By EK Koh | Recently Forrester published a report titled “Twelve Recommendations for your Security Program in 2014”. There are many good recommendations. One of them is: “Define your Data and give it an Identity to better protect it”. This is timely. In a recent Ponemon Cost of Data Breach Study, the cost of a … More Give your Data an Identity?
By Mandy Pang. Collaborative technologies such as e-mail, instant messaging, Microsoft SharePoint, extranet portals, and software-as-a-service (SaaS) applications make it easier to share information and communicate innovations. In a typical Microsoft environment, Office documents may be created on the desktop, then loaded to a File Server for internal sharing. Or they may be uploaded to … More Problems with Permissions