Cookies help us display personalized product recommendations and ensure you have great shopping experience.

By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
SmartData CollectiveSmartData Collective
  • Analytics
    AnalyticsShow More
    unusual trading activity
    Signal Or Noise? A Decision Tree For Evaluating Unusual Trading Activity
    3 Min Read
    software developer using ai
    How Data Analytics Helps Developers Deliver Better Tech Services
    8 Min Read
    ai for stock trading
    Can Data Analytics Help Investors Outperform Warren Buffett
    9 Min Read
    media monitoring
    Signals In The Noise: Using Media Monitoring To Manage Negative Publicity
    5 Min Read
    data analytics
    How Data Analytics Can Help You Construct A Financial Weather Map
    4 Min Read
  • Big Data
  • BI
  • Exclusive
  • IT
  • Marketing
  • Software
Search
© 2008-25 SmartData Collective. All Rights Reserved.
Reading: Left Behind
Share
Notification
Font ResizerAa
SmartData CollectiveSmartData Collective
Font ResizerAa
Search
  • About
  • Help
  • Privacy
Follow US
© 2008-23 SmartData Collective. All Rights Reserved.
SmartData Collective > Uncategorized > Left Behind
Uncategorized

Left Behind

SundeepKapur1
SundeepKapur1
3 Min Read
SHARE

We’ve blogged in the past about the importance of data security… and like most, I typically think this is a straight-forward concept – one person protecting THEIR PC, mobile etc. That mindset changed for me yesterday when I read Lucas Mearian’s article in ComputerWorld, Layoffs leave behind orphaned hardware, unused software licenses.

This article highlights the challenges associated with corporate layoffs and the PCs that are left behind. Lucas writes about the countless PCs, servers and handheld devices lying around – some with sensitive data. Thankfully, some of these are being properly recycled… but others are gathering dust or being sold on eBay. All that precious data you worked to collect could now be sold to the highest, nearly-anonymous bidder.

If you’re overseeing data use/ security, keep the following points in mind:
1) Limit/ keep reign over customer information, don’t let copies float around unnecessarily.

2) If information is shared (internally,) make sure that only the minimum is offered. Explain the concerns to your team/ co-workers odds are they’ll understand.

More Read

Performance Management London Style
R or SAS: Quick Links to the Recent Debates
Tools and those who enable their misuse
A Little Too Literal (or, How to Teach Innovation)
Who Wants Yesterday’s Papers?

3) Audit vendors/ partners to make sure they are taking precautions with your data. As related questions shoul…


We’ve blogged in the past about the importance of data security… and like most, I typically think this is a straight-forward concept – one person protecting THEIR PC, mobile etc. That mindset changed for me yesterday when I read Lucas Mearian’s article in ComputerWorld, Layoffs leave behind orphaned hardware, unused software licenses.

This article highlights the challenges associated with corporate layoffs and the PCs that are left behind. Lucas writes about the countless PCs, servers and handheld devices lying around – some with sensitive data. Thankfully, some of these are being properly recycled… but others are gathering dust or being sold on eBay. All that precious data you worked to collect could now be sold to the highest, nearly-anonymous bidder.

If you’re overseeing data use/ security, keep the following points in mind:
1) Limit/ keep reign over customer information, don’t let copies float around unnecessarily.

2) If information is shared (internally,) make sure that only the minimum is offered. Explain the concerns to your team/ co-workers odds are they’ll understand.

3) Audit vendors/ partners to make sure they are taking precautions with your data. As related questions should your vendor has turn over (i.e. your account manager.)
Link to original post

Share This Article
Facebook Pinterest LinkedIn
Share

Follow us on Facebook

Latest News

business recovering from data loss
How Data-Driven Businesses Protect MySQL Databases from Shutdown
Big Data Exclusive
ai driven task management
Reducing “Work About Work” with AI Task Managers
Artificial Intelligence Exclusive
data center uptime
Why Rodent-Resistant Conduits Are Critical for Data Center Uptime
Big Data Data Management Exclusive Risk Management
big data and AI
The Intersection of Big Data and AI in Project Management
Artificial Intelligence Big Data Exclusive

Stay Connected

1.2KFollowersLike
33.7KFollowersFollow
222FollowersPin

You Might also Like

Change Management Day 1

4 Min Read

How Recommendation Engines Quash Diversity

2 Min Read

Yahoo: BOSS Ain’t Free

3 Min Read

Enabling Exploration Through Text Analytics

4 Min Read

SmartData Collective is one of the largest & trusted community covering technical content about Big Data, BI, Cloud, Analytics, Artificial Intelligence, IoT & more.

AI chatbots
AI Chatbots Can Help Retailers Convert Live Broadcast Viewers into Sales!
Chatbots
giveaway chatbots
How To Get An Award Winning Giveaway Bot
Big Data Chatbots Exclusive

Quick Link

  • About
  • Contact
  • Privacy
Follow US
© 2008-25 SmartData Collective. All Rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?