Day recently met the receptionist at a scientific research firm who released the company's corporate phonebook after a caller falsely identified himself as a company employee. Turns out the imposter was likely a competitor looking for an easy route to recruiting braniac researchers. Had there been email encryption in place and a strict policy for limiting the transfer of the electronic phonebook, the entire mess could have been averted. "There is no silver bullet," Day says. "But if you take the time to look at your company's assets, you can protect yourself."
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Stefanie McCann was formerly editor at large at CIO Decisions magazine. Write to her at firstname.lastname@example.org.