<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; data security</title>
	<atom:link href="https://www.informationlife.net/tag/data-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>The Seven Deadly Sins of Data Security</title>
		<link>https://www.informationlife.net/seven-deadly-sins-data-security/</link>
		<comments>https://www.informationlife.net/seven-deadly-sins-data-security/#comments</comments>
		<pubDate>Fri, 07 Mar 2014 09:04:07 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Spotlight]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4175</guid>
		<description><![CDATA[<p>There is no shortage of advice on how to secure information. While much of this advice is good and would result in a more secure environment, there are lots of other things that go into an effective security program. Robert E. Braun and Michael A. Gold identify seven chief destroyers of data security that could...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/seven-deadly-sins-data-security/">The Seven Deadly Sins of Data Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>There is no shortage of advice on how to secure information. While much of this advice is good and would result in a more secure environment, there are lots of other things that go into an effective security program. <strong>Robert E. Braun</strong> and <strong>Michael A. Gold </strong>identify seven chief destroyers of data security that could undermine any security program. <a href="http://www.informationlife.net/the-seven-deadly-sins-data-security/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/seven-deadly-sins-data-security/">The Seven Deadly Sins of Data Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/seven-deadly-sins-data-security/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>2014 will be &#8220;The Year of Encryption&#8221;</title>
		<link>https://www.informationlife.net/2014-will-the-year-encryption/</link>
		<comments>https://www.informationlife.net/2014-will-the-year-encryption/#comments</comments>
		<pubDate>Mon, 23 Dec 2013 08:45:43 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4849</guid>
		<description><![CDATA[<p>Security experts at Unisys Corp. predict that 2014 will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data traffic inside enterprises is vulnerable to detection from outsiders. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/2014-will-the-year-encryption/">2014 will be &#8220;The Year of Encryption&#8221;</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Security experts at Unisys Corp. predict that 2014 will usher in broad-based adoption of encryption as enterprises respond to recent disclosures that unencrypted data traffic inside enterprises is vulnerable to detection from outsiders. <a href="http://www.ciol.com/ciol/news/204706/2014-the-year-encryption">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/2014-will-the-year-encryption/">2014 will be &#8220;The Year of Encryption&#8221;</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/2014-will-the-year-encryption/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>The 8 hottest security stories of 2013</title>
		<link>https://www.informationlife.net/the-8-hottest-security-stories-2013/</link>
		<comments>https://www.informationlife.net/the-8-hottest-security-stories-2013/#comments</comments>
		<pubDate>Thu, 19 Dec 2013 08:59:26 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4841</guid>
		<description><![CDATA[<p>Data loss, privacy violations, stolen source code, malware development, and more. In hindsight, 2013 was busy year for security professionals, as well as a costly one for the organizations and individuals targeted by criminals. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-8-hottest-security-stories-2013/">The 8 hottest security stories of 2013</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Data loss, privacy violations, stolen source code, malware development, and more. In hindsight, 2013 was busy year for security professionals, as well as a costly one for the organizations and individuals targeted by criminals. <a href="http://www.networkworld.com/news/2013/121813-the-8-hottest-security-stories-277063.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/the-8-hottest-security-stories-2013/">The 8 hottest security stories of 2013</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/the-8-hottest-security-stories-2013/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>Computer Security Day: why you should care</title>
		<link>https://www.informationlife.net/computer-security-day-care/</link>
		<comments>https://www.informationlife.net/computer-security-day-care/#comments</comments>
		<pubDate>Fri, 29 Nov 2013 10:49:38 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4814</guid>
		<description><![CDATA[<p>Every year since 1988, Computer Security Day has asked us to take a look at how we protect our data online. But messing with other people’s information goes back a long way before that—a long way before computers, in fact. What’s regarded as the first hack actually happened 110 years ago. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/computer-security-day-care/">Computer Security Day: why you should care</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Every year since 1988, Computer Security Day has asked us to take a look at how we protect our data online. But messing with other people’s information goes back a long way before that—a long way before computers, in fact. What’s regarded as the first hack actually happened 110 years ago. <a href="https://open.abc.net.au/openregions/vic-central-51bX8hh/posts/computer-security-day-why-you-should-care-97ca7pm">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/computer-security-day-care/">Computer Security Day: why you should care</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/computer-security-day-care/feed/</wfw:commentRss>
		<slash:comments>12</slash:comments>
		</item>
		<item>
		<title>Avoid identity theft and other crimes: Ten tips for safe Cyber Monday shopping</title>
		<link>https://www.informationlife.net/avoid-identity-theft-crimes-ten-tips-safe-cyber-monday-shopping/</link>
		<comments>https://www.informationlife.net/avoid-identity-theft-crimes-ten-tips-safe-cyber-monday-shopping/#comments</comments>
		<pubDate>Wed, 27 Nov 2013 09:45:27 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4810</guid>
		<description><![CDATA[<p>Cyber Monday, which follows Thanksgiving weekend, has quickly become the biggest online shopping day of the year. Since it’s also a significant day for identity theft and related cybercrimes, here are some tips to stay safe. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/avoid-identity-theft-crimes-ten-tips-safe-cyber-monday-shopping/">Avoid identity theft and other crimes: Ten tips for safe Cyber Monday shopping</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Cyber Monday, which follows Thanksgiving weekend, has quickly become the biggest online shopping day of the year. Since it’s also a significant day for identity theft and related cybercrimes, here are some tips to stay safe. <a href="http://www.utsa.edu/today/2013/11/cybermonday13.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/avoid-identity-theft-crimes-ten-tips-safe-cyber-monday-shopping/">Avoid identity theft and other crimes: Ten tips for safe Cyber Monday shopping</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/avoid-identity-theft-crimes-ten-tips-safe-cyber-monday-shopping/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>Security 2014 trends to watch</title>
		<link>https://www.informationlife.net/security-2014-trends-watch/</link>
		<comments>https://www.informationlife.net/security-2014-trends-watch/#comments</comments>
		<pubDate>Tue, 26 Nov 2013 10:59:14 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4801</guid>
		<description><![CDATA[<p>According to Ovum&#8217;s latest Security 2014 Trends to Watch report, enterprise organizations will need to gain positive advantages from security intelligence, big data analytics. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/security-2014-trends-watch/">Security 2014 trends to watch</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>According to Ovum&#8217;s latest Security 2014 Trends to Watch report, enterprise organizations will need to gain positive advantages from security intelligence, big data analytics. <a href="http://www.ciol.com/ciol/news/201986/security-2014-trends-watch">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/security-2014-trends-watch/">Security 2014 trends to watch</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/security-2014-trends-watch/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Companies are turning to data security startups to prevent theft of corporate info</title>
		<link>https://www.informationlife.net/companies-turning-data-security-startups-prevent-theft-corporate-info/</link>
		<comments>https://www.informationlife.net/companies-turning-data-security-startups-prevent-theft-corporate-info/#comments</comments>
		<pubDate>Tue, 26 Nov 2013 10:57:29 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4799</guid>
		<description><![CDATA[<p>As more employees carry their own computing devices to work, companies are turning to technology startups that provide data security and authentication services to prevent theft and misuse of corporate information. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/companies-turning-data-security-startups-prevent-theft-corporate-info/">Companies are turning to data security startups to prevent theft of corporate info</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As more employees carry their own computing devices to work, companies are turning to technology startups that provide data security and authentication services to prevent theft and misuse of corporate information. <a href="http://economictimes.indiatimes.com/news/emerging-businesses/startups/companies-are-turning-to-data-security-startups-to-prevent-theft-of-corporate-info/articleshow/26380059.cms">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/companies-turning-data-security-startups-prevent-theft-corporate-info/">Companies are turning to data security startups to prevent theft of corporate info</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/companies-turning-data-security-startups-prevent-theft-corporate-info/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Top 5 security tips to protect your small business</title>
		<link>https://www.informationlife.net/top-5-security-tips-protect-small-business/</link>
		<comments>https://www.informationlife.net/top-5-security-tips-protect-small-business/#comments</comments>
		<pubDate>Mon, 25 Nov 2013 12:22:40 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4794</guid>
		<description><![CDATA[<p>As a small business owner, it is easy to fall into the mindset that cyber criminals target large, wealthy organizations. These tips can ensure your data is as safe as possible and you don’t become a victim of a security attack. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-5-security-tips-protect-small-business/">Top 5 security tips to protect your small business</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As a small business owner, it is easy to fall into the mindset that cyber criminals target large, wealthy organizations. These tips can ensure your data is as safe as possible and you don’t become a victim of a security attack. <a href="http://www.dynamicbusiness.com.au/technology/top-10-security-tips-to-protect-your-small-business-25112013.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-5-security-tips-protect-small-business/">Top 5 security tips to protect your small business</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/top-5-security-tips-protect-small-business/feed/</wfw:commentRss>
		<slash:comments>10</slash:comments>
		</item>
		<item>
		<title>Information Security: Do Businesses Even Truly Care?</title>
		<link>https://www.informationlife.net/information-security-do-businesses-even-truly-care/</link>
		<comments>https://www.informationlife.net/information-security-do-businesses-even-truly-care/#comments</comments>
		<pubDate>Mon, 18 Nov 2013 10:27:06 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4783</guid>
		<description><![CDATA[<p>As information security breaches continue to make headlines and remind everyone of the dangers of an unprotected network, one might think that IT security is a top priority for business executives across the board. Not so, according to one security expert who believes that existing security measures are woefully outdated. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/information-security-do-businesses-even-truly-care/">Information Security: Do Businesses Even Truly Care?</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As information security breaches continue to make headlines and remind everyone of the dangers of an unprotected network, one might think that IT security is a top priority for business executives across the board. Not so, according to one security expert who believes that existing security measures are woefully outdated. <a href="http://midsizeinsider.com/en-us/article/information-security-do-businesses-even">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/information-security-do-businesses-even-truly-care/">Information Security: Do Businesses Even Truly Care?</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/information-security-do-businesses-even-truly-care/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Top management more aware of cyber risks: survey</title>
		<link>https://www.informationlife.net/top-management-aware-cyber-risks-survey/</link>
		<comments>https://www.informationlife.net/top-management-aware-cyber-risks-survey/#comments</comments>
		<pubDate>Mon, 11 Nov 2013 11:00:27 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[data security]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4761</guid>
		<description><![CDATA[<p>Thirty-one per cent of respondents in Ernst &#38; Young&#8217;s (EY) 16th annual 2013 global information security survey say that the number of security incidents within their organisation has increased by at least 5 per cent over the past 12 months. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-management-aware-cyber-risks-survey/">Top management more aware of cyber risks: survey</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Thirty-one per cent of respondents in Ernst &amp; Young&#8217;s (EY) 16th annual 2013 global information security survey say that the number of security incidents within their organisation has increased by at least 5 per cent over the past 12 months. <a href="http://www.businesstimes.com.sg/specials/bizit/others/top-management-more-aware-cyber-risks-survey-20131111">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-management-aware-cyber-risks-survey/">Top management more aware of cyber risks: survey</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/top-management-aware-cyber-risks-survey/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
	</channel>
</rss>
