Bruce’s Shorts | 4.11 - Data Security

What are the top ten threats to your company data? In this episode of Bruce’s Shorts, Bruce Devlin runs through the list in under 3 minutes.

Watch the video to hear more abouts these top ten treats:

10. Insider attacks

9. Lack of contingencies plans

8. Poor configuration

7. Reckless use of hotel networks

6. Reckless use of wireless hotspots

5. Data lost on a personal device

4. Web server compromised

3. Reckless surfing by employees

2. Malicious HTML email

1. Automated exploit of known vulnerabilities

You will be hacked; how do you survive it? How do you protect your data? Find out in the next episode of Bruce’s Shorts.

You might also like...

Future Technologies: Timing Asynchronous Infrastructures

We continue our series considering technologies of the near future and how they might transform how we think about broadcast, with a technical discussion of why future IP infrastructures may well take a more fluid approach to timing planes.

Standards: Part 13 - Exploring MPEG4-Part 10 - H.264/AVC

The H.264/AVC codec has been very successful. Here we dig deeper into how profiles and levels work to facilitate deployment of delivery systems and receiving client-player designs.

The Meaning Of Metadata

Metadata is increasingly used to automate media management, from creation and acquisition to increasingly granular delivery channels and everything in-between. There’s nothing much new about metadata—it predated digital media by decades—but it is poised to become pivotal in …

Designing IP Broadcast Systems: Remote Control

Why mixing video and audio UDP/IP streams alongside time sensitive TCP/IP flows can cause many challenges for remote control applications such as a camera OCP, as the switches may be configured to prioritize the UDP feeds, or vice…

Future Technologies: Autoscaling Infrastructures

We continue our series considering technologies of the near future and how they might transform how we think about broadcast, with a discussion of the concepts, possibilities and constraints of autoscaling IP based infrastructures.