Chapter 22. Long-Term Prevention
In This Chapter
Creating an information-protection policy
Dealing with data loss over the long haul
Initiating ongoing discovery
Auditing for governance
Reviewing policy decisions
Unfortunately, data loss, data leaks, and data breaches are here to stay. Electronic information is how our businesses, and even our society, survives. Information has unarguable value — to those it belongs to, and to those it does not belong to. The consequences of data loss can be dire enough that short-term, knee-jerk reactions to data breaches are clearly a substandard way for a company to govern itself. The reputation of the company is at stake. What it needs is an effective, long-term view of data loss — and that means creating an information-protection policy.
Creating an Information-Protection Policy
An information-protection policy is an overarching set of agreed-upon practices for looking after information in your organization, regardless of whether it's paper-based or electronic (including e-mail, files on disk, structured databases, data on Web sites, you name it).
Note
It's worth repeating: Security is only as strong as its weakest link. Don't let that weak link be protection of your data.
Policies tend to be written down and then ignored. For your information-protection policy to be effective, it has to be clearly understood, consistently applied, and followed by everyone — from the CEO to the cleaner and from suppliers and partners to customers. All have important parts ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access