Blog | G5 Cyber Security

Sharing Information Securely

Certain information requests that are funneled into a wider, more available data mart represent a real risk to the owner of the information. You need to develop a trusted relationship with the principal managers who will receive and handle your information. This program needs to have direct accountability and an enforced responsibility that requires individuals to safeguard the information. It also needs to be in place that controls sensitive information, such as sensitive information. It also has to have a trustworthy relationship with managers who handle the information requests.”]

Source: https://www.csoonline.com/article/2119647/sharing-information-securely.html

Exit mobile version