Data security



By Tyler Shields, VeracodeIt’s not that users “don’t want to keep their data safe”. They do. Most corporate users don’t want their personal or corporate, private information, available to someone else. They don’t want their email stolen or their contacts pillaged. So why do people insist on ignoring the multitude of security recommendations on how to have a more secure mobile work environment? The answer to this question is that inside, users really just don’t care.

Google is well-known for its worldwide network of data centers, in which it holds not just the company’s own data, but the sensitive information of its corporate and consumer customers. In this video, Google gives a rare behind-the-scenes look at the physical and data security measures that the company uses to protect that data.

Data leaked from lost, stolen or recycled IT equipment is a major, major issue. News reports about the reams of data that can be retrieved from the hard drives and memory of second hand PCs are nothing new. Organizations like the IEEE have been calling attention to the insecure storage of data for more than a decade. Enterprising reporters have subsequently found that all kinds of devices – from discarded cell phones to printers and scanners – might continue to carry.

I worked in my share of kitchens when I was younger. I washed dishes, made salads, sous cheffed and worked the grill as a short order cook. And let me say this: one rule you learn when you work in the kitchen is – to borrow a phrase from the folks in ‘Vegas – ‘what happens in the kitchen stays in the kitchen.’ That includes the mouse turds in the pantry, the creative application of wilted vegetables, your colleagues suspect personal hygiene and the waitresses’ liberal application of the five second rule.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.