Materiál p?ipravila Debra Littlejohn Shinder :
- Practice the principle of least privilege and put policies in writing
- Set restrictive permissions and audit access
- Use encryption
- Implement rights management
- Restrict use of removable media
- Keep laptops under control
- Set up outbound content rules
- Control wireless communications
- Control remote access
- Beware of creative data theft methods