Security

Information Rights Management (IRM): The Best Protection for Sensitive Computer Files

Most people get a shock when they’re shown just how much sensitive data is stored insecurely on their computers. Naively, many think that a log-on password is sufficient to protect their sensitive data. It’s not. The most obvious reason is that such security is irrelevant if a sensitive document is sent to another person; the… Continue reading Information Rights Management (IRM): The Best Protection for Sensitive Computer Files