Source |
Network World |
Identifiant |
341989 |
Date de publication |
2017-03-21 21:01:00 (vue: 2017-03-21 21:01:00) |
Titre |
IDG Contributor Network: Protect your unstructured data with user behavior analytics |
Texte |
The theft of unstructured data is extremely common. It can be very difficult to safeguard emails and files when a lot of people have access. Even the CIA is not immune, judging by the recent exposure of its hacking tools via WikiLeaks. It's ironic that the CIA's hacking guides have been hacked, but it just goes to show how difficult it can be to prevent.Carelessly handled unstructured data is an easy target, and it can prove very valuable for hackers. Since unstructured data may not be monitored, attacks and successful exfiltrations often go unnoticed for long periods.To read this article in full or to leave a comment, please click here |
Notes |
|
Envoyé |
Oui |
Condensat |
access analytics article attacks been behavior but can carelessly cia click comment common contributor data difficult easy emails even exfiltrations exposure extremely files full goes guides hacked hackers hacking handled have here how idg immune ironic its judging just leave long lot may monitored network: not often people periods please prevent protect prove read recent safeguard show since successful target theft tools unnoticed unstructured user valuable very when wikileaks your |
Tags |
|
Stories |
|
Move |
|