Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Six ways to prevent a breach like the one at AT&T

Antone Gonsalves | June 19, 2014
Experts say there are many technologies available to keep business partners, employees and others away from data they should not see

Once the access points are known, then software can be used to track the users on the network and restricts them to approved paths for accessing data and applications.

Having such technical controls in place to enforce security policies is key to good security, experts say.

"You can't just have some policies on paper," Foomany said. "You have to implement them through security mechanisms."

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.