• Like
  • Save
Risk Factory: The 10 Rules of Data Security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Risk Factory: The 10 Rules of Data Security

  • 560 views
Published

All you really need

All you really need

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
560
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
0
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.

Transcript

  • 1. The 10 Rules of Data Security
  • 2. A simple, easy to use, online, B2B procurement portal for purchasing products and services to identify, minimise and manage the security threat to business data. www.riskfactory.com
  • 3. 10 Rules of Data Security1. If a bad guy can run his programs on your network, it’s not your network anymore.
  • 4. 10 Rules of Data Security2. If a bad guy can upload programs to your website, it’s not your website anymore.
  • 5. 10 Rules of Data Security3. If a bad guy can access data on your network, it’s not your network any more.
  • 6. 10 Rules of Data Security4. If a bad guy can make changes to the applications and devices on your network, its not your network any more.
  • 7. 10 Rules of Data Security5. If a bad guy can physically access servers on your network its not your data anymore.
  • 8. 10 Rules of Data Security6. If a bad guy can use your network to access your partner’s network, its your problem.
  • 9. 10 Rules of Data Security7. If a bad guy can access your stored data, it’s not your data anymore.
  • 10. 10 Rules of Data Security8. More often than not, the bad guy works for you.
  • 11. 10 Rules of Data Security9. The bad guy always knows where you hide your spare keys.
  • 12. 10 Rules of Data Security10. The bad guy is always faster and smarter than you.
  • 13. 26 Dover Street London United Kingdom +44 (0)20 3170 8955+44 (0)20 3008 6011 (fax) 13