Hacker Steals Secret Government Plans – Protect Your Information, Or Pay The Price
There are two main types of information where access needs to be managed;
1) Company Information
2) Private Individual Information
Companies limit access to certain information on their computer network as a matter of routine. Not everyone will be able to access last month’s sales figures or know the detailed plans for next year. Everyone accepts this as reasonable and protection against speculation in the company’s shares.
Management of sensitive information of this type is can be achieved by firewalls and password protection within a company’s computer network. Access to the information can also be at various levels, eg read only or editing rights.
Backing up data on a daily basis is an essential part of a company’s disaster recovery plan. Very sensitive information may not be stored on a network connected computer. Hackers are a security threat that most IT network managers are very aware of.
Every company and government body also gathers information on us. That might be as simple as a database of phone numbers and...