SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Data insecurity and loop holes

Social presence and cyber security issues have a deeper correlation regarding security breaching. Even a normal post can harm any damage by sending a phishing mail. You can be at home, work, on your phone, with a tablet or on a public computer or borrowed device. Your phone, which doubles as a virtual office, is the easiest channel for data to leak out. Data leaks can happen in a harmless post about relocating for work when that news is still confidential to your company. It can happen if you hit "paste" with text from a work-related email in your clipboard and post it into the wrong window on your screen and it can also happen if your smartphone auto-corrects something you spelled wrong in a social media post to some project code name that you just used in an email. So an unimportant activity can create a huge impact.

To read, follow:


Rate this blog entry:
Big data storage to implementation: monstrous work...
Data mining demands more skilled personnel


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 23 September 2020
If you'd like to register, please fill in the username, password and name fields.

Sigma Connect

sigmaway forums


Raise a question

Access Now

sigmaway blogs


Blog on cutting edge topics

Read More

sigmaway events


Hangout with us

Learn More

sigmaway newsletter


Start your subscription

Signup Now

Sign up for our newsletter

Follow us