When the Boss Leaves, What Data Is at Risk?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Previous When the Boss Leaves, What Data Is at Risk?-1 Next

Identifying Data at Risk

Click through for more on the information that is at greatest risk when an executive or board member leaves an organization, as identified by Diligent.

Over the last few years, companies around the globe, in every industry, have seen their sensitive internal data lost, stolen or leaked to the outside world. High-profile leaks, like that of Edward Snowden, made headlines and struck fear into many companies worried that disgruntled employees could walk off with documents or data that would result in tremendous damage to their brand and reputation if made public. These risks are pervasive across the organization – not just with unhappy employees -- and particular attention needs to be paid to those who have access to the most sensitive information. Often overlooked are the C-suite and board of directors, who may approve corporate data policies but are never trained on them, and who likely have the most unrestricted access to data and access to information that the IT team may not know exists. In this slideshow, Diligent looks at what information is at the greatest risk when an executive or board member leaves.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.