Skip to Main Content
The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition
book

The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition

by Nancy Flynn
January 2009
Intermediate to advanced content levelIntermediate to advanced
304 pages
9h 41m
English
AMACOM
Content preview from The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition
CHAPTER
8
Data Security Risks
and Rules
The accidental loss or intentional theft of personal and financial informa-
tion, including credit card data and Social Security numbers, reached
unprecedented levels in 2007, with financial fraud surpassing virus at-
tacks as the greatest source of financial loss for business, according to
the annual CSI Computer Crime and Security Survey.
1
Forty-six percent of organizations surveyed by the Computer Se-
curity Institute (CSI) experienced a security incident in 2007.
2
In the
United States alone, some 79 million records were reported compro-
mised, a fourfold increase over the previous year, according to the Iden-
tity ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Resilient Thinking - Protecting organisations in the 21st century, Second edition

Resilient Thinking - Protecting organisations in the 21st century, Second edition

Phillip Wood
E-mail in an Instant

E-mail in an Instant

Keith Bailey, Karen Leland

Publisher Resources

ISBN: 9780814410783