Talk With an Expert

Plugging the holes! Your data is leaking OUT!

Plugging the holes! Your data is leaking OUT! (PDF, 1.61MB)Published: 10 Jul, 2001
Created by:
Robert Downey

Data is essential to the development and success of a company. It can also be the downfall of a company if it gets into the wrong hands. There are many improper uses of data obtained from a company. Data can be used to compromise trade secrets or potential transactions. Data can also be used to 'profile' a company. Profiling may be the first step before an attempted infiltration of your network. It involves gathering data from any and all sources to complete an assessment of the structure and controls within the company and potential holes in the defense. Many times the data obtained for profiling is obtained through normal channels - take the instance when the US nuclear test plans and locations of pertinent officers were obtained from profiling government web sites. A major breach in security was accomplished without a 'break-in'. This emphasizes the need to understand the data available from all sources that references your company.