RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Carol E.B. Choksy, Ph.D., CRM" <[log in to unmask]>
Reply To:
Carol E.B. Choksy, Ph.D., CRM
Date:
Tue, 1 Nov 2005 09:08:09 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (19 lines)
Hugh:

Bravo!

I use a book in my class on Strategic Intelligence called "Secrets of Computer Espionage" by John McNamara. It is a real eye-opener about this type of thing and how a determined information thief can and will get your stuff. He says the best protection is paying attention to all the little physical security issues like locks, tracking locations, and not putting your password on a post-it note in your drawer.

Encryption, unless it is very "strong," will not deter the thief.

Best wishes,
Carol

Carol E.B. Choksy, Ph.D., CRM
CEO
IRAD Strategic Consultant. Inc.
(317) 294-8329

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

ATOM RSS1 RSS2