<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; data theft</title>
	<atom:link href="https://www.informationlife.net/tag/data-theft/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>16.6 Million People Experienced Identity Theft in 2012</title>
		<link>https://www.informationlife.net/16-6-million-people-experienced-identity-theft-2012/</link>
		<comments>https://www.informationlife.net/16-6-million-people-experienced-identity-theft-2012/#comments</comments>
		<pubDate>Mon, 16 Dec 2013 09:15:24 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4824</guid>
		<description><![CDATA[<p>Financial losses due to personal identity theft totaled $24.7 billion, over $10 billion more than the losses attributed to all other property crimes measured in the National Crime Victimization Survey. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/16-6-million-people-experienced-identity-theft-2012/">16.6 Million People Experienced Identity Theft in 2012</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Financial losses due to personal identity theft totaled $24.7 billion, over $10 billion more than the losses attributed to all other property crimes measured in the National Crime Victimization Survey. <a href="http://emag.co.uk/16-6-million-people-experienced-identity-theft-in-2012/11221">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/16-6-million-people-experienced-identity-theft-2012/">16.6 Million People Experienced Identity Theft in 2012</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/16-6-million-people-experienced-identity-theft-2012/feed/</wfw:commentRss>
		<slash:comments>13</slash:comments>
		</item>
		<item>
		<title>Why the CDO may steal the CIO&#8217;s lunch</title>
		<link>https://www.informationlife.net/why-cdo-may-steal-cios-lunch/</link>
		<comments>https://www.informationlife.net/why-cdo-may-steal-cios-lunch/#comments</comments>
		<pubDate>Mon, 18 Nov 2013 10:29:13 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4785</guid>
		<description><![CDATA[<p>Bad news, CIOs: Businesses continue to hire chief digital officers and chief data officers to solve two imperatives: creating new value from data and managing data risk. Beware this power shift. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/why-cdo-may-steal-cios-lunch/">Why the CDO may steal the CIO&#8217;s lunch</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Bad news, CIOs: Businesses continue to hire chief digital officers and chief data officers to solve two imperatives: creating new value from data and managing data risk. Beware this power shift. <a href="http://www.informationweek.com/software/information-management/why-the-cdo-may-steal-the-cios-lunch/d/d-id/899746">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/why-cdo-may-steal-cios-lunch/">Why the CDO may steal the CIO&#8217;s lunch</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/why-cdo-may-steal-cios-lunch/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Security of data is consumers&#8217; biggest fear</title>
		<link>https://www.informationlife.net/security-data-consumers-biggest-fear/</link>
		<comments>https://www.informationlife.net/security-data-consumers-biggest-fear/#comments</comments>
		<pubDate>Mon, 18 Nov 2013 10:22:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data theft]]></category>
		<category><![CDATA[hacking]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4779</guid>
		<description><![CDATA[<p>In the week when Ireland experienced its biggest ever data hacking breach, a new survey obtained by the Irish Independent reveals that security concerns dwarf all others for consumers. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/security-data-consumers-biggest-fear/">Security of data is consumers&#8217; biggest fear</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>In the week when Ireland experienced its biggest ever data hacking breach, a new survey obtained by the Irish Independent reveals that security concerns dwarf all others for consumers. <a href="http://www.independent.ie/irish-news/security-of-data-is-consumers-biggest-fear-29759556.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/security-data-consumers-biggest-fear/">Security of data is consumers&#8217; biggest fear</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/security-data-consumers-biggest-fear/feed/</wfw:commentRss>
		<slash:comments>8</slash:comments>
		</item>
		<item>
		<title>How to Stop the In-House Data Thief</title>
		<link>https://www.informationlife.net/how-stop-in-house-data-thief/</link>
		<comments>https://www.informationlife.net/how-stop-in-house-data-thief/#comments</comments>
		<pubDate>Tue, 17 Sep 2013 10:15:24 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4623</guid>
		<description><![CDATA[<p>The threat of information theft by company insiders is growing. However there are ways to reduce the risks. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-stop-in-house-data-thief/">How to Stop the In-House Data Thief</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The threat of information theft by company insiders is growing. However there are ways to reduce the risks. <a href="http://online.wsj.com/article/SB10001424127887324577304579054772813919980.html">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/how-stop-in-house-data-thief/">How to Stop the In-House Data Thief</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/how-stop-in-house-data-thief/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>Find out Where Your Data Center Is At: Lessons Learned from the NSA Scandal</title>
		<link>https://www.informationlife.net/find-where-your-data-center-is-at-lessons-learned-nsa-scandal/</link>
		<comments>https://www.informationlife.net/find-where-your-data-center-is-at-lessons-learned-nsa-scandal/#comments</comments>
		<pubDate>Tue, 03 Sep 2013 09:48:30 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4575</guid>
		<description><![CDATA[<p>As Cloud Computing grows progressively and continues its triumphant journey, there is one issue that has unfortunately and undeservedly attained very little attention. It is the Geographic location of the data and the fact that where is its habituate data center. Though cloud computing provides hassle-free sources which users can use irrespective of the location...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/find-where-your-data-center-is-at-lessons-learned-nsa-scandal/">Find out Where Your Data Center Is At: Lessons Learned from the NSA Scandal</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>As Cloud Computing grows progressively and continues its triumphant journey, there is one issue that has unfortunately and undeservedly attained very little attention. It is the Geographic location of the data and the fact that where is its habituate data center.</p>
<p>Though cloud computing provides hassle-free sources which users can use irrespective of the location of data, the recent NSA scandal is finally shedding light to one aspect that how critically important has the physical location of the digital data become. <a href="http://www.business2community.com/cloud-computing/find-data-center-lessons-learned-nsa-scandal-0602738">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/find-where-your-data-center-is-at-lessons-learned-nsa-scandal/">Find out Where Your Data Center Is At: Lessons Learned from the NSA Scandal</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/find-where-your-data-center-is-at-lessons-learned-nsa-scandal/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Six data loss prevention strategies for mobile environments</title>
		<link>https://www.informationlife.net/six-data-loss-prevention-strategies-mobile-environments/</link>
		<comments>https://www.informationlife.net/six-data-loss-prevention-strategies-mobile-environments/#comments</comments>
		<pubDate>Mon, 02 Sep 2013 11:21:08 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4565</guid>
		<description><![CDATA[<p>Establishing a proactive set of data loss prevention strategies and policies can be an IT departments&#8217; best insurance against a disaster. Here are six recommended strategies. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/six-data-loss-prevention-strategies-mobile-environments/">Six data loss prevention strategies for mobile environments</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Establishing a proactive set of data loss prevention strategies and policies can be an IT departments&#8217; best insurance against a disaster. Here are six recommended strategies. <a href="http://searchconsumerization.techtarget.com/tip/Six-data-loss-prevention-strategies-for-mobile-environments">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/six-data-loss-prevention-strategies-mobile-environments/">Six data loss prevention strategies for mobile environments</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/six-data-loss-prevention-strategies-mobile-environments/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Top 6 Threats to Enterprise Security</title>
		<link>https://www.informationlife.net/top-6-threats-enterprise-security/</link>
		<comments>https://www.informationlife.net/top-6-threats-enterprise-security/#comments</comments>
		<pubDate>Fri, 30 Aug 2013 07:29:46 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Slideshows]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4548</guid>
		<description><![CDATA[<p>With “cyber espionage” making headlines, enterprises are buttering their security taking a closer look at threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware. With BYOD becoming common across many enterprises, threats that...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-6-threats-enterprise-security/">Top 6 Threats to Enterprise Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/08/Top-6-Threats-to-Enterprise-Security.jpg"><img class="alignleft  wp-image-4550"  src="http://www.informationlife.net/wp-content/uploads/2013/08/Top-6-Threats-to-Enterprise-Security-150x150.jpg" alt="Top 6 Threats to Enterprise Security" width="135" height="135" /></a>With “cyber espionage” making headlines, enterprises are buttering their security taking a closer look at threats that can impact their business and ultimately their bottom line. McAfee Labs has analyzed the threats of the past quarter for emerging trends, which center on mobile and overall malware.</p>
<p>With BYOD becoming common across many enterprises, threats that once considered consumer problems are now becoming issues for the enterprise as well. Targeted Trojans, Mobile Spyware, Ransomware, Phishing, Database Breaches, and Browser-based Threats seem to be the top six threats to enterprise security. <a href="http://www.information-management.com/resource-center/?id=10024811">More&gt;&gt;</a></p>
<p><em>Image courtesy of David Castillo Dominici at <a href="http://www.freedigitalphotos.net/" target="_blank">FreeDigitalPhotos.net</a></em></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/top-6-threats-enterprise-security/">Top 6 Threats to Enterprise Security</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/top-6-threats-enterprise-security/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>5 Ways to Prevent a Catastrophic Data Loss in Your Business</title>
		<link>https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/</link>
		<comments>https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/#comments</comments>
		<pubDate>Fri, 30 Aug 2013 07:00:19 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4556</guid>
		<description><![CDATA[<p>It’s a known fact that data is the precious asset of any business. When data is lost, everything is lost. It affects an organization’s reputation apart from the huge financial loss. According to a study conducted by Symantec and the Ponemon Institute, data breaches cost companies an average of $214 per compromised record, and the...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/">5 Ways to Prevent a Catastrophic Data Loss in Your Business</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://www.informationlife.net/wp-content/uploads/2013/08/5-Ways-to-Prevent-a-Catastrophic-Data-Loss-in-Your-Business.jpg"><img class="alignleft  wp-image-4557"  src="http://www.informationlife.net/wp-content/uploads/2013/08/5-Ways-to-Prevent-a-Catastrophic-Data-Loss-in-Your-Business-150x150.jpg" alt="5 Ways to Prevent a Catastrophic Data Loss in Your Business" width="135" height="135" /></a>It’s a known fact that data is the precious asset of any business. When data is lost, everything is lost. It affects an organization’s reputation apart from the huge financial loss. According to a study conducted by Symantec and the Ponemon Institute, data breaches cost companies an average of $214 per compromised record, and the average organizational cost was approximately $7.2 million.</p>
<p>A data catastrophe can strike when there’s a sudden hardware failure or when there’s a data theft that lands sensitive information of customers in unknown hands. To prevent a catastrophic data loss, company need solutions that effectively address the challenges faced in the IT environment. Here are some best practices that can help companies avoid data loss. <a href="http://www.resourcenation.com/blog/5-ways-to-prevent-a-catastrophic-data-loss-in-your-business/37566/">More&gt;&gt;</a></p>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/">5 Ways to Prevent a Catastrophic Data Loss in Your Business</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/5-ways-prevent-catastrophic-data-loss-your-business/feed/</wfw:commentRss>
		<slash:comments>11</slash:comments>
		</item>
		<item>
		<title>Creative methods to protect your data</title>
		<link>https://www.informationlife.net/creative-methods-protect-data/</link>
		<comments>https://www.informationlife.net/creative-methods-protect-data/#comments</comments>
		<pubDate>Mon, 26 Aug 2013 09:43:31 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4532</guid>
		<description><![CDATA[<p>At a time when information is power and everyone is trying to protect it, data thefts and hacking attacks are also becoming common. Users can beef up their data security by setting creative passwords that cannot be easily cracked. This article looks at some of the unorthodox methods to protect data using an USB Lock,...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/creative-methods-protect-data/">Creative methods to protect your data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>At a time when information is power and everyone is trying to protect it, data thefts and hacking attacks are also becoming common. Users can beef up their data security by setting creative passwords that cannot be easily cracked. This article looks at some of the unorthodox methods to protect data using an USB Lock, Wireless PC Lock, Swiss Army USB, USB Port Blocker, and a Peeping Tom. <a href="http://tribune.com.pk/story/592698/data-protection-to-protect-and-serve/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/creative-methods-protect-data/">Creative methods to protect your data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/creative-methods-protect-data/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>Personal data of 4M patients at risk after Advocate burglary</title>
		<link>https://www.informationlife.net/personal-data-4m-patients-risk-advocate-burglary/</link>
		<comments>https://www.informationlife.net/personal-data-4m-patients-risk-advocate-burglary/#comments</comments>
		<pubDate>Mon, 26 Aug 2013 09:40:22 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[data theft]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=4530</guid>
		<description><![CDATA[<p>Personal information for more than 4 million patients of Advocate Medical Group may be at risk after four computers were stolen in a July 15 burglary of an administrative building. More&#62;&#62;</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/personal-data-4m-patients-risk-advocate-burglary/">Personal data of 4M patients at risk after Advocate burglary</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Personal information for more than 4 million patients of Advocate Medical Group may be at risk after four computers were stolen in a July 15 burglary of an administrative building. <a href="http://www.chicagotribune.com/business/breaking/chi-advocate-health-break-in-20130823,0,3858565.story">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/personal-data-4m-patients-risk-advocate-burglary/">Personal data of 4M patients at risk after Advocate burglary</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/personal-data-4m-patients-risk-advocate-burglary/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
