E-mail, Internet access, and collaborative tools (whether a phone system’s conferencing capabilities, or document-sharing applications) are “must-haves” for most businesses today.
But by now many managers know that you shouldn’t stop at just implementing these tools and then going ahead, footloose and fancy-free, with using them. As with any other asset, you need to protect not just the
Financial Instruments and Exchange Law (J-SOX) and the Protection of Personal Information Law · Capture, monitor, and keep financial file logs (from financial reporting systems) for at least one year, for SOX audits Information Security Slip Ups—or Why Chains around Your Computer Hardware Won’t Keep Your Data Safe When hackers access the credit card numbers (or other confidential personal information) of your customers, it can cost you from $90 to $305 USD for each breached record. For US-based