1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Review: How to protect top-secret data

Discussion in 'Network World' started by RSS, Aug 31, 2015.

  1. RSS

    RSS New Member Member

    The small, camera-equipped drone hovers unobtrusively outside your office window, quietly photographing the confidential documents on your desk and on your computer screen. A dumpster diver retrieves your shredded printouts, scans them into a computer and uses jigsaw-puzzle-solving software to reform the shreds into legible documents.

    An innocent-looking but virus-infected computer uses nothing more than heat signatures to glean data from your air-gapped (non-networked), “off-the-grid” machines that you thought were perfectly safe from prying eyes. And an industrial spy has tapped into your network links to make copies of private documents as they flow around your company.

    To read this article in full or to leave a comment, please click here

    (Insider Story)

    Continue reading...
     

Share This Page