When the Boss Leaves, What Data Is at Risk?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next When the Boss Leaves, What Data Is at Risk?-3 Next

Valuable and Aggregated Customer Data 

Even if your organization isn't a consumer brand or retail bank, your customer data is incredibly valuable and potentially devastating if it falls into the hands of a competitor. And depending on your industry, if this information leaks, you could potentially be in breach of contract with your customer. Board members and executives receive customer data likely at every board meeting to help make more informed business decisions.

Over the last few years, companies around the globe, in every industry, have seen their sensitive internal data lost, stolen or leaked to the outside world. High-profile leaks, like that of Edward Snowden, made headlines and struck fear into many companies worried that disgruntled employees could walk off with documents or data that would result in tremendous damage to their brand and reputation if made public. These risks are pervasive across the organization – not just with unhappy employees -- and particular attention needs to be paid to those who have access to the most sensitive information. Often overlooked are the C-suite and board of directors, who may approve corporate data policies but are never trained on them, and who likely have the most unrestricted access to data and access to information that the IT team may not know exists. In this slideshow, Diligent looks at what information is at the greatest risk when an executive or board member leaves.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

IT security careers The Most In-Demand Security Jobs and How to Get Them

Security professionals are in demand right now, and entry-level security jobs generally fall into either an engineer or analyst role. Find out more about required skills and career paths. ...  More >>

142x105itbeusasecurity2.jpg 9 Predictions for Cybersecurity’s Role in Government and Politics in 2017

Experts predict how cybersecurity will affect and involve our government, policies and politics in 2017. ...  More >>

Shadow IT Security How Risky Behaviors Hurt Shadow IT Security

Examine some of the concerns involving shadow IT security and some of the riskiest behaviors, applications and devices. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.