Data in transit, across and between company networks, is usually the focus of extensive security efforts. However, organizations typically regard data residing on internal storage devices as “secure enough.” Databases and flat files stored on server, laptop, or SAN-attached disks don’t always move outside the security perimeter; so why worry?
In this paper, we’ll explore data storage vulnerabilities, the risks associated with these vulnerabilities, and ways to effectively manage those risks.
Author: Tom Olzak