Copyright © 2017 ALM Media Properties, LLC. All Rights Reserved.
This is the sixth and last in a series of columns on information security. Prior articles dealt with trade secret theft, ways to keep your data safe and with information security in light of the different types of technologies being deployed by companies. This article underscores the fact that despite all the technological advances with respect to information security, we are all human and often times represent the weakest link in securing data and other intellectual property.