Chapter 19. Losses from the Unlikeliest Places
In This Chapter
Accidentally helping cyber-criminals.
Destroying electronic data
Safely selling and repairing equipment
Finding data in unlikely places
Dealing with the printed word
Whether you've been jumping around in the book or reading straight through, by this point you're probably familiar with data loss (whether by leaks or by breaches) as a threat to electronic data and in an everyday working environment. But these days data lives in a lot of other places — and they all need protection. If that isn't something you think about much (or regularly), this chapter is aimed at helping you to remember.
The good news is that in all these cases, securing your data is often as close as making a simple change in company policy and/or procedure, followed by bringing the staff up to speed about why the changes are necessary. We start with an obvious situation: How often have you walked past a pile of old computer equipment sitting in the corridor and thought, "I wish someone would remove that" — and then find it gone one morning and think, "About time"? Sometimes, of course, as the old junk leaves the building, so too might the company's data — and reputation.
Is That Your Data Walking Out the Door?
In the same way that stealing backup tapes will give you access to all the important company information, so too would stealing the machines. Now there is a way to steal machines without actually stealing them. In fact, people will help you if you offer ...
Get Data Leaks For Dummies® now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.