Web Links Directory - Free human edited web sites directory  - Article Details
STATISTICS
  • Active Links: 293863
  • Pending Links: 736494
  • Todays Links: 374
  • Total Articles: 2460
  • Total Categories: 14
  • Sub Categories: 687

Data Security and WikiLeaks – Could It Happen to You?

Date Added: September 15, 2011 05:34:22 AM
Author: tier-3
Category: Business & Economy
Disgruntled employees – are you sure you have none? Many businesses ignored the lessons WikiLeaks could teach, because they don’t trade in secret documents about diplomacy and wars, and missed the point. A survey of 200 IT and security professionals conducted by Ipswich FT at the 2011 RSA conference supports this: 40 % of respondents said their companies had dismissed the security implications. ‘Out of WikiLeaks we saw people blaming the devices instead of taking control of their data,’ Hugh Garber from Ipswich FT told Dark Reading: ‘Blaming a data breach on a portable device is like blaming a bank robbery on white vans.’ WikiLeaks’ 2010 publication of highly sensitive, unofficial diplomatic documents made many governments and organizations nervous. They grew more edgy when the New York Times reported that WikiLeaks was about to release sensitive Bank of America documents. While the media focused on the juicy details, the mechanism of the leak was the real surprise: it was the work of one disaffected employee. Could your organization be harbouring someone prepared to spill sensitive information - from emails critical of your clients or staff to valuable operational data and IP? Post-WikiLeaks, that’s the question your and every business must ask, and review your data security in that context. There’s not much to stop anyone forwarding electronic documents to a journalist or a private e-mail account or stealing for financial gain: a trusted insider recently stole $10 million from Bank of America.WikiLeaks just reminds us how easy it is. Your organization may not be as large a target as the US Government or the Bank of America, but that doesn’t mean you’re not exposed. It’s an Open World In the paper and photocopier era, amassing and releasing almost 400,000 documents would have been just about impossible. Not any more: in the Internet era, it’s very easy. As security commentator Bruce Schneier observes: ‘Just as the music and movie industries are going to have to change their business models for the Internet era, governments are going to have to change their secrecy models.’ It’s not just big governments and US corporations that are targets. New Zealand is a pretty small target among western countries yet, in late 2010, information leaked to WikiLeaks revealed how Helen Clark’s government was pressured into sending troop’s to Iraq for fear that the NZ Company, Fonterra, would miss out on lucrative Oil for Food contracts.
Ratings
You must be logged in to leave a rating.
Average rating: (0 votes)
Comments

No Comments Yet.


You must be logged in to leave a Comment.
ARTICLES
How to remove link from Wldirectory
Here is the short description, how to remove your link, if you no longer need it.
Get started with jewellery online shopping and find yourself many discounts and offers to avail
Today, Internet is the most versatile tools in the field of marketing. People generally uses it, as to advertise their business and products, as to attaing more and more money and also to get some merchandise.
Shared Hosting Cons And Professionals
Tie this to the fact that Bluehost offer a one month, full money back guarantee if you are unsatisfied for just about any cause. This would be particularly so as it pertains to multiple web hosting.of datacenters.
Monster Beats Headphones Outlet
A center channel is also included. When you are experienced enough, try your hand on starting your own recording studio.
Are you purchasing quality furniture?
When it comes to purchasing furniture you have so many places to choose from.