Data protection best practices for financial firms
A priority in good times, the current crisis in the financial industry has put data protection at the top of the list for financial firms as banks merge and hackers try to take advantage of a weakened industry. Successful data governance can help keep your financial company, customers and employees safe from harm and out of the headlines. We've assembled our list of the best advice we have on data protection from 2008.
![]() |
||||
|
![]() |
|||
![]() |
Best practices for implementing a data disposal policy
Because of the Sarbanes-Oxley Act, intentional document destruction is now a process that must be carefully monitored. But a "document" takes on many forms, from spreadsheets and emails to instant messages and Word files. In this expert Q&A, Michael Cobb clears up some of the confusion and reveals which best practices can boost an enterprise's data destruction policy.



6 Steps for Effective Information Security Assessments
Assess your organization’s security risks with this checklist. Expert Kevin Beaver explains the 6 key components of the process.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
![]() |
||||
|
![]() |
|||
![]() |
Banking on policy in next-generation firewall
When Nicolet National Bank was ready for a new firewall, they found an application-centric tool from Palo Alto Networks changed they way they thought about firewalls. Find out why.
How to 'discover' M&A security posture
If done improperly, an M&A can leave your financial company exposed. This tip offers a methodology for the acquiring company to ensure that doesn't happen.
Data leak prevention: Controlling financial services threats
Data leaks are a growing threat at financial services organizations. Learning where to find the leaks, implementing the right tools and controlling the insider threat are steps information security pros can take to keep their company data secure.
Start the conversation
0 comments