Tim Buckley Owen Keeping Track of Your Data - Identifying the Threats
Jinfo Article

5th August 2014

By Tim Buckley Owen

Abstract

Plenty of self-serving reports from security specialists predict catastrophes to which they happen to provide solutions. But their findings can be useful nevertheless - for example in helping organisations decide whether they should be more worried about hackers or their own staff, or about traditional desktop machines as opposed to BYOD and mobile devices. Of particular interest, too, are some recent findings indicating that most organisations haven't a clue where their unstructured data resides. Plus the intriguing suggestion that what is going to matter in future is not where it is physically but its legal, political and - crucially - its logical location when several jurisdictions are involved. Information professionals with a compliance role should be licking their lips.

Content Access

Access to Jinfo articles and reports is a benefit of a Jinfo Subscription.

Does your organisation have a Jinfo Subscription?
"Yes, we subscribe"

Please sign in here so that we can check your access to this item:

MyJinfo Login

Email:

Password:

  Forgotten password?


Sign in with:


Or sign in via email:

Enter your email and we'll send you a magic link to sign you in automatically.

"Not yet"

Gain access to this article with a Jinfo Subscription. It will help your organisation:

  1. Save time and money
  2. Re-invent information services
  3. Define, measure and communicate information value

Benefits and Pricing

Jinfo Testimonials
Testimonials


"Don't know"

Submit the Subscription Question form to find out if someone in your organisation already has a subscription or to discuss your questions or requirements.

Or use the 'Text Chat' button at the bottom-right of this page for immediate assistance.

Claire Laybats, Head of Commercial Development

Claire Laybats
Head of Commercial Development
claire.laybats@jinfo.com



 « All Articles