Chapter 21. Technology Is Not a Silver Bullet
In This Chapter
Spotting social-engineering attacks
Reviewing procedures
Setting up disaster recovery
Gauging risks and consequences
Spotlighting data security through awareness programs
You've probably heard a lot of hopeful buzz about how information technology can be used to combat data leaks. It's exciting stuff, but (say it with us) technology alone is not a silver bullet. This chapter explains why, and lays out a more thorough and effective approach to fighting data leakage.
To ensure that you implement a complete solution to data loss, your organization's plan has to include three major elements, as shown in Figure 21-1:
People: Human nature can make your people vulnerable to security attacks, and often they don't even know it.
Process: You're ahead of the game if you've worked out a set of procedures for dealing with data leaks.
Product: You must find and deploy the hardware and software that meets your organization's (and its information's) particular needs.
Okay, if you're already champing at the bit, the next chapter looks at some products and solutions to implement your data-loss solution. But before we get to that, here's a look at the other two components required: your people and your security processes.

Figure 21.1. People, Process, and Products: Critical components for a data-loss solution.
Social-Engineering Attacks
These days cybercriminals ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access