Security Strategy Guides for IT Administrators : Data Protection
- “Leaking Beeps” is a series of studies by Trend Micro that aims to highlight a weakness in pager technology and how it can put critical activities of affected companies at risk.The third part of the “Leaking Beeps” series discusses the different types of IT systems connected with unencrypted pages that can be used by attackers for reconnaissance or intelligence gathering.With a little SDR knowledge and a $20 USB dongle, attackers can read unencrypted pager messages from tens of kilometers away. Who still uses pagers in this day and age? Healthcare facilities. Goodbye, PHI.An enterprise guide on network segmentation; how it works to secure large enterprise networks, why it's needed, and examples of some of the most widely used network models for different industries.This primer discusses the importance of data classification, and how organizations can implement these strategies to reduce the effects should a data breach occur.In 2015, the European Union will implement a new EU Data Protection Regulation for everyone who does business in any of the Union's 28 member states. Here's what you need to know to make sure your organization is ready before implementation.