Skip to Content
Data Leaks For Dummies®
book

Data Leaks For Dummies®

by Guy Bunker, Gareth Fraser-King
February 2009
Beginner
427 pages
9h 47m
English
For Dummies
Content preview from Data Leaks For Dummies®

Chapter 8. Protecting the Endpoint

In This Chapter

  • Understanding why the endpoint is such a risk and therefore a good place to start

  • Developing a strategy to deal with laptops

  • Appreciating where encryption can help in your quest

  • Defeating the keylogger

  • Fighting cyber-criminals with the top 10 products to protect the endpoint

When you're looking at the data-leak problem (or any problem, for that matter), there comes a time when you must make a start. Being faced with a blank sheet of paper is the toughest part for any writer; it's the same when you're looking at preventing data leaks. The task ahead seems immense, there doesn't appear to be a good place to begin, and (more to the point) there doesn't seem to be an end in sight.

With that in mind, here's the start: the endpoint.

Why the Endpoint Is a Risk

The endpoint is basically the desktop, the laptop, or other end-user device; these days it could easily be the mobile phone or PDA/Smart Phone.

The potential problem here is inadvertent loss of these devices, especially the easily portable ones (as Figure 8-1 illustrates).

The server is not commonly an endpoint because the user isn't sitting in front of it all day (as is the case with laptops, desktops, and mobile devices). Servers tend to live in the data center, and are subject to their own risks (as Chapter 14 describes). The endpoint has the most risk because it's where the user is.

Although people are your greatest assets, they're also the biggest weakness — not because they want to make ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.

Read now

Unlock full access

More than 5,000 organizations count on O’Reilly

AirBnbBlueOriginElectronic ArtsHomeDepotNasdaqRakutenTata Consultancy Services

QuotationMarkO’Reilly covers everything we've got, with content to help us build a world-class technology community, upgrade the capabilities and competencies of our teams, and improve overall team performance as well as their engagement.
Julian F.
Head of Cybersecurity
QuotationMarkI wanted to learn C and C++, but it didn't click for me until I picked up an O'Reilly book. When I went on the O’Reilly platform, I was astonished to find all the books there, plus live events and sandboxes so you could play around with the technology.
Addison B.
Field Engineer
QuotationMarkI’ve been on the O’Reilly platform for more than eight years. I use a couple of learning platforms, but I'm on O'Reilly more than anybody else. When you're there, you start learning. I'm never disappointed.
Amir M.
Data Platform Tech Lead
QuotationMarkI'm always learning. So when I got on to O'Reilly, I was like a kid in a candy store. There are playlists. There are answers. There's on-demand training. It's worth its weight in gold, in terms of what it allows me to do.
Mark W.
Embedded Software Engineer

You might also like

The Three Traps That Stymie Reinvention

The Three Traps That Stymie Reinvention

Ryan Raffaelli
Coaching for High Performance

Coaching for High Performance

MIT Sloan Management Review
What Successful Project Managers Do

What Successful Project Managers Do

W. Scott Cameron, Jeffrey S. Russell, Edward J. Hoffman, Alexander Laufer

Publisher Resources

ISBN: 9780470388433Purchase book