Securing data at the source: A guide to database security

Securing data at the source: A guide to database security

The impact on the business from data losses can be deep, and it can be far-ranging in terms of damaged reputation and reduced customer loyalty. In a recent study, more than half of the surveyed large companies have had to terminate employees or contractors for internal security violations. The solution to such challenges, then, is to safeguard data where it lives—in the database. Indeed, database security is rapidly becoming a recognized best practice—but often, companies lag behind in this area. Read on.
Please supply your email address to receive this whitepaper

Most Popular Reviews

Join the PC World newsletter!

Error: Please check your email address.

Latest News Articles


GGG Evaluation Team

Kathy Cassidy


First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni


For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell


The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi


The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott


My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?