Best practice controls for company data assets
Abstract
This article reviews the main areas for concern for protecting data assets from internal threats and vulnerabilities. It starts with an anecdote from an interview with a senior manager and concludes with a recommendation for implementing an approach to protect data directly (as opposed to commonly-used methods that attempt to protect the network and limit user permissions).
No comments:
Post a Comment