CDN - Know when to hold it, know when to Shred it


(23-Feb-11)  Data that is most likely to be stolen are information that has the highest commercial value, according to James Quin, lead research analyst for Info-Tech Research Group in London, Ont.

 

He said information typically falls into two buckets – intellectual property and client/employee information.

“The former is generally attacked through targeted types of attacks and is generally business specific. The latter is usually attacked through a broad-based attack is non-business specific,” said Quin.

Electronic records must be kept in secured systems “protected by firewalls and anti-malware at least and with restricted and monitored user access,” he adds.

Click here for full article

Media Kit

Info-Tech Research Group Media Kit

Download Now


To speak to one of our Analysts,
Contact Info-Tech Public Relations
press@infotech.com

or call:
US: 1-888-670-8889
Canada: 1-844-618-3192
International: +1-519-432-3550

GET HELP Contact Us
×
VL Methodology