<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; Data Protection</title>
	<atom:link href="https://www.informationlife.net/tag/data-protection/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>Think before buying ID theft protection</title>
		<link>https://www.informationlife.net/think-buying-id-theft-protection/</link>
		<comments>https://www.informationlife.net/think-buying-id-theft-protection/#comments</comments>
		<pubDate>Mon, 17 Feb 2014 13:02:57 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Protection]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4907</guid>
		<description><![CDATA[<p>Services that tout ID theft “prevention” and “protection” mostly help you only after identity theft has happened. So here are a few things to know about subscribing to identity-theft protection services. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/think-buying-id-theft-protection/">Think before buying ID theft protection</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Services that tout ID theft “prevention” and “protection” mostly help you only after identity theft has happened. So here are a few things to know about subscribing to identity-theft protection services. <a href="http://seattletimes.com/html/businesstechnology/2022895773_pfmoneytip16xml.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/think-buying-id-theft-protection/">Think before buying ID theft protection</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/think-buying-id-theft-protection/feed/</wfw:commentRss>
		<slash:comments>15</slash:comments>
		</item>
		<item>
		<title>Cloud and BYOD Data Security Storm is Brewing</title>
		<link>https://www.informationlife.net/cloud-byod-data-security-storm-brewing/</link>
		<comments>https://www.informationlife.net/cloud-byod-data-security-storm-brewing/#comments</comments>
		<pubDate>Mon, 16 Dec 2013 09:12:51 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Data Protection]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4822</guid>
		<description><![CDATA[<p>A new survey reveals that enterprises are rushing to employ cloud applications and mobile devices for mission-critical operations, but most do not have the proper controls in place to prevent data breaches, fraud, and other threats. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/cloud-byod-data-security-storm-brewing/">Cloud and BYOD Data Security Storm is Brewing</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>A new survey reveals that enterprises are rushing to employ cloud applications and mobile devices for mission-critical operations, but most do not have the proper controls in place to prevent data breaches, fraud, and other threats. <a href="http://www.tripwire.com/state-of-security/top-security-stories/cloud-byod-data-security-storm-brewing/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/cloud-byod-data-security-storm-brewing/">Cloud and BYOD Data Security Storm is Brewing</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/cloud-byod-data-security-storm-brewing/feed/</wfw:commentRss>
		<slash:comments>16</slash:comments>
		</item>
		<item>
		<title>Six ways consumerization leads to data leaks</title>
		<link>https://www.informationlife.net/six-ways-consumerization-leads-data-leaks/</link>
		<comments>https://www.informationlife.net/six-ways-consumerization-leads-data-leaks/#comments</comments>
		<pubDate>Mon, 30 Sep 2013 11:46:10 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4650</guid>
		<description><![CDATA[<p>Take a look at six ways— BYOD, App Stores, email, cloud storage, desktop virtualization and network— corporate data leaks and what you can do to mitigate some of the risks. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/six-ways-consumerization-leads-data-leaks/">Six ways consumerization leads to data leaks</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Take a look at six ways— BYOD, App Stores, email, cloud storage, desktop virtualization and network— corporate data leaks and what you can do to mitigate some of the risks. <a href="http://searchconsumerization.techtarget.com/tip/Six-ways-consumerization-leads-to-data-leaks">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/six-ways-consumerization-leads-data-leaks/">Six ways consumerization leads to data leaks</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/six-ways-consumerization-leads-data-leaks/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>NSA&#8217;s big data efforts need transparency, privacy advocates say</title>
		<link>https://www.informationlife.net/nsas-big-data-efforts-need-transparency-privacy-advocates-say/</link>
		<comments>https://www.informationlife.net/nsas-big-data-efforts-need-transparency-privacy-advocates-say/#comments</comments>
		<pubDate>Wed, 11 Sep 2013 11:36:02 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4594</guid>
		<description><![CDATA[<p>The increasing uses of big data in all kinds of organizations, particularly surveillance agencies, should prompt a debate about legitimate data collection and practices, said several speakers at a Washington, D.C., big data and privacy forum hosted by the Future of Privacy Forum and the Stanford Law School Center for Internet and Society. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/nsas-big-data-efforts-need-transparency-privacy-advocates-say/">NSA&#8217;s big data efforts need transparency, privacy advocates say</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The increasing uses of big data in all kinds of organizations, particularly surveillance agencies, should prompt a debate about legitimate data collection and practices, said several speakers at a Washington, D.C., big data and privacy forum hosted by the Future of Privacy Forum and the Stanford Law School Center for Internet and Society. <a href="http://www.pcworld.com/article/2048505/nsas-big-data-efforts-need-transparency-privacy-advocates-say.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/nsas-big-data-efforts-need-transparency-privacy-advocates-say/">NSA&#8217;s big data efforts need transparency, privacy advocates say</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/nsas-big-data-efforts-need-transparency-privacy-advocates-say/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>5 Ways to Prevent a Catastrophic Data Loss in Your Business</title>
		<link>https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/</link>
		<comments>https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/#comments</comments>
		<pubDate>Fri, 30 Aug 2013 07:00:19 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4556</guid>
		<description><![CDATA[<p>It’s a known fact that data is the precious asset of any business. When data is lost, everything is lost. It affects an organization’s reputation apart from the huge financial loss. According to a study conducted by Symantec and the Ponemon Institute, data breaches cost companies an average of $214 per compromised record, and the...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/">5 Ways to Prevent a Catastrophic Data Loss in Your Business</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/08/5-Ways-to-Prevent-a-Catastrophic-Data-Loss-in-Your-Business.jpg"><img class="alignleft  wp-image-4557"  src="http://www.informationlife.net/wp-content/uploads/2013/08/5-Ways-to-Prevent-a-Catastrophic-Data-Loss-in-Your-Business-150x150.jpg" alt="5 Ways to Prevent a Catastrophic Data Loss in Your Business" width="135" height="135" /></a>It’s a known fact that data is the precious asset of any business. When data is lost, everything is lost. It affects an organization’s reputation apart from the huge financial loss. According to a study conducted by Symantec and the Ponemon Institute, data breaches cost companies an average of $214 per compromised record, and the average organizational cost was approximately $7.2 million.</p>
<p>A data catastrophe can strike when there’s a sudden hardware failure or when there’s a data theft that lands sensitive information of customers in unknown hands. To prevent a catastrophic data loss, company need solutions that effectively address the challenges faced in the IT environment. Here are some best practices that can help companies avoid data loss. <a href="http://www.resourcenation.com/blog/5-ways-to-prevent-a-catastrophic-data-loss-in-your-business/37566/">More&gt;&gt;</a></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/">5 Ways to Prevent a Catastrophic Data Loss in Your Business</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Creative methods to protect your data</title>
		<link>https://www.informationlife.net/creative-methods-protect-data/</link>
		<comments>https://www.informationlife.net/creative-methods-protect-data/#comments</comments>
		<pubDate>Mon, 26 Aug 2013 09:43:31 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4532</guid>
		<description><![CDATA[<p>At a time when information is power and everyone is trying to protect it, data thefts and hacking attacks are also becoming common. Users can beef up their data security by setting creative passwords that cannot be easily cracked. This article looks at some of the unorthodox methods to protect data using an USB Lock,...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/creative-methods-protect-data/">Creative methods to protect your data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>At a time when information is power and everyone is trying to protect it, data thefts and hacking attacks are also becoming common. Users can beef up their data security by setting creative passwords that cannot be easily cracked. This article looks at some of the unorthodox methods to protect data using an USB Lock, Wireless PC Lock, Swiss Army USB, USB Port Blocker, and a Peeping Tom. <a href="http://tribune.com.pk/story/592698/data-protection-to-protect-and-serve/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/creative-methods-protect-data/">Creative methods to protect your data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/creative-methods-protect-data/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Data Threats Spark Insurance Hunger</title>
		<link>https://www.informationlife.net/data-threats-spark-insurance-hunger/</link>
		<comments>https://www.informationlife.net/data-threats-spark-insurance-hunger/#comments</comments>
		<pubDate>Thu, 22 Aug 2013 10:50:28 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4517</guid>
		<description><![CDATA[<p>With hacking and data breach attacks becoming rife, companies are showing keen interest in buying cyber insurance. Though the desire for protection stems from the fact a great deal of money and reputation are at stake in the event of a breach. An indication of current fears is that an attack on as broad a...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-threats-spark-insurance-hunger/">Data Threats Spark Insurance Hunger</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/08/ID-100179893.jpg"><img class="alignleft size-thumbnail wp-image-4518"  src="http://www.informationlife.net/wp-content/uploads/2013/08/ID-100179893-150x150.jpg" alt="Data threats spark insurance hunger " width="150" height="150" /></a>With hacking and data breach attacks becoming rife, companies are showing keen interest in buying cyber insurance. Though the desire for protection stems from the fact a great deal of money and reputation are at stake in the event of a breach. <strong></strong></p>
<p>An indication of current fears is that an attack on as broad a scale as a blow to the legions of users of Microsoft Windows is on the table these days when risk specialists toss around worst-case scenarios. The most common data breaches stemmed from negligence or mistakes that resulted in the loss of confidential business information, which occurred at 45 percent of the companies that suffered incidents. <a href="http://www3.cfo.com/article/2013/8/risk-management_cyber-insurance-marsh-data-breach-network-ponemon-institute-experian">More&gt;&gt;</a></p>
<p><em>Image courtesy of Victor Habbick at <a href="http://www.freedigitalphotos.net/" target="_blank">FreeDigitalPhotos.net</a></em></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-threats-spark-insurance-hunger/">Data Threats Spark Insurance Hunger</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/data-threats-spark-insurance-hunger/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>2013 Data Breach Investigations Report (DBIR)</title>
		<link>https://www.informationlife.net/2013-data-breach-investigations-report-dbir/</link>
		<comments>https://www.informationlife.net/2013-data-breach-investigations-report-dbir/#comments</comments>
		<pubDate>Tue, 09 Jul 2013 09:36:15 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Downloads]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4316</guid>
		<description><![CDATA[<p>This year’s DBIR combines the expertise of 19 organizations from around the globe. Download the report to discover stats that might surprise you—from the percentage of espionage-related attacks to the astonishing length of time it often takes to spot a security breach. By knowing today’s threats, you can better protect your organization tomorrow. Download&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/2013-data-breach-investigations-report-dbir/">2013 Data Breach Investigations Report (DBIR)</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>This year’s DBIR combines the expertise of 19 organizations from around the globe. Download the report to discover stats that might surprise you—from the percentage of espionage-related attacks to the astonishing length of time it often takes to spot a security breach. By knowing today’s threats, you can better protect your organization tomorrow. <a href="http://www.verizonenterprise.com/resources/reports/rp_data-breach-investigations-report-2013_en_xg.pdf">Download&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/2013-data-breach-investigations-report-dbir/">2013 Data Breach Investigations Report (DBIR)</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/2013-data-breach-investigations-report-dbir/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Will PRISM Impact Data Protection Strategies?</title>
		<link>https://www.informationlife.net/will-prism-impact-data-protection-strategies/</link>
		<comments>https://www.informationlife.net/will-prism-impact-data-protection-strategies/#comments</comments>
		<pubDate>Wed, 26 Jun 2013 12:34:34 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Protection]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4191</guid>
		<description><![CDATA[<p>As details of the National Security Agency&#8217;s PRISM program continue to emerge, how concerned should enterprises be about government requests for data? More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/will-prism-impact-data-protection-strategies/">Will PRISM Impact Data Protection Strategies?</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As details of the National Security Agency&#8217;s PRISM program continue to emerge, how concerned should enterprises be about government requests for data? <a href="http://www.esecurityplanet.com/network-security/will-prism-impact-data-protection-strategies.html">More&gt;&gt;</a><strong></strong></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/will-prism-impact-data-protection-strategies/">Will PRISM Impact Data Protection Strategies?</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/will-prism-impact-data-protection-strategies/feed/</wfw:commentRss>
		<slash:comments>13</slash:comments>
		</item>
		<item>
		<title>Data Protection: Information Lifecycle Management</title>
		<link>https://www.informationlife.net/data-protection-information-lifecycle-management/</link>
		<comments>https://www.informationlife.net/data-protection-information-lifecycle-management/#comments</comments>
		<pubDate>Tue, 04 Jun 2013 09:58:23 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Protection]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4085</guid>
		<description><![CDATA[<p>From womb to tomb, flexibility in managing data efficiently and cost effectively should be a priority in shopping for data protection solutions. More&#62;&#62; &#160;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-protection-information-lifecycle-management/">Data Protection: Information Lifecycle Management</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>From womb to tomb, flexibility in managing data efficiently and cost effectively should be a priority in shopping for data protection solutions. <a href="http://www.storserver.com/data-protection-information-lifecycle-management/">More&gt;&gt;</a></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/data-protection-information-lifecycle-management/">Data Protection: Information Lifecycle Management</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/data-protection-information-lifecycle-management/feed/</wfw:commentRss>
		<slash:comments>13</slash:comments>
		</item>
	</channel>
</rss>
