O'Reilly logo

88 Privacy Breaches to Beware Of by Lyn Boxall, William Hioe, Kevin Shepherdson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

illustration 01 Data protection: don’t forget that it is also physical

“Data protection” – when you see or hear these two words, what are the first thoughts that come to your mind? To most of us who are raised in today’s Information Age and are being bombarded with multimedia-rich information content every day, we will not be too far off the mark when we say “data protection” includes:

  Secure databases with multi-layers of access controls, including passwords and multi-factor authentication

  Secure networks with firewalls and concentric rings of protection

  Data encryption

  Data loss/leakage prevention and

  Intrusion prevention and intrusion detection ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required