RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
MIME-Version:
1.0
Sender:
Records Management Program <[log in to unmask]>
Subject:
From:
"Carol E.B. Choksy, Ph.D., CRM" <[log in to unmask]>
Date:
Tue, 1 Nov 2005 09:08:09 -0500
Content-Type:
text/plain; charset="UTF-8"
Content-Transfer-Encoding:
8bit
Reply-To:
"Carol E.B. Choksy, Ph.D., CRM" <[log in to unmask]>
Parts/Attachments:
text/plain (19 lines)
Hugh:

Bravo!

I use a book in my class on Strategic Intelligence called "Secrets of Computer Espionage" by John McNamara. It is a real eye-opener about this type of thing and how a determined information thief can and will get your stuff. He says the best protection is paying attention to all the little physical security issues like locks, tracking locations, and not putting your password on a post-it note in your drawer.

Encryption, unless it is very "strong," will not deter the thief.

Best wishes,
Carol

Carol E.B. Choksy, Ph.D., CRM
CEO
IRAD Strategic Consultant. Inc.
(317) 294-8329

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

ATOM RSS1 RSS2