Download now Free registration required
Regulating the electronic flow of information stored in a digital format has never been so hard. Most organizations have attempted to reduce the risk of data leaks from servers and networks with firewall, intrusion prevention, authentication, and access controls. The mobility trend driving widespread use of laptops for remote and mobile computing has recently spurred the use of encryption solutions for protecting data on devices that may be lost or stolen. But now, a new risk is sidestepping these controls-one that creates the opportunity for data to slip outside the protective net without detection. The culprit is any plug-and-play storage device attached to a stationary PC or laptop USB port.
- Format: PDF
- Size: 806.35 KB