• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Risk Factory: The 10 Rules of Data Security
 

Risk Factory: The 10 Rules of Data Security

on

  • 937 views

All you really need

All you really need

Statistics

Views

Total Views
937
Views on SlideShare
933
Embed Views
4

Actions

Likes
0
Downloads
0
Comments
0

1 Embed 4

http://www.linkedin.com 4

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.
  • All high priests of security understand these simply precepts.

Risk Factory: The 10 Rules of Data Security Risk Factory: The 10 Rules of Data Security Presentation Transcript

  • The 10 Rules of Data Security
  • A simple, easy to use, online, B2B procurement portal for purchasing products and services to identify, minimise and manage the security threat to business data. www.riskfactory.com
  • 10 Rules of Data Security1. If a bad guy can run his programs on your network, it’s not your network anymore.
  • 10 Rules of Data Security2. If a bad guy can upload programs to your website, it’s not your website anymore.
  • 10 Rules of Data Security3. If a bad guy can access data on your network, it’s not your network any more.
  • 10 Rules of Data Security4. If a bad guy can make changes to the applications and devices on your network, its not your network any more.
  • 10 Rules of Data Security5. If a bad guy can physically access servers on your network its not your data anymore.
  • 10 Rules of Data Security6. If a bad guy can use your network to access your partner’s network, its your problem.
  • 10 Rules of Data Security7. If a bad guy can access your stored data, it’s not your data anymore.
  • 10 Rules of Data Security8. More often than not, the bad guy works for you.
  • 10 Rules of Data Security9. The bad guy always knows where you hide your spare keys.
  • 10 Rules of Data Security10. The bad guy is always faster and smarter than you.
  • 26 Dover Street London United Kingdom +44 (0)20 3170 8955+44 (0)20 3008 6011 (fax) 13