Data Privacy: What Part of Your Network Is Vulnerable, and What Can You Do About It?

Data Privacy: What Part of Your Network Is Vulnerable, and What Can You Do About It?

Summary: Doc thinks networked environments are both a boon and a burden to organizations. They greatly improve productivity and reduce cost by allowing customers, vendors, partners, employees, and other stakeholders to share and access information in real time. But increased access to sensitive information makes networks vulnerable to malicious activity and misuse. There have been numerous high-profile data security breaches and losses, prompting a rise in government regulations surrounding data privacy.

SHARE:
2

Doc thinks networked environments are both a boon and a burden to organizations. They greatly improve productivity and reduce cost by allowing customers, vendors, partners, employees, and other stakeholders to share and access information in real time. But increased access to sensitive information makes networks vulnerable to malicious activity and misuse. There have been numerous high-profile data security breaches and losses, prompting a rise in government regulations surrounding data privacy.

The combination of increasingly complex and connected networks, more sophisticated hacking tools, and a myriad of data-privacy regulations makes it challenging for organizations of all sizes to maximize data security. For a great, free look at network security (with a heavy emphasis on print management), check out a white paper from my friends at Ricoh.

Here's just an overview of what this terrific white paper covers. And did I mention it's free?

This paper examines the vulnerable areas of a network and new document-management technologies to shore them up as well as how to choose the most appropriate security services provider for your organization.

You have two major areas of concern in a distributed workflow environment: electronic and paper. Electronic vulnerabilities encompass any data that can be compromised when a user transmits from a device over a local IP network, the Internet, or a private intranet. All elements of your network are vulnerable, including servers, client computers, operating systems, firewalls, routers, switches and hubs, wireless access points, network services, and applications. Paper vulnerabilities arise when printed information is output from a device and could be retrieved or viewed by unauthorized individuals.

Protecting data has become a legal requirement, not just an ethical one. Several data-privacy regulations have been created that make data owners legally responsible for protecting sensitive personal information from inappropriate use. The types of information covered under these regulations include customer lists, financial results, non-public personal information, credit card numbers, purchase and sales records, access codes, health records, education records, corporate intellectual property, and confidential government information.

Topics: Legal, Networking, Security

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

2 comments
Log in or register to join the discussion
  • Powerful MTS Converter

    Today I accidentally found quite a nice website about <a href="http://www.mtsconverterreviews.com/mts-converter.html">MTS Converter </a>--http://www.mtsconverterreviews.com/.
    There are so many nice software for everyone to <a href="http://www.mtsconverterreviews.com/how-to-convert-mts-files.html"> convert mts files</a>.
    Now I share with you these powerful software.
    <a href="http://www.mtsconverterreviews.com/mts-video-converter.html"> MTS Video Converter</a>
    <a href="http://www.mtsconverterreviews.com/mts-to-avi-converter.html"> MTS to AVI Converter</a>
    <a href="http://www.mtsconverterreviews.com/mts-to-mpg-mpeg.html"> MTS to MPG Converter</a>
    <a href="http://www.mtsconverterreviews.com/mts-to-mpg-mpeg.html"> MTS to MPEG Converter</a>
    <a href="http://www.mtsconverterreviews.com/mts-to-wmv.html"> MTS to WMV Converter</a>
    <a href="http://www.mtsconverterreviews.com/mts-to-flv.html"> MTS to FLV Converter</a>
    <a href="http://www.mtsconverterreviews.com/mts-to-mov.html"> Convert MTS to MOV</a>
    <a href="http://www.mtsconverterreviews.com/mts-to-mp4.html"> convert mts to mp4</a>
    dreamwing1986
  • RE: Data Privacy: What Part of Your Network Is Vulnerable, and What Can You Do About It?

    I wish you the best of luck! <a href="http://www.replica-hermes.org">hermes bag</a> <a href="http://www.replica-hermes.org">fake hermes</a> <a href="http://www.replica-hermes.org">hermes replica bags</a>
    3shao