You are here
Home > Articles (Page 11)

4 Tips for Destroying Sensitive Data

As businesses continue reel under data loss and theft, destroying sensitive information in a timely manner is imperative for risk mitigation and continued operational security. There are various techniques for destroying sensitive data that will safeguard personally identifiable information (PII), payment card industry (PCI) transaction data, and proprietary secrets. Principal

Five Security Myths Everyone Should Dismiss

Articles

IT security throws up constant new challenges, so you can’t afford to waste time dealing with non-issues. Here are five security myths that you need to ignore. This list is drawn from a longer presentation given by Gartner analyst Jay Heiser. More>>

Top