Chapter 13. Keeping the Good Stuff In
In This Chapter
Shielding intellectual property
Identifying common messaging problems
Protecting e-mail from accidental loss
Consistently classifying data
Keeping the good stuff in is about preparation. News of data breaches bring home the reality that organizations are seriously vulnerable to e-criminals mugging their digital assets, malicious insiders deliberately leaking information, and other employees losing data on laptops and CD-ROMS. Worldwide legislation that forces companies to disclose data breaches has elevated what used to be whoops-we-blundered-again mistakes to headline news.
To make matters worse, what looks like a cybercrime may be an honest mistake or run-of-the-mill carelessness. A typical instance of a careless data breach starts when someone obtains copies of someone else's identifiable personal information or company intellectual property. But there's no guarantee that the person who appropriates that data
Will know what it is
Was after it in the first place
Can use it
If (for instance) an employee leaves his or her laptop in the back of a car in plain view and later finds it gone, it's regrettable but not all that surprising. It doesn't necessarily mean that an e-criminal has been stalking this individual.
Tip
For every $1 spent today preventing bad things happening, you will spend $10 fixing the immediate problem and $100 shoring up the long-term issue.
Global organizations and government agencies require more than network security ...
Get Data Leaks For Dummies® now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.