When the Boss Leaves, What Data Is at Risk?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next When the Boss Leaves, What Data Is at Risk?-2 Next

New Business Pipelines and Contact Information

Setting the long-term strategy for the business has always been a part of a board member's role, in particular the critical oversight of mergers and acquisitions that can help drive growth. Board members and executives have access to potential deal information long before the average employee. Because of the potentially market-moving nature of these conversations, it is important for companies to stay in control of the information and ensure board members and executives are communicating through secure platforms, like a deal room, a board portal and encrypted text messaging services.

Over the last few years, companies around the globe, in every industry, have seen their sensitive internal data lost, stolen or leaked to the outside world. High-profile leaks, like that of Edward Snowden, made headlines and struck fear into many companies worried that disgruntled employees could walk off with documents or data that would result in tremendous damage to their brand and reputation if made public. These risks are pervasive across the organization – not just with unhappy employees -- and particular attention needs to be paid to those who have access to the most sensitive information. Often overlooked are the C-suite and board of directors, who may approve corporate data policies but are never trained on them, and who likely have the most unrestricted access to data and access to information that the IT team may not know exists. In this slideshow, Diligent looks at what information is at the greatest risk when an executive or board member leaves.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.