Wednesday, April 6, 2011

The world’s most powerful search engines

The world’s most powerful search engines, like Google, are not only good at giving precise and informative search results; they are also good mediums for hackers in penetrating your information systems. Now, this may come to you as an alarming statement, but taken seriously, many organizations have already fallen into the pit of security negligence and mishaps. How is this possible? Because search engines like Google can trace whatever visible links you have in your network, especially if these are displayed or linked to your websites. With this, sensitive data like credit card numbers, physical addresses, and email addresses are vulnerable to identity hacking. And what does information leakage BSC got to do with these?The answer is simple. The BSC or balances scorecard for information leakage is the managers’ answer to identity theft and other Internet crimes. It is not a new technology; however, the concept remains the same. The objective is to prove whether you made the right choices for your information security systems. Actually, scorecards are more like a preventive tool. It scans all the activities in your security team and evaluates their performance, which is benchmarked with the company’s strategies to fight information theft. To further understand the function of the BSC for information protection, here are some examples.Suppose the activities of the information of the security team are the following: protecting content on portable computers, PDA’s, or laptops during network disconnection; controlling activities, such as moving, copying, printing, downloading of data by unauthorized employees; controlling the use of portable storage drives, like the removable USB drive, iPod, and other media players; controlling the loss of data on servers, laptops, and desktop computers; and the identification of the residence of classified documents.

No comments:

Post a Comment