Enforced encryption, reporting and biometric technology are among the tools required for the modern IT manager's arsenal
Businesses are seeing an increase in malicious insider activity, according to the 2010 Data Breach Report from Verizon Business released last week. But it is not just insider threats that are ...
To continue reading this article...
Join Computing
- Unlimited access to real-time news, analysis and opinion from the technology industry
- Receive important and breaking news in our daily newsletter
- Be the first to hear about our events and awards programmes
- Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
- Access to the Computing Delta hub providing market intelligence and research
- Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders