The Issue That Can be Ignored No Longer
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
Use technology to guard personal data. Do you employ the latest virus-protection software and firewalls? Do you review audit logs for evidence of intrusions? Do you “shred” electronic data before dumping it?
Solicit help from your data suppliers and business partners. Ask potential business partners about their security practices before you share data with them. Avoid unusual or suspicious list requests.
0 Comments
View Comments
- People:
- Ben Perez
- Donna Loyle
Reported Donna Loyle
Author's page
Related Content
Comments