Data Leaks for Dummies®
Now more than ever, it’s critical to keep your company data locked up tighter than Fort Knox. Data Leaks For Dummies has the scoop on what’s at risk, how leaks happen, how to keep your data safe without being inflexible, and even what to do if the worst happens. It shows you how to:
- Identify risk by learning to see your data the way a criminal would
- Recognize how innocent mistakes, common carelessness, and malicious insiders also pose a threat
- Learn how to defend against phishing, e-mail threats, and wireless security breaches
- Be alert for social engineering attacks, suspicious contract workers, dumpster divers, and plain old eavesdroppers
- Plan for safe disposal of old hardware, use caution with SMS and e-mail archives, and be aware of how Webcasts and conference calls can be invaded
- Discover how crooks steal data in public places such as Internet cafes
- Develop a recovery plan, build a team, and even manage press coverage should data loss occur
You’ll learn why free data storage devices could cost you a lot, how to protect mobile devices, why data corruption might be even worse than data loss, and how you can help software developers build safer applications. Data Leaks For Dummies will help you protect your customers, the reputation of your business, and your bottom line.
Table of Contents
Part I: Building the Background.
Chapter 1: Defi ning Data Loss.
Chapter 2: Examining Your Data Environment.
Chapter 3: Governance, Risk, and Compliance.
Chapter 4: Data Loss and You.
Chapter 5: Calculating the Value of Your Data.
Chapter 6: The Price of Your Data to Others.
Part II: Starting with the Endpoint.
Chapter 7: IT Security.
Chapter 8: Protecting the Endpoint.
Chapter 9 : USB Devices and Removable Media.
Chapter 10: Mobile Phones and PDAs.
Chapter 11: Geography.
Part III: Prevention at the Office.
Chapter 12: Keeping the Bad Stuff Out.
Chapter 13: Keeping the Good Stuff In.
Chapter 14: Protecting Your Data Center.
Chapter 15: Authorization and Access Control.
Part IV: Applications.
Chapter 16: Backup and Archiving.
Chapter 17: Protection through Web Applications.
Chapter 18: Making Applications Safer.
Chapter 19: Losses from the Unlikeliest Places.
Chapter 20: Revisiting Policies.
Part V: More Preventative Measures.
Chapter 21: Technology Is Not a Silver Bullet.
Chapter 22: Long-Term Prevention.
Chapter 23: Partners and Suppliers.
Part VI: Dealing with the Inevitable.
Chapter 24: In the Event of Data Loss.
Chapter 25: Preparing for the Future.
Part VII: The Part of Tens.
Chapter 26: Ten Tips to Prevent Data Loss Today.
Chapter 27: Ten Common Mistakes.
Chapter 28: Ten Tips to Protect Data at Home.
Sign up now »
Take an in-depth look at the evolution of android malware. The world of malware targeting the Android OS is similar yet very different from malware affecting Windows. Explore the rapidly ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave
- AusCERT 2013: Home-electronics gear’s UPnP as insecure in Australia as rest of world: Metasploit
- AusCERT 2013: Big data skills help beat the bad guys, says HP
- Growing mobile malware threat swirls (mostly) around Android
- In pictures: AusCERT 2013 Day One