“Data protection” – when you see or hear these two words, what are the first thoughts that come to your mind? To most of us who are raised in today’s Information Age and are being bombarded with multimedia-rich information content every day, we will not be too far off the mark when we say “data protection” includes:
▪ Secure databases with multi-layers of access controls, including passwords and multi-factor authentication
▪ Secure networks with firewalls and concentric rings of protection
▪ Data encryption
▪ Data loss/leakage prevention and
▪ Intrusion prevention and intrusion detection ...