
After a Breach: 3 Lessons
Limiting Data Collection, Storage Common After an Incident
February 1, 2012
Audio is streamed directly from the publisher (ismg-cdn.nyc3.cdn.digitaloceanspaces.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
About this episode
Organizations that have experienced a <a href='/phishing-c-324'><b>breach</b></a> report that three lessons they learned were to limit the amount of personal information collected, limit sharing data with third parties and limit the amount of data stored, a new survey shows.