- Where is our most sensitive data and who has access to it?
- What regulations and standards apply to our data?
- Have we been a target of data and identity theft?
- Does our collaborative business model put our data at risk?
- Do our employees, customers, and business partners understand their role in protecting sensitive information?
- Do our safeguards provide data with end-to-end protection, even on mobile devices?
- Develop and implement a detailed information-protection plan.
- Identify and classify data according to sensitivity and risk. Know where it resides and flows.
- Understand the threats that are specific to your data and your organization.
- Implement protection capabilities to safeguard your sensitive data end-to-end.
- Test your protection capabilities. Monitor them continually and update them as necessary.
- Plan for a controlled and coordinated response to incidents when they occur.
After a Masters in Computer Science, I decided that I preferred writing about IT rather than programming. My 20-year writing career has taken me to Hong Kong and London where I've edited and written for IT, business and electronics publications. In 2002 I co-founded Futurity Media with Stewart Baines where I continue to write about a range of topics such as unified communications, cloud computing and enterprise applications.