CRM Buyer Talkback
|
![]() ![]() |
See Full Story
As the technology that businesses depend on has diversified, new tools have enabled the capture and storage of minutia from operations and transactions. However, the wealthier companies become in data assets, the more attractive they become to attackers. This is why data security requires great attention and investment -- to prevent potential breaches. TJX surely realizes this, given its recent challenges in responding to an unauthorized intrusion of its computer systems that exposed the credit and debit card details of customers in several countries.

Posted by: marileev 2007-02-08 11:38:07 In reply to: Kelly Shermach

A companion to responding to a data breach within your organization is revisiting your company's Risk Policies. These days when information can walk out on a thumb drive, iPod or sent out via email, employees of your organization need to know what is good workplace technology usage.
Investing in encryption, authentication and email-anti theft software in the end can help head off these security risks and save an organization loads of bad PR http://redmondmag.com/reports/article.asp?EditorialsID=340
Investing in encryption, authentication and email-anti theft software in the end can help head off these security risks and save an organization loads of bad PR http://redmondmag.com/reports/article.asp?EditorialsID=340