about how they are going to organise, store and protect it, says Russell Sanderson of Iron Mountain UK.